SlideShare a Scribd company logo
1 of 9
Download to read offline
How BlackBerry Brings
Android Security To Your
Enterprise
White Paper
When Android first made its way into the consumer market, no one could have predicted the impact it
would have. Android was an operating system developed with a simple idea at its core: Google’s founders
wanted smarter mobile devices that better served their users. Today, that simple idea has helped make
Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been
an open platform, and there are countless devices from countless manufacturers that users can choose
between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by
criminals and malware with greater frequency than any other operating system. This means that although
the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t
patched in a timely fashion. Moreover, because so many different vendors count themselves as players in
the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their
devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android
devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates.
“As we moved to a more mobile world over the past several years, the number of potential attack points
increased dramatically, and many of them consisted of user-selected and often unsecured devices as a
byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches
consistently ranks among the top issues both IT and general management struggle with on a regular basis.
A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely
to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves
additional freedoms and run certain applications, many users choose to root their devices, stripping away
core security functionality in the interest of personalization. And though measures such as Samsung KNOX
and Android for Work exist to separate corporate and private data, these software solutions can be fooled
by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our
priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android
device market, bringing our full security expertise to bear.
White Paper
What is Rooting?
“Rooting” refers to the process by which a mobile user alters or replaces system applications
or settings which are ordinarily inaccessible to them, sometimes even replacing the operating
system entirely.
Commitment to and Leadership in Adaptive Security
BlackBerry has long set the bar for mobile security, and our approach to Android is no different. From
our dedication to ongoing security patches to our superior EMM portfolio, we pride ourselves on our
leadership in adaptive security.
Other mobile device vendors can take weeks or months to release patches. Along with Google’s
Nexus devices, BlackBerry has a record of being the quickest device manufacturer on the market to
deliver security updates. Do you really want to run the risk of losing critical data to an exploit such as
Stagefright 2.0?
With BlackBerry, that’s not something you need to worry about – we’re one of the only mobility
vendors with a clear commitment to security. When Google releases its security bulletin each month,
we send out a Security Maintenance Release to address any flagged vulnerabilities. We also provide
as-needed hotfixes for critical vulnerabilities outside those maintenance windows, such as our recent
industry-leading fixes for the Quadrooter vulnerability.
Dedicated Security Response Teams
Providing world-class security has always been a significant area of focus, which is why we have several
teams dedicated to furthering our leadership:
The BlackBerry Security Incident Response Team (BBSIRT) ensures that public and private
reports of vulnerabilities are quickly received, analyzed, and mitigated to protect our clients. This team
collaborates with customers, partners, vendors, governments, academics, and security researchers to
monitor and address the Android threat landscape 365 days a year. This allows us to deliver a unique
level of security to our customers, providing them with the guidance and tools they need to keep their
businesses safe.
The Security Research Group is a global team of ethical hackers whose mandate is to identify security
issues in the BlackBerry product portfolio and work closely with development teams to resolve them.
They also conduct active research into advanced security threats and defensive technologies.
Analyst’s View
“The lack of quickly implementing updates to the latest version of the OS
is often a key factor in enabling known exploits…Some manufacturers can
take 60-180 days to upgrade to a new OS version after Google has made it
available…This is a major security issue.”*
* J.Gold & Associates
White Paper
Security works best if it meshes with what the employees want – it’s most effective when it’s not
inconvenient to connect to a security solution or use a device. Luckily, we offer three highly attractive
options for business users who want to experience Android through BlackBerry; the PRIV, released in
2015, and the brand-new DTEK50 and DTEK60, ultra-sleek all-touch devices.
DTEK50 / DTEK60
DTEK50 and DTEK60 combine everything you’ve come to expect from BlackBerry with all the apps
and great experiences of Android. They feature fantastic cameras and brilliant screens, plus the best
integrated messaging experience on a smartphone. Added security lets you know when you could be at
risk from hackers, so you can easily take action to protect the private details of your life.
Available at affordable, business-friendly price points, DTEK50 and DTEK60 offer stellar hardware specs,
excellent battery life, and a host of productivity-oriented tools like the BlackBerry Convenience Key.
Located on the right side of the phone, a single press of this key gives the user quick access to their
most-used application or task. Other productivity-enabling features include:
•	 Gesture Controls allow for greater ease of navigation, and can be customized based
	 on user preferences.
•	 Device Search and Instant Actions allow a user to execute commands through the search bar,
	 without having to seek out or open an application.
•	 The BlackBerry Hub, now available as a standalone subscription service on Android, consolidates
	 all of a user’s communications into a single place, where they can then be easily organized. This
	 includes phone calls, email, social media notifications, scheduling alerts, and text messages.
•	 BlackBerry’s Intelligent Keyboard learns how a user types, providing word suggestions that
	 increase typing speed and accuracy in up to three languages of their choice.
Consumer-Ready, Enterprise-Friendly
White Paper
Device Security Built in from The Start
Improving the integrity of the Android OS is a cornerstone of our approach to securing Android. To
that end, we’ve incorporated many improvements to Android’s core security, locking down device
capabilities that could give attackers the opportunity to compromise a device – and in so doing, your
organization. From the Hardware Root of Trust to our enhanced bootloader, everything about PRIV,
DTEK50 and DTEK60 is architected to protect your data, both corporate and personal.
The Hardware Root of Trust
Rather than layering on defenses after production, we’ve built security into DTEK50, DTEK60 and PRIV
from the start. Our manufacturing process makes use of the Hardware Root of Trust, a proprietary
technique that adds security keys to the device processor as it’s built. These keys are then used to track,
verify, and provision each device, ensuring their authenticity and integrity are guaranteed – along with the
safety of the data they contain.
In addition to serving as the foundation of our other security measures, the Hardware Root of Trust acts as
a safeguard against counterfeiting, which could expose your organization to a wide range of malware.
BlackBerry’s Secure Bootloader
Built upon the Hardware Root of Trust, the secure boot chain in BlackBerry’s Android makes use of
multiple verification stages to ensure that the device has not been tampered with. Each stage of the
secure boot chain must verify that the next component is intact before proceeding. This further protects
DTEK50, DTEK60 and PRIV against tampering and ensures that rooted devices – and the security risks
they represent – are not present in your organization.
Analyst’s View
“No device should be able to boot and load its OS without first determining
with certainty that the OS is authentic and not somehow modified….Not all
available chips powering current devices have the ability to enable security
hardware assist and thereby secure booting to verify that the OS has not
been tampered with.”*
* J.Gold & Associates
White Paper
BlackBerry Integrity Detection
BlackBerry Integrity Detection continuously monitors for events or configuration changes that may
indicate a device’s security is compromised. It integrates readily with EMM and third-party monitoring
solutions, so that when a suspicious modification is detected it’s easy to generate integrity reports and
automated responses to compromised devices.
Analyst’s View
“There are many easy ways to root kit an Android device. Once done, it’s
impossible to look to Android and Google to provide currently verified
safety…Root kitting remains one of the single biggest threats to Android
device security.”*
* J.Gold & Associates
White Paper
Application 1 Application 2 Application 3 Application 4
BOOT
CPU CPU Embedded Boot ROM
Verification of Boot ROM digital signature
Verifies OS with public EC521 Key
Verifies SHA256 hash matches loaded image
Base file system verifies
loaded application hashes
Boot ROM
Operating System
Base File System
(Read-Only)
BOOT
OS
Public EC 521 Key of OS Signature
SHA256 of Base File System
(Signed with EC 521)
XML Manifest of loaded applications
(Cryptographically hashed)
Android OS Hardening
BlackBerry has strengthened Google’s own Android security enhancements (Android for Work,
user profile controls, etc.) with several of our own. For example, improved Address Space Layout
randomization scrambles the operating system’s code to make it harder for attackers to locate
vulnerabilities. We’ve also hardened the Android kernel, removing unnecessary functionality which would
otherwise render the operating system vulnerable.
FIPS 140-2 Compliant Full Disk Encryption
BlackBerry Powered Android devices protect their data with full-disk encryption, which is turned on
automatically and cannot be disabled. BlackBerry further enhances the protections provided by this
encryption through the use of a FIPS 140-2 compliant kernel. This is the same sort of encryption
employed by the United States government, and allows our devices to be readily used in regulated
industries; encryption keys are cordoned off within BlackBerry Secure Compound and fully write-
protected. This means that even if a device is lost or stolen, your information is safe.
Security often seems complicated, obtuse, and troublesome for both the administrator and the end
user – but it doesn’t need to be. BlackBerry’s Android is designed to give the end user visibility and
control of their data. We make your corporate devices more secure by making security both painless
and convenient.
Password Keeper
BlackBerry Password Keeper allows you to store passwords, usernames, notes, and security questions
in a single location, all secured by a master password. Password strength is measured based on a
proprietary algorithm, and credentials can easily be imported from other applications; this ensures that
in organizations where users have to keep track of multiple logins, they can do so with ease. If someone
attempts to crack a device’s master password, Password Keeper is designed to erase its data after ten
failed sign-in attempts. So users can spend less time sorting out authentication and more time getting
things done.
Analyst’s View
“Google is addressing the needs of many business Android users by
offering an enterprise-class upgrade to Android known as Android for
Work. While it does offer a significant enhancement to consumer-grade
Android by providing segmented workspaces and profiles to keep corporate
and personal apps and data separate, it does not completely solve the
challenges of using Android in the workplace.” *
* J.Gold & Associates
Control, Convenience, and Visibility
White Paper
DTEK by BlackBerry
A tool released exclusively for PRIV, DTEK50 and DTEK60, DTEK by BlackBerry automatically monitors
a device’s operating systems and applications, notifying the user when an app puts their privacy
at risk. It assigns a security rating for each device based on a number of different criteria such as
password strength. Alongside Android Marshmallow, it allows the user to control everything about
their smartphone’s privacy and security, while also giving IT an idea of which applications could prove
problematic from a business standpoint.
Analyst’s View
“Monitoring of activity that is considered a security risk, based on policies
that can be set, is an important component of securing any mobile device.” *
* J.Gold & Associates
White Paper
Other Security Features
BlackBerry’s Android offers a number of other diverse security options,
including:
•	 Media Card Protection: PRIV,  DTEK50 and DTEK60 control who can 	
access a device’s media card, protecting the information stored there and
further separating work and personal profiles.
•	 Remote Device Management: Lost or stolen devices can be located
	 through GPS positioning, and they can also be remotely locked and wiped.
•	 Application Sandboxing: On BlackBerry Powered by Android,
	 applications are isolated to their own area of the device, and sandboxed
	 off from one another to minimize the damage that might be caused by
	 a rogue app.
•	 Data-in-transit protection: Information traveling over Wi-Fi, VPN,
	 Bluetooth, and NFC connections is fully encrypted.
White Paper
About BlackBerry
BlackBerry is securing a connected world, delivering innovative solutions across the entire
mobile ecosystem and beyond. We secure the world’s most sensitive data across all end points –
from cars to smartphones – making the mobile-first enterprise vision a reality.
Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe,
Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols
“BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information,
visit www.BlackBerry.com.
From slow security patches to issues related to rooted devices, Android security is an ongoing
issue within enterprise. Although many smartphone manufacturers claim to provide some degree of
protection, not all devices are equally secure. In this, BlackBerry stands apart as a leader – DTEK50,
DTEK60 and PRIV are the world’s most secure Android smartphones, and both are a perfect choice for
your business needs, whatever those may be.
To learn more about BlackBerry smartphones, visit www.BlackBerry.com/smartphones
You can also visit http://web.BlackBerry.com/enterprise/enterprise-mobility-management.html
to learn more about our enterprise software.
DTEK50 & PRIV: The Perfect Choice for Your Business Needs
©2016 BlackBerry®
. All rights reserved. BlackBerry®
, BBM™ and related trademarks, names and logos are the property of BlackBerry®
Limited (“BlackBerry®
”) and are registered and/or used in the U.S.
and countries around the world. All other trademarks are property of their respective owners. Content: 12/15 | Rev. 22JAN2016
Global Headquarters
+1 408 212 7500 (main)
+1 866 7 BE GOOD (sales)
EMEA Headquarters
+44 (0) 20 7845 5300
Asia / Pacific Headquarters
+1 300 BE GOOD

More Related Content

What's hot

APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyVASCO Data Security
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
The Investor Snapshot
The Investor SnapshotThe Investor Snapshot
The Investor SnapshotAdam Mitchell
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solutionHexnode
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareNeil Costigan
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 

What's hot (20)

APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
How to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategyHow to successfully implement a secure mobile strategy
How to successfully implement a secure mobile strategy
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
The Investor Snapshot
The Investor SnapshotThe Investor Snapshot
The Investor Snapshot
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Hexnode Android Management solution
Hexnode Android Management solutionHexnode Android Management solution
Hexnode Android Management solution
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
BehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshareBehavioSec Web Summit START slideshare
BehavioSec Web Summit START slideshare
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 

Similar to How BlackBerry Brings Android Security To Your Enterprise: White Paper

Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataBlackBerry
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesIRJET Journal
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015RAVI PRAKASH
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Lietuvos kompiuterininkų sąjunga
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji JacobBeji Jacob
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 

Similar to How BlackBerry Brings Android Security To Your Enterprise: White Paper (20)

Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your Data
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
Luca, Marius Alexandru „Virtualių grėsmių tipai PRIEŠ apsaugines BitDefender ...
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 

More from BlackBerry

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner BenefitsBlackBerry
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneBlackBerry
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointBlackBerry
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry SecureBlackBerry
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our LivesBlackBerry
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
 

More from BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & Utilities
 

How BlackBerry Brings Android Security To Your Enterprise: White Paper

  • 1. How BlackBerry Brings Android Security To Your Enterprise White Paper
  • 2. When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%. Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data. “Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.” Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user. That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear. White Paper What is Rooting? “Rooting” refers to the process by which a mobile user alters or replaces system applications or settings which are ordinarily inaccessible to them, sometimes even replacing the operating system entirely.
  • 3. Commitment to and Leadership in Adaptive Security BlackBerry has long set the bar for mobile security, and our approach to Android is no different. From our dedication to ongoing security patches to our superior EMM portfolio, we pride ourselves on our leadership in adaptive security. Other mobile device vendors can take weeks or months to release patches. Along with Google’s Nexus devices, BlackBerry has a record of being the quickest device manufacturer on the market to deliver security updates. Do you really want to run the risk of losing critical data to an exploit such as Stagefright 2.0? With BlackBerry, that’s not something you need to worry about – we’re one of the only mobility vendors with a clear commitment to security. When Google releases its security bulletin each month, we send out a Security Maintenance Release to address any flagged vulnerabilities. We also provide as-needed hotfixes for critical vulnerabilities outside those maintenance windows, such as our recent industry-leading fixes for the Quadrooter vulnerability. Dedicated Security Response Teams Providing world-class security has always been a significant area of focus, which is why we have several teams dedicated to furthering our leadership: The BlackBerry Security Incident Response Team (BBSIRT) ensures that public and private reports of vulnerabilities are quickly received, analyzed, and mitigated to protect our clients. This team collaborates with customers, partners, vendors, governments, academics, and security researchers to monitor and address the Android threat landscape 365 days a year. This allows us to deliver a unique level of security to our customers, providing them with the guidance and tools they need to keep their businesses safe. The Security Research Group is a global team of ethical hackers whose mandate is to identify security issues in the BlackBerry product portfolio and work closely with development teams to resolve them. They also conduct active research into advanced security threats and defensive technologies. Analyst’s View “The lack of quickly implementing updates to the latest version of the OS is often a key factor in enabling known exploits…Some manufacturers can take 60-180 days to upgrade to a new OS version after Google has made it available…This is a major security issue.”* * J.Gold & Associates White Paper
  • 4. Security works best if it meshes with what the employees want – it’s most effective when it’s not inconvenient to connect to a security solution or use a device. Luckily, we offer three highly attractive options for business users who want to experience Android through BlackBerry; the PRIV, released in 2015, and the brand-new DTEK50 and DTEK60, ultra-sleek all-touch devices. DTEK50 / DTEK60 DTEK50 and DTEK60 combine everything you’ve come to expect from BlackBerry with all the apps and great experiences of Android. They feature fantastic cameras and brilliant screens, plus the best integrated messaging experience on a smartphone. Added security lets you know when you could be at risk from hackers, so you can easily take action to protect the private details of your life. Available at affordable, business-friendly price points, DTEK50 and DTEK60 offer stellar hardware specs, excellent battery life, and a host of productivity-oriented tools like the BlackBerry Convenience Key. Located on the right side of the phone, a single press of this key gives the user quick access to their most-used application or task. Other productivity-enabling features include: • Gesture Controls allow for greater ease of navigation, and can be customized based on user preferences. • Device Search and Instant Actions allow a user to execute commands through the search bar, without having to seek out or open an application. • The BlackBerry Hub, now available as a standalone subscription service on Android, consolidates all of a user’s communications into a single place, where they can then be easily organized. This includes phone calls, email, social media notifications, scheduling alerts, and text messages. • BlackBerry’s Intelligent Keyboard learns how a user types, providing word suggestions that increase typing speed and accuracy in up to three languages of their choice. Consumer-Ready, Enterprise-Friendly White Paper
  • 5. Device Security Built in from The Start Improving the integrity of the Android OS is a cornerstone of our approach to securing Android. To that end, we’ve incorporated many improvements to Android’s core security, locking down device capabilities that could give attackers the opportunity to compromise a device – and in so doing, your organization. From the Hardware Root of Trust to our enhanced bootloader, everything about PRIV, DTEK50 and DTEK60 is architected to protect your data, both corporate and personal. The Hardware Root of Trust Rather than layering on defenses after production, we’ve built security into DTEK50, DTEK60 and PRIV from the start. Our manufacturing process makes use of the Hardware Root of Trust, a proprietary technique that adds security keys to the device processor as it’s built. These keys are then used to track, verify, and provision each device, ensuring their authenticity and integrity are guaranteed – along with the safety of the data they contain. In addition to serving as the foundation of our other security measures, the Hardware Root of Trust acts as a safeguard against counterfeiting, which could expose your organization to a wide range of malware. BlackBerry’s Secure Bootloader Built upon the Hardware Root of Trust, the secure boot chain in BlackBerry’s Android makes use of multiple verification stages to ensure that the device has not been tampered with. Each stage of the secure boot chain must verify that the next component is intact before proceeding. This further protects DTEK50, DTEK60 and PRIV against tampering and ensures that rooted devices – and the security risks they represent – are not present in your organization. Analyst’s View “No device should be able to boot and load its OS without first determining with certainty that the OS is authentic and not somehow modified….Not all available chips powering current devices have the ability to enable security hardware assist and thereby secure booting to verify that the OS has not been tampered with.”* * J.Gold & Associates White Paper
  • 6. BlackBerry Integrity Detection BlackBerry Integrity Detection continuously monitors for events or configuration changes that may indicate a device’s security is compromised. It integrates readily with EMM and third-party monitoring solutions, so that when a suspicious modification is detected it’s easy to generate integrity reports and automated responses to compromised devices. Analyst’s View “There are many easy ways to root kit an Android device. Once done, it’s impossible to look to Android and Google to provide currently verified safety…Root kitting remains one of the single biggest threats to Android device security.”* * J.Gold & Associates White Paper Application 1 Application 2 Application 3 Application 4 BOOT CPU CPU Embedded Boot ROM Verification of Boot ROM digital signature Verifies OS with public EC521 Key Verifies SHA256 hash matches loaded image Base file system verifies loaded application hashes Boot ROM Operating System Base File System (Read-Only) BOOT OS Public EC 521 Key of OS Signature SHA256 of Base File System (Signed with EC 521) XML Manifest of loaded applications (Cryptographically hashed)
  • 7. Android OS Hardening BlackBerry has strengthened Google’s own Android security enhancements (Android for Work, user profile controls, etc.) with several of our own. For example, improved Address Space Layout randomization scrambles the operating system’s code to make it harder for attackers to locate vulnerabilities. We’ve also hardened the Android kernel, removing unnecessary functionality which would otherwise render the operating system vulnerable. FIPS 140-2 Compliant Full Disk Encryption BlackBerry Powered Android devices protect their data with full-disk encryption, which is turned on automatically and cannot be disabled. BlackBerry further enhances the protections provided by this encryption through the use of a FIPS 140-2 compliant kernel. This is the same sort of encryption employed by the United States government, and allows our devices to be readily used in regulated industries; encryption keys are cordoned off within BlackBerry Secure Compound and fully write- protected. This means that even if a device is lost or stolen, your information is safe. Security often seems complicated, obtuse, and troublesome for both the administrator and the end user – but it doesn’t need to be. BlackBerry’s Android is designed to give the end user visibility and control of their data. We make your corporate devices more secure by making security both painless and convenient. Password Keeper BlackBerry Password Keeper allows you to store passwords, usernames, notes, and security questions in a single location, all secured by a master password. Password strength is measured based on a proprietary algorithm, and credentials can easily be imported from other applications; this ensures that in organizations where users have to keep track of multiple logins, they can do so with ease. If someone attempts to crack a device’s master password, Password Keeper is designed to erase its data after ten failed sign-in attempts. So users can spend less time sorting out authentication and more time getting things done. Analyst’s View “Google is addressing the needs of many business Android users by offering an enterprise-class upgrade to Android known as Android for Work. While it does offer a significant enhancement to consumer-grade Android by providing segmented workspaces and profiles to keep corporate and personal apps and data separate, it does not completely solve the challenges of using Android in the workplace.” * * J.Gold & Associates Control, Convenience, and Visibility White Paper
  • 8. DTEK by BlackBerry A tool released exclusively for PRIV, DTEK50 and DTEK60, DTEK by BlackBerry automatically monitors a device’s operating systems and applications, notifying the user when an app puts their privacy at risk. It assigns a security rating for each device based on a number of different criteria such as password strength. Alongside Android Marshmallow, it allows the user to control everything about their smartphone’s privacy and security, while also giving IT an idea of which applications could prove problematic from a business standpoint. Analyst’s View “Monitoring of activity that is considered a security risk, based on policies that can be set, is an important component of securing any mobile device.” * * J.Gold & Associates White Paper Other Security Features BlackBerry’s Android offers a number of other diverse security options, including: • Media Card Protection: PRIV, DTEK50 and DTEK60 control who can access a device’s media card, protecting the information stored there and further separating work and personal profiles. • Remote Device Management: Lost or stolen devices can be located through GPS positioning, and they can also be remotely locked and wiped. • Application Sandboxing: On BlackBerry Powered by Android, applications are isolated to their own area of the device, and sandboxed off from one another to minimize the damage that might be caused by a rogue app. • Data-in-transit protection: Information traveling over Wi-Fi, VPN, Bluetooth, and NFC connections is fully encrypted.
  • 9. White Paper About BlackBerry BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world’s most sensitive data across all end points – from cars to smartphones – making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information, visit www.BlackBerry.com. From slow security patches to issues related to rooted devices, Android security is an ongoing issue within enterprise. Although many smartphone manufacturers claim to provide some degree of protection, not all devices are equally secure. In this, BlackBerry stands apart as a leader – DTEK50, DTEK60 and PRIV are the world’s most secure Android smartphones, and both are a perfect choice for your business needs, whatever those may be. To learn more about BlackBerry smartphones, visit www.BlackBerry.com/smartphones You can also visit http://web.BlackBerry.com/enterprise/enterprise-mobility-management.html to learn more about our enterprise software. DTEK50 & PRIV: The Perfect Choice for Your Business Needs ©2016 BlackBerry® . All rights reserved. BlackBerry® , BBM™ and related trademarks, names and logos are the property of BlackBerry® Limited (“BlackBerry® ”) and are registered and/or used in the U.S. and countries around the world. All other trademarks are property of their respective owners. Content: 12/15 | Rev. 22JAN2016 Global Headquarters +1 408 212 7500 (main) +1 866 7 BE GOOD (sales) EMEA Headquarters +44 (0) 20 7845 5300 Asia / Pacific Headquarters +1 300 BE GOOD