BLACKBERRY 10 SECURITY GUIDECONFIDENTIALITY. INTEGRITY. AUTHENTICITY.
10With BlackBerry Balance™, a feature of BES10, you can create “dual personas” on employees’ mobile devices, which separate work mobile profiles from
11BlackBerry Balance lets you control how devices separate, secure and protect company data and resources. Using BlackBerry Balance, you can: + Contro
12CPU-EmbeddedBoot ROMBoot ROM BlackBerry 10 OS Base File System(read only)Application 1Application 2Application 3Application 4BlackBerry 10 Operating
13AUTHENTICATIONMultiple forms of authentication take place within the BlackBerry system to minimize the possibility of data loss and outside attack.
14BES10 offers full cross-platform mobile device management capabilities for BlackBerry, iOS and Android devices through a single administration conso
15 BLACKBERRY USER AUTHENTICATION IN ACTIONYou’ve hired several new employees—each due to receive his or her own BlackBerry 10 smartphone. A member of
16APPLICATION SANDBOXINGThe application sandboxing, Balance and malware controls found in BlackBerry 10 help keep your company data safe and secure f
17REGULATED COMPLIANCEBES10 REGULATED FEATURES AND CAPABILITIESBES10 Regulated lets you manage precisely the types of applications, tools and feature
18BlackBerry Mobile Data and Connection ServiceEnterprise Management Web ServiceBlackBerryDispatcherWORKContent ServersWeb ServersMicrosoft® ActiveSyn
19GOVERNMENT AGENCIES: SECURING DATA AND THE PUBLIC TRUSTAs the general public grows accustomed to doing more with smartphones and tablets, more ag
2CONTENTSBLACKBERRY 10 AND VERIZON 4G LTE ...3THE VERIZON-BLACKBERRY SECURITY
20HEALTHCARE: SECURING THE FLOW OF PROTECTED HEALTH DATAAmericans are living longer and using more healthcare services. Chronic conditions like obesi
21FINANCIAL SERVICES INDUSTRY: MOBILITY IN A HIGHLY REGULATED ENVIRONMENTEmployee demand for anytime, anywhere access to company back-end systems is
4G LTE is available in more than 480 markets in the U.S.Network details & coverage maps at vzw.com. © 2013 Verizon Wireless.BBSECPDF0413TO LEARN M
3BLACKBERRY 10 AND VERIZON 4G LTE: THE GOLD STANDARD FOR END-TO-END MOBILE DATA SECURITYTHE JOINT VERIZON-BLACKBERRY SOLUTION SECURES DATA FROM WOUL
4IT managers must now consider a highly complex corporate network infrastructure when devising a plan to protect and secure corporate information. Th
5DATA TRANSMITTED FROM A MOBILE DEVICE IS ONLY AS SECURE AS THE NETWORK IT TRAVERSES. THAT’S WHY VERIZON HAS INVESTED MORE THAN $80 BILLION IN ITS INF
6BlackBerry Mobile Data and Connection ServiceEnterprise Management Web ServiceBlackBerryDispatcherWORKPERSONALEnable Work Networkfor personal use (op
7BES10 SECURITY PHILOSOPHY The security features found in BES10 are built upon a foundation of confidentiality, integrity and authenticity: + Confidenti
8ENCRYPTION OPTIONSBES10 uses a technique called tunneling to help protect data in transit over the Verizon 4G LTE network. Tunneling incorporates mul
9BES10 LAYERS OF PROTECTIONWORK DATA DEVICE PROTECTIONWork file systems and applications are kept separate from personal data and encrypted.IN-TRANSIT
Komentarze do niniejszej Instrukcji