Securing iOS and Android in the enterprise

August 2013 Information Security

BlackBerry has announced the availability of a new security solution that separates work and personal apps and data on iOS and Android devices. Secure Work Space for iOS and Android is a new option with BlackBerry Enterprise Service 10 (version 10.1.1) that offers customers with a BYOD (Bring Your Own Device) policy, a solution with the best combination of security, user experience and total cost of ownership. BlackBerry designed Secure Work Space to meet the management, security and cost needs of the CIO, and the user experience and functionality that employees demand.

Since launching in January 2013, 18 000 BlackBerry Enterprise Service 10 servers have been installed by customers around the world and Secure Work Space for iOS and Android has been trialed globally with BlackBerry customers since the launch, including Netherlands-based e-office mobile b.v. For the past 22 years e-office has been creating virtual working environments for their clients, and to ensure they are always staying current on their clients’ mobility needs, e-office took part in BlackBerry’s early adopter program for Secure Work Space.

Containerisation

“Secure Work Space builds on BlackBerry Enterprise Service 10, and we found that BlackBerry’s secure infrastructure offered our company the best containerisation solution to help mobilise our multi-platform environment, while maintaining a great user experience,” said Thierry Lammers, director and co-founder, e-office mobile. “We’re looking forward to deploying this solution across our organisation and to our customers in the coming months and bringing the separation of work and personal data to life on iOS and Android devices.”

According to Forrester Research, in 2016, 350 million employees will use smartphones and 200 million will bring their own devices to the workplace. Secure Work Space offers an ideal BYOD mobile security solution, providing organisations the flexibility to embrace BYOD without sacrificing security. On a personal iOS or Android device, users with Secure Work Space get integrated e-mail (with attachment viewing), calendar and contacts for productivity, as well as secure browser access to intranets and document editing capabilities with BlackBerry’s Documents To Go. With corporate data separated and controlled within the Secure Work Space container, these standard apps can be deployed with confidence to any user, together with other apps chosen by the company.

BlackBerry is working closely with app partners such as Box to power business collaboration in the cloud.

“Content sits at the centre of every successful business and Box ensures that today’s mobile enterprise can securely access their information from any device, in any location and at any time,” said Whitney Bouck, senior vice president & GM, Enterprise at Box. “Box and BlackBerry are powering enterprise mobility for today’s knowledge workers.”

Save effort, administration and expense

BlackBerry provides security at the device, server and network level. Secure Work Space leverages the same trusted behind-the-firewall connection available for BlackBerry smartphones and extends BlackBerry security capabilities for data-at-rest and data-in-transit to iOS and Android devices. The Secure Work Space container is managed through BlackBerry Enterprise Service 10, making it easy and convenient to manage all devices from its single console.

“Mobility is fundamentally transforming how we live and work. As our dependency on mobile solutions grows, and as a greater variety of mobile devices enter the workplace, the need for solutions to manage and secure these devices has never been greater,” said David J. Smith, EVP, Enterprise Mobile Computing at BlackBerry. “In today’s ‘bring your own device world’, Secure Work Space is a differentiated solution that brings key elements of the BlackBerry security platform and mobile device management to iOS and Android devices.”

The Secure Work Space solution also enables customers to save considerable effort, administration and expense as they no longer need to configure and manage expensive VPN infrastructures to provide mobile device access to data and apps that reside behind their corporate firewalls. With end-to-end enterprise mobility management, easy deployment, and BlackBerry’s global technical support, BlackBerry continues to offer innovative, secure and reliable solutions to enterprises and governments around the world.

The BlackBerry Enterprise Service 10 server software is free to download. Annual client access licences (CALs) for Secure Work Space are $99 (MSRP) per year per device. BlackBerry Enterprise Service 10 is also available as a sixty (60) day free trial bundle that includes 50 EMM Corporate CALs (providing device management for BlackBerry 10, iOS, and Android devices) and 50 Secure Work Space CALs.

For more information on BlackBerry Enterprise Service 10 visit www.bes10.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.