SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Android in the Enterprise
New Security Enhancements: Google
and BlackBerry Strengthen the Case
White Paper
Executive Summary
BlackBerryÂŽ
and Google have worked together to enhance and simplify secure mobile productivity.
The collaboration brings the leader in mobile security together with the world’s most popular
mobility platform.
With enterprises rapidly embracing the Android
TM
platform to transform their workflows and
processes through mobile innovation, Google has made a number of significant improvements in
Android-specific security. These enhancements add to Google-provided security services, which
are continuously updated to address both new and ongoing threats.
While security at the application and operating system level is critical, enterprises can go further
by choosing the right mobility management platform. Building on Google’s security enhancements,
BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to
meet all enterprise use cases.1
The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring
compliance with corporate security guidelines. This paper describes how these developments work
together to keep enterprise Android users productive and protected.
Getting a grip on mobile security in the enterprise is no small feat. Inevitably, just when CIOs, CSOs
and IT administrators think they’ve got things under control, a new media report emerges to keep
them up at night.
It’s often difficult to assess the true level of risk, and tougher still to determine how to mitigate it.
There are now simply so many moving parts, so many competing requirements, so many new
technologies, and so many emerging threats that staying on top of it all can be overwhelming.
Many of the key issues are interrelated, including:
1. BYOD
While corporate-owned devices are still popular in organizations of all kinds, 74% of organizations
report that they’re currently adopting or planning to adopt BYOD to some extent. Many are
struggling with how to manage these devices and the apps they contain, and liberal BYOD policies
(where IT has insufficient control) are surprisingly widespread.
2. Device, OS and app proliferation
Tied to BYOD is the reality that IT is under pressure to say yes to more device types than ever
before. By 2020, the number of unique devices owned by the average mobile worker will have
increased to 4.3. More devices mean more operating system versions to contend with, which
makes it harder to ensure that timely updates and security patches are in place. Harder still?
Managing the increasing number of apps these devices are running, which analysts predict is set
to explode this year.
The Growing Complexity of Mobile Security
White Paper
3. Pressure to mobilize all processes
Businesses are under more pressure than ever to develop their own mobile apps, with many
adopting “mobile first” and “mobile-only” business strategies in an effort to lower costs and
increase agility. And organizations across the spectrum are adopting a wide range of new mobility
initiatives, ranging from payments to collaboration to business analytics. Sales firms are driving
efficiency by enabling reps to close and input deals on the spot. Banks are boosting customer
satisfaction (and warding off competitors) with full-service mobile banking apps. Emergency
response teams are using mobile collaboration apps across borders to resolve crises faster than
ever before.
4. Multiple mobility management solutions
Today, most enterprises have several point solutions patched together to manage devices, apps,
identity and authentication, VPNs and more. This complexity, often spanning multiple vendors,
contracts and interfaces, creates cost inefficiencies and unique vulnerabilities.
Recognizing the challenges and opportunities that enterprises and IT organizations are facing,
BlackBerry and Google worked together to enhance and simplify secure mobile productivity. Let’s start
with a look at how Google has made Android safer through improved encryption, containerization,
scanning and more.
What IT Needs to Know About the New Android
Google’s Android security model is, and always has been, multi-tiered, with application sandboxing,
as well as security through Google Play™ services. The following recent updates add additional
layers of protection:
•	 Requiring full-disk, block-level encryption for all capable Marshmallow and above devices
•	 Starting in Nougat, Android supports file-based encryption as well
•	 Providing device integrity using Verified Boot which is required on Marshmallow and above
	 capable devices, and will be in strict enforcing mode on Nougat devices
•	 Expanding the use of hardware-backed cryptography and removing older, export cipher suites
•	 Enforcing mandatory access control (MAC) over all processes using SELinux, which enhances
	 security by confining privileged processes
•	 Implementing vulnerability exploit mitigation with ASLR (Address Space Layout Randomization) and
	 Fortify Sources. Additionally hardening the mediaserver and increasing ASLR randomness in Nougat
•	 Introducing seamless updates with Android Nougat, so that new Android devices built on Nougat can
	 install system updates in the background, enabling these devices to automatically and seamlessly
	 switch into the new updated system image
•	 Incorporating attestation services for application developers
White Paper
In addition to the recent enhancements made to Android, Google provides a number of security
services as a baseline:
•	 “Verify Apps” is a service that checks all the applications that are installed on the device –
	 even installations from unknown sources – to ensure users are protected against Potentially Harmful
	 Applications (PHAs) prior to install. All previously installed apps are regularly re-checked. Verify Apps
	 performs over 400 million security scans per day.
•	 ‘SafetyNet’ is a service that validates that the device is operating as expected according to the
	 Android security model, and detects and protects against network-level attacks. SafetyNet analyzes
	about 600 million network connections per day.
•	 The Safe Browsing API, used by Google Chrome™ on Android and available to other browsers, protects
	 against browser-based exploitation and websites attempting to deliver PHAs.
•	 Webview updates are now provided via Google Play as needed to ensure users have the latest
	 Webview security updates and other bug fixes.
•	 Google Play services provides a way to automatically update the device’s Security provider to protect
	 against known exploits.
•	 Google Play scanning engines now employ machine learning and upwards of 10,000 CPUs.
•	 Google is now also delivering monthly security updates for Android to address vulnerabilities and
	 ensure enterprise customers get timely Android OS patching.
Google works continuously to reduce the existence of Potentially Harmful Applications in the Android
ecosystem by vetting applications offered via Google Play and expanding the set of security services
for applications that run on the Android platform. All applications on Google Play are subjected to an in-
depth security analysis before being made available to the public. This analysis includes static analysis,
dynamic analysis, heuristic analysis, third-party review, and when needed, a manual review to identify and
classify any potential threats. Applications are also re-reviewed on an ongoing basis.
A major portion of detected PHAs originate from Russia and China, where there is a large market for
non-Google Play app stores. In 2015, Verify Apps reduced the number of PHA installations outside of
Google Play by 80%. This is significant – according to Google’s own analysis (detailed in the Android
Security 2015 Year in Review report), PHAs continued at low levels throughout 2015, and less than 0.15%
of devices that downloaded only from the Google Play Store had PHAs installed.
Devices that were infected typically used side-loaded applications or applications from unknown sources,
outside of Google Play. Only those applications thoroughly vetted and available on Google Play provide
additional protection levels.
As a result of these enhancements in the Android OS and Google’s continuous, in-depth review process,
its holistic security ecosystem now protects over 1.4 billion devices.
Google’s Baseline Security: 400 Million Scans a Day
White Paper
How BlackBerry extends the Picture
White Paper
With Google making powerful enhancements to the Android OS and working hard to eliminate harmful
apps, why does it matter what mobility management platform you’re using?
The truth is, there’s a lot more to the secure mobile productivity story. More opportunities to capitalize
on, and more challenges to address.
The combination of Blackberry and Google brings the industry leader in mobile security together
with the world’s most popular mobility platform. The collaboration delivers the most comprehensive
Android security offering on the market, and the best possible approach to cross-platform EMM,
providing enterprises with the following value-added benefits:
1. 	Multiple Android deployment options –
	 all managed through a single pane of glass
BlackBerry supports multiple deployment modes for Android, including Android for Work, Samsung
KNOX™ and Good for Work (and combinations of the three). Regardless of how you deploy, your
administrators can manage Android devices from the same console, alongside all the other
devices, enterprise apps and value-added solutions (such as WatchDoxÂŽ
) that drive your mobile
productivity. BlackBerry’s solutions also integrate seamlessly with Google Play for Work, and any
app in the Play catalogue is available for immediate deployment and business use. For end users,
the experience is both seamless and familiar.
2. 	Trusted BlackBerry Secure Connectivity
With BlackBerry Secure Connect Plus (available whether you deploy on-premise or via the cloud),
employees get secure connectivity to their corporate network no matter where they’re working. They
have easy access to apps and data behind the firewall, and an enhanced experience for data and
video streaming. On the administrative side, this eliminates the need for expensive mobile VPNs, and
makes it a very attractive option for regulated industries. Administrators can also set compliance
requirements for access granted to managed devices, including checking for security patch levels.
3. 	Secured access to corporate-developed
	 and commercial applications
Now, secure Good Dynamics apps can live within Android for Work and Samsung KNOX work
profiles. This gives customers the best of both worlds: access to broad Google Play catalogue
(as whitelisted by IT) plus Good Dynamics secured applications, all managed by IT.
What is the Good Dynamics Platform?
The Good Dynamics Platform uses next-gen containerization to protect all corporate data. With FIPS-
validated crypto and years of usage in the most demanding environments, it enables organizations to:
• 	 Protect corporate applications from leaking enterprise data outside of IT control,
	 through policy-based app controls
• 	 Secure enterprise data in use, at rest and in motion between backend servers and apps
• 	 Maintain the security of documents and data shared between apps,
	 via encrypted app-to-app tunneling technology
• 	 Preserve end user privacy without the need for intrusive geo-location or
	 whole device wipe techniques
White Paper
4.	Hardware that’s extra hard
BlackBerry has applied its world-renowned security model to BlackBerry PRIV ÂŽ
, its first-ever
Android smartphone. With zero-day updates, regular security patching, and protective measures
against tampering, PRIV is one of the most secure Android devices on the market today. Bolstering
the app scanning and verifying technology Google delivers, BlackBerry PRIV includes DTEK™, a tool
that monitors the information that apps are using and how they’re using it. This data is analyzed
alongside other security measures, such as password strength and encryption, to assign a security
score – and provide feedback to users on how they can better protect themselves.
5.	A comprehensive suite of security solutions
WatchDox, BBM™ Protected, AtHoc™, and SecuSuite®
form a comprehensive portfolio of enterprise
software addressing secure messaging; crisis communications; secure voice, texting and video
calls; and secure enterprise file sync and share (EFSS). These applications are available within select
Secure EMM Suites, which address the needs of organizations at every level of mobile maturity.
6.	Support that’s multi-OS, across all ownership models
BlackBerry’s solutions portfolio is platform-neutral, and allows organizations to deploy and manage
devices across all ownership models, including bring your own device (BYOD); corporate-owned,
personal enabled (COPE); corporate-owned, business only (COBO); or a combination of the three.
7. Flexible enough for any use case
No matter your requirements, the BlackBerry enterprise software portfolio can address
your organization’s needs. This is true even of organizations subject to stringent regulatory
requirements, or those that work frequently with contractors and business partners. Support for
the following is guaranteed:
•	 All Android devices, including wearables
•	 All user classes
•	 Differing app, security, and usage requirements
•	 Device-agnostic Identity & Access Management (IAM)
8.	No licensing hassles
Leveraging the benefits of the Google-BlackBerry partnership is as easy as choosing a Secure
EMM Suite. There’s one suited to every organization, no matter your size or industry, or how far
along you are on the path to mobile maturity.
Security-conscious organizations, including those in regulated industries, such as healthcare, finance
and government, have long trusted BlackBerry to safeguard their data and protect their mobile
communications. Now, as Android-based devices become increasingly attractive for productivity,
enterprise IT administrators can rest assured that Google is continuously enhancing security measures
to address threats of all kinds. And the great news is that IT can use trusted BlackBerry mobility
management and collaboration solutions to further enhance the security of their Android deployments.
White Paper
That means you can focus on what’s truly important – unlocking the potential of mobility, and using it
to transform your organization.
To find the Secure EMM Suite that’s right for your organization and start your free trial now, go to
BlackBerry.com/suites
The suites can provide you with all of the following mobility essentials:
•	 Mobile Application Management (MAM)
	 Mobilize your critical business apps, workflows and business processes, including business-class
	 productivity and collaboration apps, as well as third-party and custom-built apps.
•	 Mobile Content Management (MCM)
	 Access your business files from SharePoint, OneDrive, Box and more,
	 with native document-editing capabilities.
•	 Identity & Access Management (IAM)
	 Protect against intruders with advanced authentication technologies that simplify access to
	 services, including mobile, internal and cloud applications, without hassle for users.
•	 Mobile Security & Containerization
	 Segregate business apps and data into containers, walling them off from personal apps and data,
	 and keeping them under complete corporate control.
Secure and effective teamwork and productivity tools from BlackBerry help you get even greater
security value from your investment. Here are just a few to consider.
•	 WatchDox by BlackBerry is the leading secure enterprise file sync and share (EFSS) solution,
	 enabling users to share, edit and control their files on every device. WatchDox embeds digital
	 rights management (DRM) protection in your files so your content stays secure everywhere it goes,
	 even after files are downloaded and shared with third parties.
The BlackBerry Secure EMM Suites offer the security credentials, accreditations, and technologies
that will allow you to mobilize your business tools – from your Microsoft applications to your
custom-built apps. All this with consistent security on mobile devices and other endpoints,
across different operating systems and ownership models.
About BlackBerry
BlackBerry is securing a connected world, delivering innovative solutions across the entire
mobile ecosystem and beyond. We secure the world’s most sensitive data across all end points –
from cars to smartphones – making the mobile-first enterprise vision a reality.
Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe,
Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols
“BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information,
visit www.BlackBerry.com.
1	
Forrester ranks BlackBerry among the highest in the following criteria: Containerization, Data Management & Security, Secure Productivity Apps, Network Security, App Security (Forrester Wave EMM 2015)
Š 2015 Google Inc. All rights reserved. Google and the Google Logo are registered trademarks of Google Inc. Android and Google Play are trademarks of Google Inc.
•	 SecuSUITE encrypts voice calls and text messages, enabling iOS, Android and BlackBerry 10
	 users to protect their communications against intruders and eavesdroppers, across phone
	 networks and around the world.
•	 BBM Protected adds an extra layer of encryption to instant messaging and video calling,
	 protecting BBM communications in transit and at rest.
White Paper
WatchDox was recognized by in the
2015 report “Critical Capabilities for Enterprise
File Synchronization and Sharing”. WatchDox
received the highest product score for High
Security and second highest score for the
Extranet and Mobile Workforce use cases.
Š2016 BlackBerryŽ
. All rights reserved. BlackBerryÂŽ
, BBM™ and related trademarks, names and logos are the property of BlackBerry®
Limited (“BlackBerry®
”) and are registered and/or used in the U.S.
and countries around the world. All other trademarks are property of their respective owners. Content: 12/15 | Rev. 22JAN2016
Global Headquarters
+1 408 212 7500 (main)
+1 866 7 BE GOOD (sales)
EMEA Headquarters
+44 (0) 20 7845 5300
Asia / Pacific Headquarters
+1 300 BE GOOD
White Paper
White Paper
White Paper
White Paper

Weitere ähnliche Inhalte

Was ist angesagt?

Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012Icomm Technologies
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 

Was ist angesagt? (19)

Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 

Andere mochten auch

VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereDennis Heinle
 
]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”Klaus Hofeditz
 
Pricing models for android enterprise applications
Pricing models for android enterprise applicationsPricing models for android enterprise applications
Pricing models for android enterprise applicationsCRMIT
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinDroidcon Berlin
 
Android enterprise application development
Android enterprise application developmentAndroid enterprise application development
Android enterprise application developmentParamvir Singh
 
Android for the Enterprise and OEMs
Android for the Enterprise and OEMsAndroid for the Enterprise and OEMs
Android for the Enterprise and OEMsBlack Duck by Synopsys
 
Impresoras zebra
Impresoras  zebra Impresoras  zebra
Impresoras zebra Microgroup
 
Android Enterprise Integration
Android Enterprise IntegrationAndroid Enterprise Integration
Android Enterprise IntegrationDominik Helleberg
 

Andere mochten auch (11)

VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Android101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphereAndroid101 Intro to Android for the enterprise, IdoSphere
Android101 Intro to Android for the enterprise, IdoSphere
 
]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”]project-open[ Data-Model “Categories”
]project-open[ Data-Model “Categories”
 
Pricing models for android enterprise applications
Pricing models for android enterprise applicationsPricing models for android enterprise applications
Pricing models for android enterprise applications
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
 
Android enterprise application development
Android enterprise application developmentAndroid enterprise application development
Android enterprise application development
 
Android for the Enterprise and OEMs
Android for the Enterprise and OEMsAndroid for the Enterprise and OEMs
Android for the Enterprise and OEMs
 
Impresoras zebra
Impresoras  zebra Impresoras  zebra
Impresoras zebra
 
Android Enterprise Integration
Android Enterprise IntegrationAndroid Enterprise Integration
Android Enterprise Integration
 
Security advanced rich langston_jon green
Security advanced rich langston_jon greenSecurity advanced rich langston_jon green
Security advanced rich langston_jon green
 
Mobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjaliMobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjali
 

Ähnlich wie Android in the Enterprise New Security Enhancements: Google and BlackBerry Strengthen the Case

How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
Google android security_2015_report_final
Google android security_2015_report_finalGoogle android security_2015_report_final
Google android security_2015_report_finalAndrey Apuhtin
 
Google Android Security 2014 Report
Google Android Security 2014 ReportGoogle Android Security 2014 Report
Google Android Security 2014 ReportRonen Mendezitsky
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSAP Solution Extensions
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Android_for_Work
Android_for_WorkAndroid_for_Work
Android_for_WorkSaba Sabrin
 
MobileFirst
MobileFirstMobileFirst
MobileFirstIBM Danmark
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Hepto Software Company
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise ictyWarba Insurance Co Kuwait
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous DeliveryMainstay
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Securityryanfarmer
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013Arrow ECS UK
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise Kareem ElSayyed
 

Ähnlich wie Android in the Enterprise New Security Enhancements: Google and BlackBerry Strengthen the Case (20)

How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Google android security_2015_report_final
Google android security_2015_report_finalGoogle android security_2015_report_final
Google android security_2015_report_final
 
Google Android Security 2014 Report
Google Android Security 2014 ReportGoogle Android Security 2014 Report
Google Android Security 2014 Report
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Android_for_Work
Android_for_WorkAndroid_for_Work
Android_for_Work
 
MobileFirst
MobileFirstMobileFirst
MobileFirst
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
03 put your business in motion become a mobile enterprise icty
03 put your business in motion become a mobile enterprise   icty03 put your business in motion become a mobile enterprise   icty
03 put your business in motion become a mobile enterprise icty
 
Fortify Continuous Delivery
Fortify Continuous DeliveryFortify Continuous Delivery
Fortify Continuous Delivery
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Security
 
IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013IBM Partner Jam - 10th April 2013
IBM Partner Jam - 10th April 2013
 
DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise DroidCon 2015 - Building Secure Android Apps For The Enterprise
DroidCon 2015 - Building Secure Android Apps For The Enterprise
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 

Mehr von BlackBerry

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner BenefitsBlackBerry
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneBlackBerry
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointBlackBerry
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry SecureBlackBerry
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our LivesBlackBerry
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 

Mehr von BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 

KĂźrzlich hochgeladen

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 

KĂźrzlich hochgeladen (20)

Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 

Android in the Enterprise New Security Enhancements: Google and BlackBerry Strengthen the Case

  • 1. Android in the Enterprise New Security Enhancements: Google and BlackBerry Strengthen the Case White Paper
  • 2. Executive Summary BlackBerryÂŽ and Google have worked together to enhance and simplify secure mobile productivity. The collaboration brings the leader in mobile security together with the world’s most popular mobility platform. With enterprises rapidly embracing the Android TM platform to transform their workflows and processes through mobile innovation, Google has made a number of significant improvements in Android-specific security. These enhancements add to Google-provided security services, which are continuously updated to address both new and ongoing threats. While security at the application and operating system level is critical, enterprises can go further by choosing the right mobility management platform. Building on Google’s security enhancements, BlackBerry Secure EMM Suites deliver the best Android security, productivity, and flexibility, to meet all enterprise use cases.1 The complementary solutions delivered by BlackBerry and Google accelerate change while ensuring compliance with corporate security guidelines. This paper describes how these developments work together to keep enterprise Android users productive and protected. Getting a grip on mobile security in the enterprise is no small feat. Inevitably, just when CIOs, CSOs and IT administrators think they’ve got things under control, a new media report emerges to keep them up at night. It’s often difficult to assess the true level of risk, and tougher still to determine how to mitigate it. There are now simply so many moving parts, so many competing requirements, so many new technologies, and so many emerging threats that staying on top of it all can be overwhelming. Many of the key issues are interrelated, including: 1. BYOD While corporate-owned devices are still popular in organizations of all kinds, 74% of organizations report that they’re currently adopting or planning to adopt BYOD to some extent. Many are struggling with how to manage these devices and the apps they contain, and liberal BYOD policies (where IT has insufficient control) are surprisingly widespread. 2. Device, OS and app proliferation Tied to BYOD is the reality that IT is under pressure to say yes to more device types than ever before. By 2020, the number of unique devices owned by the average mobile worker will have increased to 4.3. More devices mean more operating system versions to contend with, which makes it harder to ensure that timely updates and security patches are in place. Harder still? Managing the increasing number of apps these devices are running, which analysts predict is set to explode this year. The Growing Complexity of Mobile Security White Paper
  • 3. 3. Pressure to mobilize all processes Businesses are under more pressure than ever to develop their own mobile apps, with many adopting “mobile first” and “mobile-only” business strategies in an effort to lower costs and increase agility. And organizations across the spectrum are adopting a wide range of new mobility initiatives, ranging from payments to collaboration to business analytics. Sales firms are driving efficiency by enabling reps to close and input deals on the spot. Banks are boosting customer satisfaction (and warding off competitors) with full-service mobile banking apps. Emergency response teams are using mobile collaboration apps across borders to resolve crises faster than ever before. 4. Multiple mobility management solutions Today, most enterprises have several point solutions patched together to manage devices, apps, identity and authentication, VPNs and more. This complexity, often spanning multiple vendors, contracts and interfaces, creates cost inefficiencies and unique vulnerabilities. Recognizing the challenges and opportunities that enterprises and IT organizations are facing, BlackBerry and Google worked together to enhance and simplify secure mobile productivity. Let’s start with a look at how Google has made Android safer through improved encryption, containerization, scanning and more. What IT Needs to Know About the New Android Google’s Android security model is, and always has been, multi-tiered, with application sandboxing, as well as security through Google Play™ services. The following recent updates add additional layers of protection: • Requiring full-disk, block-level encryption for all capable Marshmallow and above devices • Starting in Nougat, Android supports file-based encryption as well • Providing device integrity using Verified Boot which is required on Marshmallow and above capable devices, and will be in strict enforcing mode on Nougat devices • Expanding the use of hardware-backed cryptography and removing older, export cipher suites • Enforcing mandatory access control (MAC) over all processes using SELinux, which enhances security by confining privileged processes • Implementing vulnerability exploit mitigation with ASLR (Address Space Layout Randomization) and Fortify Sources. Additionally hardening the mediaserver and increasing ASLR randomness in Nougat • Introducing seamless updates with Android Nougat, so that new Android devices built on Nougat can install system updates in the background, enabling these devices to automatically and seamlessly switch into the new updated system image • Incorporating attestation services for application developers White Paper
  • 4. In addition to the recent enhancements made to Android, Google provides a number of security services as a baseline: • “Verify Apps” is a service that checks all the applications that are installed on the device – even installations from unknown sources – to ensure users are protected against Potentially Harmful Applications (PHAs) prior to install. All previously installed apps are regularly re-checked. Verify Apps performs over 400 million security scans per day. • ‘SafetyNet’ is a service that validates that the device is operating as expected according to the Android security model, and detects and protects against network-level attacks. SafetyNet analyzes about 600 million network connections per day. • The Safe Browsing API, used by Google Chrome™ on Android and available to other browsers, protects against browser-based exploitation and websites attempting to deliver PHAs. • Webview updates are now provided via Google Play as needed to ensure users have the latest Webview security updates and other bug fixes. • Google Play services provides a way to automatically update the device’s Security provider to protect against known exploits. • Google Play scanning engines now employ machine learning and upwards of 10,000 CPUs. • Google is now also delivering monthly security updates for Android to address vulnerabilities and ensure enterprise customers get timely Android OS patching. Google works continuously to reduce the existence of Potentially Harmful Applications in the Android ecosystem by vetting applications offered via Google Play and expanding the set of security services for applications that run on the Android platform. All applications on Google Play are subjected to an in- depth security analysis before being made available to the public. This analysis includes static analysis, dynamic analysis, heuristic analysis, third-party review, and when needed, a manual review to identify and classify any potential threats. Applications are also re-reviewed on an ongoing basis. A major portion of detected PHAs originate from Russia and China, where there is a large market for non-Google Play app stores. In 2015, Verify Apps reduced the number of PHA installations outside of Google Play by 80%. This is significant – according to Google’s own analysis (detailed in the Android Security 2015 Year in Review report), PHAs continued at low levels throughout 2015, and less than 0.15% of devices that downloaded only from the Google Play Store had PHAs installed. Devices that were infected typically used side-loaded applications or applications from unknown sources, outside of Google Play. Only those applications thoroughly vetted and available on Google Play provide additional protection levels. As a result of these enhancements in the Android OS and Google’s continuous, in-depth review process, its holistic security ecosystem now protects over 1.4 billion devices. Google’s Baseline Security: 400 Million Scans a Day White Paper
  • 5. How BlackBerry extends the Picture White Paper With Google making powerful enhancements to the Android OS and working hard to eliminate harmful apps, why does it matter what mobility management platform you’re using? The truth is, there’s a lot more to the secure mobile productivity story. More opportunities to capitalize on, and more challenges to address. The combination of Blackberry and Google brings the industry leader in mobile security together with the world’s most popular mobility platform. The collaboration delivers the most comprehensive Android security offering on the market, and the best possible approach to cross-platform EMM, providing enterprises with the following value-added benefits: 1. Multiple Android deployment options – all managed through a single pane of glass BlackBerry supports multiple deployment modes for Android, including Android for Work, Samsung KNOX™ and Good for Work (and combinations of the three). Regardless of how you deploy, your administrators can manage Android devices from the same console, alongside all the other devices, enterprise apps and value-added solutions (such as WatchDoxÂŽ ) that drive your mobile productivity. BlackBerry’s solutions also integrate seamlessly with Google Play for Work, and any app in the Play catalogue is available for immediate deployment and business use. For end users, the experience is both seamless and familiar. 2. Trusted BlackBerry Secure Connectivity With BlackBerry Secure Connect Plus (available whether you deploy on-premise or via the cloud), employees get secure connectivity to their corporate network no matter where they’re working. They have easy access to apps and data behind the firewall, and an enhanced experience for data and video streaming. On the administrative side, this eliminates the need for expensive mobile VPNs, and makes it a very attractive option for regulated industries. Administrators can also set compliance requirements for access granted to managed devices, including checking for security patch levels. 3. Secured access to corporate-developed and commercial applications Now, secure Good Dynamics apps can live within Android for Work and Samsung KNOX work profiles. This gives customers the best of both worlds: access to broad Google Play catalogue (as whitelisted by IT) plus Good Dynamics secured applications, all managed by IT. What is the Good Dynamics Platform? The Good Dynamics Platform uses next-gen containerization to protect all corporate data. With FIPS- validated crypto and years of usage in the most demanding environments, it enables organizations to: • Protect corporate applications from leaking enterprise data outside of IT control, through policy-based app controls • Secure enterprise data in use, at rest and in motion between backend servers and apps • Maintain the security of documents and data shared between apps, via encrypted app-to-app tunneling technology • Preserve end user privacy without the need for intrusive geo-location or whole device wipe techniques
  • 6. White Paper 4. Hardware that’s extra hard BlackBerry has applied its world-renowned security model to BlackBerry PRIV ÂŽ , its first-ever Android smartphone. With zero-day updates, regular security patching, and protective measures against tampering, PRIV is one of the most secure Android devices on the market today. Bolstering the app scanning and verifying technology Google delivers, BlackBerry PRIV includes DTEK™, a tool that monitors the information that apps are using and how they’re using it. This data is analyzed alongside other security measures, such as password strength and encryption, to assign a security score – and provide feedback to users on how they can better protect themselves. 5. A comprehensive suite of security solutions WatchDox, BBM™ Protected, AtHoc™, and SecuSuiteÂŽ form a comprehensive portfolio of enterprise software addressing secure messaging; crisis communications; secure voice, texting and video calls; and secure enterprise file sync and share (EFSS). These applications are available within select Secure EMM Suites, which address the needs of organizations at every level of mobile maturity. 6. Support that’s multi-OS, across all ownership models BlackBerry’s solutions portfolio is platform-neutral, and allows organizations to deploy and manage devices across all ownership models, including bring your own device (BYOD); corporate-owned, personal enabled (COPE); corporate-owned, business only (COBO); or a combination of the three. 7. Flexible enough for any use case No matter your requirements, the BlackBerry enterprise software portfolio can address your organization’s needs. This is true even of organizations subject to stringent regulatory requirements, or those that work frequently with contractors and business partners. Support for the following is guaranteed: • All Android devices, including wearables • All user classes • Differing app, security, and usage requirements • Device-agnostic Identity & Access Management (IAM) 8. No licensing hassles Leveraging the benefits of the Google-BlackBerry partnership is as easy as choosing a Secure EMM Suite. There’s one suited to every organization, no matter your size or industry, or how far along you are on the path to mobile maturity. Security-conscious organizations, including those in regulated industries, such as healthcare, finance and government, have long trusted BlackBerry to safeguard their data and protect their mobile communications. Now, as Android-based devices become increasingly attractive for productivity, enterprise IT administrators can rest assured that Google is continuously enhancing security measures to address threats of all kinds. And the great news is that IT can use trusted BlackBerry mobility management and collaboration solutions to further enhance the security of their Android deployments.
  • 7. White Paper That means you can focus on what’s truly important – unlocking the potential of mobility, and using it to transform your organization. To find the Secure EMM Suite that’s right for your organization and start your free trial now, go to BlackBerry.com/suites The suites can provide you with all of the following mobility essentials: • Mobile Application Management (MAM) Mobilize your critical business apps, workflows and business processes, including business-class productivity and collaboration apps, as well as third-party and custom-built apps. • Mobile Content Management (MCM) Access your business files from SharePoint, OneDrive, Box and more, with native document-editing capabilities. • Identity & Access Management (IAM) Protect against intruders with advanced authentication technologies that simplify access to services, including mobile, internal and cloud applications, without hassle for users. • Mobile Security & Containerization Segregate business apps and data into containers, walling them off from personal apps and data, and keeping them under complete corporate control. Secure and effective teamwork and productivity tools from BlackBerry help you get even greater security value from your investment. Here are just a few to consider. • WatchDox by BlackBerry is the leading secure enterprise file sync and share (EFSS) solution, enabling users to share, edit and control their files on every device. WatchDox embeds digital rights management (DRM) protection in your files so your content stays secure everywhere it goes, even after files are downloaded and shared with third parties. The BlackBerry Secure EMM Suites offer the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
  • 8. About BlackBerry BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world’s most sensitive data across all end points – from cars to smartphones – making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information, visit www.BlackBerry.com. 1 Forrester ranks BlackBerry among the highest in the following criteria: Containerization, Data Management & Security, Secure Productivity Apps, Network Security, App Security (Forrester Wave EMM 2015) Š 2015 Google Inc. All rights reserved. Google and the Google Logo are registered trademarks of Google Inc. Android and Google Play are trademarks of Google Inc. • SecuSUITE encrypts voice calls and text messages, enabling iOS, Android and BlackBerry 10 users to protect their communications against intruders and eavesdroppers, across phone networks and around the world. • BBM Protected adds an extra layer of encryption to instant messaging and video calling, protecting BBM communications in transit and at rest. White Paper WatchDox was recognized by in the 2015 report “Critical Capabilities for Enterprise File Synchronization and Sharing”. WatchDox received the highest product score for High Security and second highest score for the Extranet and Mobile Workforce use cases. Š2016 BlackBerryÂŽ . All rights reserved. BlackBerryÂŽ , BBM™ and related trademarks, names and logos are the property of BlackBerryÂŽ Limited (“BlackBerryÂŽ ”) and are registered and/or used in the U.S. and countries around the world. All other trademarks are property of their respective owners. Content: 12/15 | Rev. 22JAN2016 Global Headquarters +1 408 212 7500 (main) +1 866 7 BE GOOD (sales) EMEA Headquarters +44 (0) 20 7845 5300 Asia / Pacific Headquarters +1 300 BE GOOD