Updated BlackBerry security features aimed at boosting corporate use
Could give RIM device an edge over rivals in penetrating the enterprise, analyst says
Computerworld - Research in Motion (RIM) Wednesday padded the latest version of its BlackBerry Enterprise Server software with new security features designed to accommodate the growing use BlackBerry devices in corporate settings.
The updates, part of the new Blackberry Enterprise Server (BES) Version 5.0.2 released today, include a new tool dubbed the Individual-Liable Devices Policy that lets users separate personal use from corporate use of the device. The version also includes technology that allows corporate data stored on personal BlackBerry devises to be erased remotely.
Though the new version is a relatively minor point release of BES, the security tweaks address an important need, said Jack Gold, an analyst at J. Gold Associates.
Increasingly, companies that are unable or unwilling to buy such technologies permit employees to access enterprise applications and data from personal smartphones such as RIM's BlackBerry device, Gold said.
Some companies address security risks by only allowing workers to use approved devices, he said.
Others allow the use of many devices, but have separate data access policies for each, he added. For instance, a company might have a policy that allows Android users to only access enterprise e-mail, while a user of a personal BlackBerry might have wider access to enterprise applications, he said.
RIM's newest security enhancements appear designed to make it easier for security administrators to allow employees to use personal BlackBerry's for corporate uses, Gold said.
The company's support for remote removal of corporate data from employee-owned devices for instance, allows for more granular control over personal devices, he said.
"BES was always able to remotely remove data on your device. Your company could simply send a 'kill-pill' and your device would be trashed," he said. "Now they wouldn't need to do that. They could just delete the corporate part and leave your personal data alone," he said.
Meanwhile, the new Individual-Liable Devices Policy will allow users of personally-owned BlackBerry's to access their personal e-mail and calendar, and allow calls on personal voice plans, even while the device is locked out of corporate use. The policy can also prevent users from accessing organizer data such as tasks, contacts and calendar entries from within social networking applications, according to RIM.
The updated BES also includes new self-service options that allow users connected to a BlackBerry Enterprise Server to reset their device password, lock the device or remotely delete all data in case the BlackBerry is lost or stolen. Previously, such functions could only be carried out by an IT administrator, according to RIM.
Such features should, in theory at least, reduce the risk of "cross-contamination" that can result when personal devices are used for corporate purposes, Gold said. "Now as an IT administrator I can tell you to go out and buy your Blackberry and use it for your own personal use, because in theory at least I can separate your stuff from my business stuff," he said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Smartphones in Computerworld's Smartphones Topic Center.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!