Jokes aside, some IT managers say there's no option other than BlackBerry for security
BlackBerry heavily promotes its sales to defense and security-conscious groups despite its being up for sale
Computerworld - The plight of BlackBerry has gotten so bad that heavy satire has stepped in.
In one example, a website recommends "how to upgrade your BlackBerry Smartphone to Android 4.2."
What follows at Yabaleftonline.com is a jailbreak that devolves into instructions to take the BlackBerry into the kitchen, fry it in a pan until crispy golden brown, then head out to buy an Android-based Samsung Galaxy S4.
Funny to some, but not so funny to IT workers, especially those who have staked their reputations on the security of BlackBerry as second to none, including the more popular Android and iOS operating systems.
"As for alternatives to BlackBerry, there aren't any," wrote Sandra Smith, an enterprise IT manager, in an email to Computerworld, although she didn't identify her organization. "Due to the Snowden revelations, we now realize that if you are running Microsoft/Google/Apple, you need to protect yourself from your OS and not use your OS to protect you."
IT managers and analysts note that the strength of BlackBerry's security comes from the BlackBerry Enterprise Service (BES) server software that is still used by thousands of government and enterprise customers globally. The BES software runs through the BlackBerry Network Operations Center (NOC) and through 500 global carriers but is separated from popular OS ecosystems like the ones working with Android, iOS and other mobile operating systems.
"BES is smart because it's not part of that ecosystem" of other operating systems, Smith said. "Sometimes exclusion is a plus. BlackBerry hardware and its OS will survive because of BES. We are all sitting here quietly paying as BES subscribers because we know and see the value."
But BlackBerry faces serious problems. Poor sales of its smartphones led to a $1 billion writeoff in the third quarter and plans to lay off 4,500 workers.
The security protections afforded by BlackBerry have become paramount in some large businesses and government agencies -- more important than an employee's desire to use a gold-colored iPhone 5S at work, or a decision by the organization's developers to stop building BlackBerry apps.
On Thursday, for instance, enterprise file sharing vendor Egnyte said it will no longer develop for the BlackBerry platform. "BlackBerry is severely challenged," said Egnyte CEO Vineet Jain in an email to Computerworld. "The future of technology rests in mobile and apps and it is no coincidence that companies are not willing to spend time and money developing apps for the struggling BlackBerry platform."
Even so, BlackBerry is still pitching itself as a premiere security solution.
- BlackBerry pushes BBM Protected for end-to-end encrypted messaging
- Can Microsoft's Windows Phone OS surge in market share?
- HTC One M8 called a good looker and genuine rival to the Galaxy S5
- Smartphone innovation is slowing, so what's next?
- Studies show Sprint and T-Mobile need to expand U.S. coverage
- Gear Fit: Samsung strikes again with its 'build one of any device' plan
- Nokia Lumia Icon on sale Feb. 20 exclusively at Verizon
- Samsung hints at new UI for upcoming Galaxy S5
- How 'Lenovorola' changes the mobile world
- Google and Samsung grow cozier with patent deal, Motorola sale
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- Improve Your Mobile Application Security with IBM Worklight IBM® Worklight helps organizations extend their business across multiple mobile devices. It provides an open, comprehensive and advanced mobile application platform to help...
- Top 3 Iron-Clad Reasons Why File Sync/Share is Not Endpoint Backup Employees unknowingly create corporate data security risks by adopting these easy-to-use, personal applications. Read this executive brief to learn more.
- Security Technologies for Mobile and BYOD With so many security technologies available, how do you sort through the options and pick the solutions that will really work for your...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Mobile Security White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!