Security features of the BlackBerry Enterprise Solution

Feature

Description

data protection

The BlackBerry® Enterprise Solution is designed to protect data that is in transit between the BlackBerry® Enterprise Server and a BlackBerry device and data that is in transit between your organization’s messaging server and the email application on a user’s computer. The BlackBerry Enterprise Solution encrypts data that is stored on the device and in the BlackBerry Configuration Database. To help protect data that is stored on the device, you can require a user to authenticate to the device using a password, a smart card, or both.

encryption key protection

The device is designed to protect the encryption keys that are stored on the device. The device encrypts the encryption keys when the device is locked.

control of device connections

The BlackBerry Enterprise Solution is designed to control the following connections:
  • connections using Bluetooth® technology to and from the device
  • connections from a Wi-Fi® enabled device to enterprise Wi-Fi networks

The BlackBerry Enterprise Solution is designed to control which devices can connect to the BlackBerry Enterprise Server.

control of the behavior of the device and BlackBerry® Desktop Software

To control the behavior of the device and BlackBerry Desktop Software, you can send IT administration commands, IT policies, and application control policies to the device. You can use IT administration commands, IT policies, and application control policies to perform the following actions:
  • You can send IT administration commands to lock the device, permanently delete work data, permanently delete user information and application data, and return the device settings to the default values.
  • You can send an IT policy to a device to change security settings. You can use the IT policy to enforce the device password and BlackBerry® Smart Card Reader password.
  • You can send an application control policy to a device to control whether third-party applications are available and can connect to the device and whether third-party applications or add-on applications developed by Research In Motion can access work data.

Was this information helpful? Send us your comments.