Detecting malware on Android devices
BlackBerry Dynamicsapps to detect malware on
Androiddevices and to enforce a compliance action until the malware is removed. For example,
UEMcan prevent all
BlackBerry Dynamicsapps on the device from running until the malicious app is removed from the user’s device.
BlackBerry Dynamicsapps include the
BlackBerry Dynamics SDKand the
CylancePROTECTlibrary. These apps use these technologies to scan the work and personal apps on a user’s
Androiddevice and upload the app files to the CylanceINFINITY cloud service. Whether the scan is initiated by the
UEM Clientor a specific
BlackBerry Dynamicsapp depends on the device activation type and authentication delegate configured in the
CylanceINFINITYuses AI and machine learning to analyze the app package and produce a confidence score that it returns to the
UEM Clientor the
BlackBerry Dynamicsapp. The confidence score indicates whether the app is safe or potentially malicious.
If the device has one or more malicious apps and "Malicious app package detected" is enabled in the compliance profile,
UEMconsiders the device to be out of compliance, and the
BlackBerry Dynamicsapp take the management action that is configured in the user’s compliance profile.
An app is uploaded to
CylanceINFINITYif it has a hash that
CylanceINFINITYhas not processed previously. Whenever an app has a new hash (for example, for a new version) the app is uploaded to
CylanceINFINITYfor analysis and scoring (if it has not already been uploaded from another device).
This feature applies to the
Samsung Knox, MDM controls, and User privacy activation types.