Skip Navigation

Adapting device behavior in a high-risk scenario

Jane Smith arrives at the airport for a business trip. She uses her work device, an 
iPhone
, to access the airport's free 
Wi-Fi
 network.
The 
BlackBerry Dynamics
 apps on Jane’s 
iPhone
 send data to the 
BlackBerry Intelligent Security
 services indicating that she is on a less secure network and that she is in a location that is far away from her typical learned location for that day and time. The services calculate a high behavioral risk level and a high geozone risk level and communicate these assessments to Jane's work apps, the 
BlackBerry Intelligent Security Analytics Portal
, and 
UEM
. The 
BlackBerry Intelligent Security
 policy that is applied to Jane’s device takes effect, assigning Jane to a group with more restrictive device policies and profiles to ensure a higher level of security while Jane is at the airport.
When the new group configuration is applied to Jane’s 
iPhone
, she notices the following changes:
  • When she tries to log in to work apps and services, she must provide both a 
    UEM
     password and complete 
    BlackBerry 2FA
     authentication.
  • The 
    iPhone
     camera is temporarily disabled.
  • Bluetooth
     functionality is temporarily disabled.
  • Her access to the company's intranet websites is currently restricted.
  • Data synchronization to work apps, such as 
    BlackBerry Work
    , occurs less frequently. 
The new group assignment with these high-security device behaviors remains in place until Jane’s behavioral and geozone risk level is recalculated and reduced. When she has a lower risk level, 
BlackBerry Intelligent Security
 will reassign her to a group that corresponds to the new risk level.