Skip Navigation

Adapting device behavior in a low-risk scenario

Bob Jones arrives at his company’s main office to attend a lengthy board meeting. He checks his 
Android
 phone during the meeting to make sure that he doesn’t miss any important emails. His phone is using the trusted, secure work network.
The 
BlackBerry Dynamics
 apps on Bob’s 
Android
 device send data to the 
BlackBerry Intelligent Security
 services indicating that he is on a secure network and in a physical location that is typical for the current day and time. The services calculate a low behavioral risk level and geozone risk level and communicate these assessments to Bob's work apps, the 
BlackBerry Intelligent Security Analytics Portal
, and 
UEM
. The 
BlackBerry Intelligent Security
 policy that is applied to Bob’s device takes effect and assigns Bob to a group with less restrictive device policies and profiles to ensure easy access to work resources in a highly secure location.
When the new group configuration is applied to Bob’s phone, he notices the following changes:
  • He can use fingerprint authentication to access work apps.
  • He is prompted to authenticate with work apps less frequently.
  • When he browses to intranet websites, he is automatically authenticated and is not prompted for his username and password.
  • He can access privileged apps that he is not able to log in to when he is out of the office. 
When Bob leaves the office later that evening to go home, his device sends data to 
BlackBerry Intelligent Security
 that results in a new behavioral risk level and a new geozone risk level, with corresponding assignments to groups with profiles and permissions that are appropriate for that risk level.