Skip Navigation

Confirming a user's identity

Michael is the main point of contact for an important project that his team is working on. He regularly fields questions and requests from key stakeholders within the company.
As Michael travels between offices to work with different team members and meet with project contacts, he uses 
BlackBerry Work
 to keep up with his emails. Two weeks ago, Michael’s company implemented 
BlackBerry Intelligent Security
. His administrator enabled the continuous authentication feature.
As Michael has been using 
BlackBerry Work
BlackBerry Intelligent Security
 has been collecting data about how he uses the app, including the physical gestures and the app features that he typically uses. 
BlackBerry Intelligent Security
 has used this information to train and develop a model that characterizes how Michael uses 
BlackBerry Work
 on a daily basis.
Michael is currently out of the office attending a conference. While he is having a discussion with a prospective customer, he sets his unlocked 
Android
 device on a table. Malcolm, an employee from a competing company, steals Michael’s device.
Malcolm quickly leaves the conference hall and opens 
BlackBerry Work
 on Michael’s device. He forwards several confidential emails to his own email account. 
BlackBerry Intelligent Security
 recognizes this as abnormal behavior that does not fit Michael’s usage model; Michael rarely forwards emails to other people. 
BlackBerry Intelligent Security
 immediately triggers a reauthentication request in 
BlackBerry Work
BlackBerry Work
 and all other 
BlackBerry Dynamics
 apps on Michael’s device are blocked until the correct password or fingerprint is provided.