Confirming a user's identity
Michael is the main point of contact for an important project that his team is working on. He regularly fields questions and requests from key stakeholders within the company.
As Michael travels between offices to work with different team members and meet with project contacts, he uses
BlackBerry Workto keep up with his emails. Two weeks ago, Michael’s company implemented
BlackBerry Intelligent Security. His administrator enabled the continuous authentication feature.
As Michael has been using
BlackBerry Intelligent Securityhas been collecting data about how he uses the app, including the physical gestures and the app features that he typically uses.
BlackBerry Intelligent Securityhas used this information to train and develop a model that characterizes how Michael uses
BlackBerry Workon a daily basis.
Michael is currently out of the office attending a conference. While he is having a discussion with a prospective customer, he sets his unlocked
Androiddevice on a table. Malcolm, an employee from a competing company, steals Michael’s device.
Malcolm quickly leaves the conference hall and opens
BlackBerry Workon Michael’s device. He forwards several confidential emails to his own email account.
BlackBerry Intelligent Securityrecognizes this as abnormal behavior that does not fit Michael’s usage model; Michael rarely forwards emails to other people.
BlackBerry Intelligent Securityimmediately triggers a reauthentication request in
BlackBerry Workand all other
BlackBerry Dynamicsapps on Michael’s device are blocked until the correct password or fingerprint is provided.