Skip Navigation

Key features for all device types

Activate devices
When a user activates a device, they associate it with
and your organization's environment so that they can access work data on the device. Users can activate their devices using a QR code or their email address and an activation password.
You can allow users to activate devices themselves or you can activate devices for users and then distribute them. All device types can be activated over the wireless network.
Manage devices
You can view all devices and access all management tasks in a single, web-based console. You can manage multiple devices for each user account and view the device inventory for your organization. You can perform the following actions if they are supported by the device:
  • Lock the device, change the device or work space password, or delete information from the device.
  • Connect the device securely to your organization's mail environment, using
    Microsoft Exchange ActiveSync
    for email and calendar support.
  • Control how the device can connect to your organization's network, including
    and VPN settings.
  • Configure single sign-on for the device so that it authenticates automatically with domains and web services in your organization's network.
  • Control the capabilities of the device, such as setting rules for password strength and disabling functions like the camera.
  • Manage app availability on the device, including specifying app versions and whether apps are required or optional.
  • Search app stores directly for apps to assign to devices.
  • Install certificates on the device and optionally configure SCEP to permit automatic certificate enrollment.
  • Extend email security using S/MIME or PGP.
Manage groups of users, apps, and devices
Groups simplify the management of users, apps, and devices. You can use groups to apply the same configuration settings to similar user accounts or similar devices. You can assign different groups of apps to different groups of users, and a user can be a member of several groups.
Control which devices can access
Microsoft Exchange ActiveSync
You can use gatekeeping to ensure that only devices managed by
can access work email and other information on the device and meet your organization's security policy.
Control how devices connect to your organization's resources
You can use an enterprise connectivity profile to control how apps on devices connect to your organization’s resources. When you enable enterprise connectivity, you avoid opening multiple ports in your organization's firewall to the Internet for device management and third-party applications such as the mail server, certification authority, and other web servers or content servers. Enterprise connectivity sends all traffic through the
BlackBerry Infrastructure
on port 3101.
Manage work apps
On all managed devices, work apps are apps that your organization makes available for its users.
You can search the app stores directly for apps to assign to devices. You can specify whether apps are required on devices, and you can view whether a work app is installed on a device. Work apps can also be proprietary apps that were developed by your organization or by third-party developers for your organization's use.
Enforce your organization's device requirements
You can use a compliance profile to help enforce your organization's security requirements, such as not permitting access to work data for devices that are jailbroken, rooted, or have an integrity alert, or requiring that certain apps be installed on devices. You can send a notification to users to ask them to meet your organization's requirements, or you can limit users' access to your organization's resources and applications, delete work data, or delete all data on the device.
Send an email to users
You can send an email to multiple users directly from the management console.
Create or import many user accounts with a .csv file
You can import a .csv file into
to create or import many user accounts at once. Depending on your requirements, you can also specify group membership and activation settings for the user accounts in the .csv file.
View reports of user and device information
The reporting dashboard displays an overview of your
environment. For example, you can view the number of devices in your organization sorted by service provider. You can view details about users and devices, export the information to a .csv file, and access user accounts from the dashboard.
High availability and disaster recovery
data centers are located around the world and are designed to provide high availability and disaster recovery.
data centers provide secure physical access to buildings, monitoring, and hardware redundancies to help protect your organization’s data from natural disasters.
data centers have disaster recovery plans for service outages. The plans are designed to have minimal impact on device users and ensure business continuity. Data and apps are backed up in near real time to avoid data loss.
Certificate-based authentication
You can send certificates to devices using certificate profiles. These profiles help to restrict access to
Microsoft Exchange ActiveSync
connections, or VPN connections to devices that use certificate-based authentication.
Manage licenses for specific features and device controls
You can manage licenses and view detailed information for each license type, such as usage and expiration. The license types that your organization uses determine the devices and features that you can manage. You must activate licenses before you can activate devices. Free trials are available so that you can try out the service.