Security Market Segment LS
Tuesday, 06 August 2019 01:01

BlackBerry Intelligent Security provides real-time risk analysis


BlackBerry Intelligent Security applies AI to enable more secure endpoint management, according to the company.

Managing device security was pretty much a solved problem until the advent of BYOD (bring your own device), which was "a game changer," BlackBerry director of APJ sales engineering Jonathan Jackson told iTWire.

BYOD led to the development of Good Technology's container technology. This an "incredibly successful" way of managing security across many more devices and many more device types, he said. (BlackBerry acquired Good Technology in 2015.)

But machines are better than people when it comes to managing these diverse environments, Jackson said, so BlackBerry is putting AI into its Spark platform (as foreshadowed when BlackBerry acquired Cylance earlier this year).

AI has an important role to play in providing a balance between security and employee productivity, BlackBerry ANZ managing director David Nicol told iTWire.

This approach allows BlackBerry Intelligent Security to use a combination of contextual and behavioural factors to determine a risk score for each interaction.

The result is increased endpoint security, a better end-user experience, and improved productivity at a reduced cost, Jackson told iTWire.

The first release of Intelligent Security uses behavioural-based location information (primarily the physical location) as the main input, and dials the level of security up and down in response.

Jackson gave the example of a personal banker who might be given unfettered access while in the office, but if they sought access while off-premises, they would be required to reauthenticate (eg, via Touch ID) before continuing. And if they were in a distrusted location (perhaps a foreign country) they could be completely locked out of corporate data.

While other products have some of these features, Internet Security develops "deep insight into how users are consuming data and information on their device" and is able to handle authorisation to apps, device management, and in-flight data protection, he said.

The product works by treating all locations as untrusted at the outset, and during the first weeks of use it learns to trust locations where users successfully authenticates themselves, and will allow access in those places. Attempts to use devices in untrusted locations may be restricted to certain apps or data, or only allowed after (eg) a successful multifactor authentication.

Future releases scheduled for 2019 and 2020 will take into account additional information when calculating the risk score. These include network trustworthiness (a Wi-Fi network used for the first time would be regarded as untrustworthy), time of use (eg, if an employee has only used a device or app during business hours, attempted night time use would be treated with suspicion), and "device and app DNA" (a unique signature developed for each trusted and compliant device, helping to fend off access attempts by rogue or non-compliant devices).

BlackBerry is also considering schemes that would incorporate the way individuals actually use their devices, Jackson said. So if someone habitually opens their email app before anything else, or normally deletes items by swiping left rather than touching the trash button, any deviation would be increase the risk score, potentially triggering reauthentication or other action.

The cloud-based BlackBerry Intelligent Security is the first product to be built on top of BlackBerry Spark. It collects data from other BlackBerry products, including BlackBerry Dynamics and BlackBerry Enterprise Identity apps.

"The increasing velocity and complexity of threats render traditional security models incapable of fully satisfying critical requirements," said BlackBerry president and COO Bryan Palma.

"BlackBerry Intelligent Security's real-world context, machine learning and predictive analytics set a new standard for a zero trust environment, bringing a new level of sophistication to all industries where security is essential."


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



iTWire can help you promote your company, services, and products.


Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.



Recent Comments