Like Apple, which is constantly improving and strengthening security on its devices, Blackberry is following suit and not relenting in any way to beef up security on its product.
The global software leader which recently introduced DTEK50,branded as ‘world’s most secure’ phone has sealed an agreement with a California based mobile security and threats management platform, Zimperium,to offer to its enterprise and government customers a comprehensive mobile threat detection, risk analysis and prevention for all its devices.
According to the Chief Security Officer at BlackBerry, Dave Kleidermacher, the latest move is another way the phone maker is working harder to secure, connect and mobilize the enterprise.
Shedding more light on the security application, Kleidermacher said Zimperium’s zIPS integrates with BlackBerry’s good dynamics secure mobility platform and BlackBerry Enterprise Server,BES12, which is part of the good secure Enterprise Mobility Management,EMM, Suites from BlackBerry.
He added that Good Dynamics and BES12 integrated with Zimperium zIPS ,offer comprehensive threat detection, visibility and protection against network, device and application mobile attacks on corporate applications and data.
To the Chief Executive Officer of Zimperium,Shridhar Mittal, most enterprises now take the protection of valuable data as their priority so as to keep their information away from intruders.
Explaining further how the innovation works,Mittal added that “The zIPS solution continuously monitors the behavior of an underlying operating system in mobile devices in real time. It detects anomalies within a system’s Central Processing Unit, memory and thousands of other parameters to automatically determine normal and malicious behavior. Once a deviation is identified to be malicious, the device reports the attack and extensive details about the threat. This enables immediate remediation through the BlackBerry EMM controls and policies, which allows for auto-responses to remotely lock or wipe containerized applications on a compromised device”