BlackBerry Cyber
Photo Gallery
BlackBerry Cyber
Additional Info
Company | BlackBerry |
Website | https://www.BlackBerry.com |
Company size (employees) | 1,000 to 4,999 |
Overview
For the first time, more than half of all devices connected to the Internet are mobile.2 At the same time, mobile malware is more prevalent than ever, with attacks rising 50% in the last year alone. Mobile Threat Defense (MTD) offers an extra layer of security by preventing, detecting, remediating and improving overall security hygiene for all different levels within an organization’s mobile fleet and applications.
BlackBerry® Protect Mobile is a new MTD solution that extends the powerful AI-based security in BlackBerry® Protect to mobile devices. The solution provides security teams with unprecedented visibility into their mobile, desktop, and server endpoints from a single security console, which is critical during a time when remote workers are being targeted with mobile malware and phishing attacks.
Recent studies have reported that mobile phishing is one of the fastest growing threats and global mobile phishing attempts has increased by almost 40% amid the shift to remote work during the pandemic. A lack of visibility into endpoint activity could result in threats within the infrastructure remaining undetected until it’s too late. In 60% of breaches, attackers compromised organizations within minutes, however on average it took organizations 229 days to identify a malicious attack had occurred.
Built on the BlackBerry Spark® Platform, BlackBerry Protect Mobile leverages BlackBerry’s advanced AI engine to detect attacks before they can execute. It alerts users before opening URLs and visiting spoofing websites designed to mimic legitimate pages to gather confidential or personal information. It does so by detecting mobile malware attacks at the device and application levels to extend protection without the need for human intervention. It identifies security vulnerabilities and potential malicious activities by monitoring system parameters, device configurations, and system libraries at the application level. It also identifies malware from sideloaded applications, and can ensure that applications are only sourced through secure repositories.
How we are different
• End-to-end security. Our Zero-Trust architecture uniquely combines an intelligent security architecture with a user experience that requires little to no support from end users or IT admins; a fully frictionless experience with no interruptions – what we like to call the Zero-Touch approach.
• Endpoint experience. Our software is in over 500 million endpoints today, including automobiles, mobile devices, PCs, servers and IoT endpoints. Being on so many connected endpoints means we really understand how to both connect and protect these endpoints.
• AI – focused. BlackBerry trains our AI models against data lakes containing billions of files, good and bad, so that it learns to autonomously convict, or not convict files, pre-execution. The result of this massive, ongoing training effort is a proven track record of blocking payloads attempting to exploit zero-day threats for up to two years into the future – unprecedented in the industry