Promote this Nomination
|Company (that provides the nominated product / solution / service)||BlackBerry|
|Company size (employees)||1,000 to 4,999|
|Type of solution||Software|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
• End-to-end security. Our Zero-Trust architecture uniquely combines an intelligent security architecture with a user experience that requires little to no support from end users or IT admins; a fully frictionless experience with no interruptions – what we like to call the Zero-Touch approach.
For the first time, more than half of all devices connected to the Internet are mobile.2 At the same time, mobile malware is more prevalent than ever, with attacks rising 50% in the last year alone. Mobile Threat Defense (MTD) offers an extra layer of security by preventing, detecting, remediating and improving overall security hygiene for all different levels within an organization’s mobile fleet and applications.
BlackBerry® Protect Mobile is a new MTD solution that extends the powerful AI-based security in BlackBerry® Protect to mobile devices. The solution provides security teams with unprecedented visibility into their mobile, desktop, and server endpoints from a single security console, which is critical during a time when remote workers are being targeted with mobile malware and phishing attacks.
Recent studies have reported that mobile phishing is one of the fastest growing threats and global mobile phishing attempts has increased by almost 40% amid the shift to remote work during the pandemic. A lack of visibility into endpoint activity could result in threats within the infrastructure remaining undetected until it’s too late. In 60% of breaches, attackers compromised organizations within minutes, however on average it took organizations 229 days to identify a malicious attack had occurred.
Built on the BlackBerry Spark® Platform, BlackBerry Protect Mobile leverages BlackBerry’s advanced AI engine to detect attacks before they can execute. It alerts users before opening URLs and visiting spoofing websites designed to mimic legitimate pages to gather confidential or personal information. It does so by detecting mobile malware attacks at the device and application levels to extend protection without the need for human intervention. It identifies security vulnerabilities and potential malicious activities by monitoring system parameters, device configurations, and system libraries at the application level. It also identifies malware from sideloaded applications, and can ensure that applications are only sourced through secure repositories.