Connect with us

Hi, what are you looking for?


Mobile & Wireless

BlackBerry CSO Talks Enterprise Mobility Management

Any organization that operates a mobile work policy, whether that’s through a Bring Your Own Device (BYOD) or company owned device approach, must consider an enterprise mobility management system. Gartner recently published a Magic Quadrant to help organizations choose which products to consider.

Any organization that operates a mobile work policy, whether that’s through a Bring Your Own Device (BYOD) or company owned device approach, must consider an enterprise mobility management system. Gartner recently published a Magic Quadrant to help organizations choose which products to consider.

“BlackBerry,” said BlackBerry CSO David Kleidermacher in conversation with SecurityWeek, “was named one of the ‘leaders’. That’s not surprising,” he added, “given our acquisition of Good Technology  — the market leader in terms of market share. But there are five other ‘leaders’ in the Quadrant; and purchasers need to be able to select which to adopt.” Here he suggested that buyers turn to an associated Gartner report: Critical Capabilities for High-Security Mobility Management.

This report looks in greater detail at the six ‘leaders’ and 13 other mobility management products. In a blog post last week, Kleidermacher noted that Gartner “gave BlackBerry the highest score in 6 out of 6 use cases in its ‘Critical Capabilities for High-Security Mobility Management’ report, which provides vital guidance to help companies select vendors that offer enterprise mobility management (EMM) solutions.”

Those six categories are High-Security Government Grade; High-Security Commercial; Shared Data; Shared Devices; Nonemployee; and Bring Your Own (BYO). Other high scoring products include Atos, Samsung, MobileIron, Citrix and IBM — but none is as consistent as BlackBerry. 

The BlackBerry product, named Good Secure EMM Suites, merges the features of BlackBerry Enterprise Server (BES12), Good Collaboration Apps, Good Dynamics and WatchDox Enterprise (also acquired by BlackBerry last year). The result is an EMM product that can be used with BlackBerry PRIV, DTEK50, Android and iOS devices; although not all functionality is available for all platforms. One area currently lacking in the product is anti-malware and app reputation support, although these can be provided via third-party applications.

Gartner’s reports are ultimately ‘reputation’ reports that draw on their own expertise and feedback from thousands of users.

For example, the report comments, “Feedback from highly regulated clients indicates that the PRIV is not considered as a substitute for the protection levels of the BB10 platform.”

Advertisement. Scroll to continue reading.

This is reputation, rather than a low-level technical comparative test; and Kleidermacher believes that a lack of adequate mobile security testing standards has led to a generally low level of user confidence. That’s why, he told SecurityWeek, he has launched the new BlackBerry Shield initiative. 

“When we talk to our customers,” he said, “they are concerned that they don’t really know whether all of their defenses can adequately protect them.” There’s a low level of confidence in the field he said. His response was to acquire a professional services firm to which he has added BlackBerry’s own vulnerability testing experts to provide the ‘Shield’ as a service to customers.

“BlackBerry Shield,” he said, “is the check-up,” likening it to getting a medical diagnosis from a doctor. “Within a 90 minutes conversation, Shield reviews 100 controls — technical, administrative and governance — and provides a confidential written report that scores all of the customer’s individual controls.” It’s not in itself the cure, but helps the customer understand the most urgent problems. 

Shield is not a BlackBerry product. It’s a free service that is vendor agnostic.

“It’s our attempt,” said Kleidermacher, “to counter the customers’ lack of confidence and help push the market in the right direction.” It is also, he said, cross-sector. Since different industries have different risks and even risk levels, each assessment for each control is based on a number of different factors including the risk to the customer’s own business. “So someone who does something in a bank might get a red mark, while the same behavior in an SMB might be yellow or green because the risk is different.”

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.