You've requested...

Share this with your colleagues:

Download this next:

Beyond dashboards: The future of actionable analytics

While dashboards powered much of the last stage in BI and analytics growth, applications and widgets are powering the next.

This next chapter in the growth of self-service data science will be defined by embedded, customizable experiences.

Access this white paper to learn how you can turn complex data into actionable analytic applications and take advantage of self-service, highly-portable analytics widgets.

These are also closely related to: "BlackBerry Widget SDK Beta"

  • Zero trust meets zero touch: Blackberry Spark Suite

    Organizations are struggling to deal with a rising number of security vendors, consoles, and alerts — and spending more resources responding to breaches.

    By bringing order to the chaos with intelligent security and management, BlackBerry Spark Suite delivers Zero Trust security with frictionless zero touch productivity.

    View this solution brief to learn about the benefits and key capabilities of BlackBerry Spark Suite.

  • MITRE ATT&CK evaluation: How did BlackBerry do?

    The MITRE ATT&CK framework is renowned for being a global knowledge base of common cyberthreat tactics and techniques – collected from real-world experiences to help organizations protect their own environments.

    Complimentary to the framework are the MITRE ATT&CK evaluations, which offer unbiased insight into how vendors fare against certain threat techniques.

    This report contains BlackBerry’s analysis and interpretation of MITRE ATT&CK APT29 evaluation data – read on to see how BlackBerry fared against this threat.

Find more content like what you just read:

  • Events and Issues impacting cybersecurity in 2021

    Access this BlackBerry 2021 Threat Report to examine the biggest cybersecurity events of last year and the security issues likely to affect the upcoming year.

    Download

  • Gartner: A perspective on Android 2.2 for the enterprise

    With the announcement of Android 2.2, code named "Froyo," Google targets the enterprise market for the first time. This release has features to enable devices that can be granted support under the "appliance level" of the Gartner Managed Diversity Framework.

    Download

  • Essential Guide to Threat Management

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

    Download

  • Choosing the right methodology for your embedded analytics project

    Embedding analytics is a popular way to spear insight across your business, but there are a variety of approaches available when it comes to actually creating embedded analytics. Watch this webinar to learn which approach is the right one for your use case, whether you’re creating a static model, an interactive dashboard, or something else.

    Download

  • AI-driven zero-trust security

    Today’s organizations are moving closer and closer to a zero-trust model, but with the power of AI, security operations centers can find even more context behind potential threats and incidents. BlackBerry’s Cyber Suite uses both, giving businesses a full spectrum of coverage, managed from a single console. Access this data sheet to learn more.

    Download

  • Endpoint protection & threat management: Reece Group case study

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

    Download

  • MITRE ATT&CK Evaluations: Common questions answered

    In this panelist discussion, join a quartet of cybersecurity experts from BlackBerry and AttackIQ as they provide expert insight and guidance related to MITRE ATT&CK Evaluations and the potential benefits they can yield. Watch now to get started.

    Download

  • Prevent Ransomware with Blackberry Cylance

    Download this solution brief to learn about BlackBerry Cylance's native AI platform that can help organizations minimize the risks of a ransomware breach by transitioning from a reactive to a prevention first security posture.

    Download

  • Cybersecurity in the public sector: Where to?

    If you’re working in the public sector in Australia, look at this in-depth report about the state of cybersecurity on the continent, presented by Blackberry. It details key findings, presents critical themes for a rock-solid cybersecurity strategy and outlines the ‘Essential Eight’ Maturity Model for security technology.

    Download

  • Ransomware, technology, and healthcare trends

    The typical healthcare environment is a perfect storm of vulnerabilities, making it attractive to ransomware attacks. In this white paper, learn how BlackBerry Cylance helps strengthen cybersecurity in healthcare organizations with a prevention-first, predictive security approach.

    Download

  • From zero trust to zero touch: BlackBerry Cyber Suite

    In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.

    Download

  • Work securely from anywhere: BlackBerry video

    According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.

    Download

  • Technical Guide on Mobile Security

    Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.

    Download

  • MITRE ATT&CK: Security evaluation overview

    MITRE ATT&CK offers an unbiased, detection-based evaluation designed to provide organizations with insights and information regarding their vulnerabilities – it’s not a competitive analysis with winners, scores or ranking. Watch this webinar, which features 2 BlackBerry experts, for a comprehensive overview of MITRE ATT&CK Evaluations.

    Download

  • Mobile Device Management Technical Guide

    In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.

    Download

  • Achieving cyber resilience with BlackBerry Security Services

    Learn how BlackBerry Security Services can provide you with a comprehensive analysis of your cyber risk exposure with a Compromise Assessment (CA).

    Download

  • Satellite Healthcare take on cybersecurity with Blackberry Cylance

    In this case study learn how BlackBerry Cylance was able to help Satellite Healthcare meet their security requirements and ensure uninterrupted access to electronic medical record (EMR) and clinical desktop systems healthcare professionals rely upon to provide quality care.

    Download

  • Tablets & Smartphones in the Enterprise

    Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend.

    Download

  • Return to work safely: BlackBerry's post-COVID plan

    This white paper provides an in-depth look at BlackBerry AtHoc, a crisis incident communications platform designed to help organizations communicate, collaborate and react decisively to any incident, event or emergency situation

    Download

  • Information Security Magazine - May 2012

    Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.

    Download

  • Expert Tips for Managing Mobile Devices in the Enterprise

    Get expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management.

    Download

  • Expert Tips on Getting Mobile Securely with Virtual Desktops

    In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.

    Download

  • BYOD Security: How to Remotely Wipe iPhone and Android Devices

    In this expert e-guide, explore the need for remote data wipe on top of mandatory PINs and passwords to ensure optimum data protection in this BYOD age. Click now to get started!

    Download

  • Enterprise Device Management: A Brave New World

    Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.

    Download

  • BYOD Policies: Key Steps to Ensure Success

    This expert E-Guide unveils the top risks inherent to BYOD and offers guidance in creating and enforcing a successful BYOD policy to ensure your enterprise remains safe and under control despite the challenges consumer-based devices bring to the workplace.

    Download

  • Enterprise CIO Decisions: Managing the Mobile Workforce

    Read this exclusive CIO Enterprise Decisions E-Zine for case studies and expert insight into some of the most prevalent mobile issues facing CIOs today.

    Download

  • IT in Europe - May 2012

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

    Download

  • IT in Europe: Taking control of smartphones: Are MDMs up to the task?

    In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.

    Download

  • Best Practices for Mobile Device Management

    This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.

    Download

  • Mobile Device Data Protection: Key Findings and Players in the Market

    This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.

    Download

  • Managing Mobile Application Security in the BYO Device Era

    Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!

    Download

  • Mobile Device Security Overview

    This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.

    Download

  • Securing today’s BYO devices & remote workers

    The recent boom in remote workers has led to a subsequent rise in the use of personal phones, laptops and tables – also known as Bring Your Own (BYO) devices. This white paper provides exclusive insight into solving the key security challenges related to BYO device programs – read on to get started.

    Download

  • CIO Need-to-Know : Making Smart Decisions About Mobile Device Management

    This expert resource uncovers some of the most important considerations surrounding mobile device management (MDM) today. Inside, learn how CIOs can leverage mobility to increase business agility, reduce costs, and improve productivity and employee flexibility.

    Download

  • Future Proofing Mobile Device Management

    This expert E-Guide discusses best practices for future proofing your mobile device management.

    Download

  • Mobile Device Management Checklist

    This expert E-Guide highlights a mobile device management checklist to consider when developing your own mobile device management strategy.

    Download

  • Mobile working in business - the facts.

    The tech chasm that has allegedly formed in the workforce created by a cross-generational 1divide  – between those who grew-up with technology and those that didn’t – is vastly overstated.

    Download

  • Choosing & Managing Mobile Devices - Ch.1: Avoiding Challenges in Mobile Device Management

    The rapidly evolving BYOD trend is making management strategies harder and harder to follow through on. Read this expert whitepaper to examine the critical data security and employee-related challenges IT faces with attempting to manage mobile devices.

    Download

  • Choosing and Managing Mobile Devices - Chapter 1: Addressing Challenges in Mobile Device Management

    This expert ebook examines some critical data security and employee-related challenges you will inevitably face when attempting to manage mobile devices. Read on and learn how to overcome these challenges and streamline your mobile device management.

    Download

  • The cybersecurity threats in telemedicine

    The recent spread of COVID-19 has created a surge in demand for increasingly popular telemedicine services. Unfortunately, cybercriminals caught wind of this lucrative new vector, putting practitioners and patients at risk. Download this white paper for an overview of the cybersecurity risks in telemedicine and how to overcome them.

    Download

  • Advanced mobile device management software capabilities to consider

    In this expert guide, learn what capabilities you should look for in a software solution that can help ensure successful deployment and management of mobile devices within your enterprise.

    Download

  • Security risks that can affect your industry

    As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.

    Download

  • E-Guide: Physical Security Awareness and Smartphone Security Policy

    In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.

    Download

  • Mobile banking strategies - maximise your revenues

    Juniper Research defines mobile banking as  “the provision of banking services to customers on their mobile devices”: specifically we mean in the vast majority of instances “the operation of bank current and deposit or savings accounts”.

    Download

  • Smartphones: Computer Weekly Buyer's Guide

    The smartphone has transformed communication between mobile workers and their offices but at a cost.

    Download

  • New CRM Technologies bring sales success to businesses

    In [this expert e-guide], read about how one emergency response software company integrated a CRM platform, resulting in major time-saving efficiencies – most importantly, an improved process that enables the company to sell product licensing. Also read about a lumber executive who recently bought into a successful social CRM.

    Download

  • Mobile device controls: MDM security features vs. mobile native security

    When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.

    Download