Blackberry Enterprise Solution Security - Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL Overview

Security technical overview
Table of Contents

Advertisement

Security Technical Overview

BlackBerry Enterprise Solution security

The BlackBerry® Enterprise Solution is designed to encrypt data in transit at all points between the BlackBerry device and
the BlackBerry® Enterprise Server to protect your organization from data loss or alteration. Only the BlackBerry Enterprise
Server and the BlackBerry device can access the data that they send between them. If events that threaten the wireless
security of your organization occur, third parties, including wireless service providers, cannot access your organization's
potentially sensitive information in a decrypted format.
The BlackBerry Enterprise Solution uses symmetric key cryptography to encrypt messages and user data that it sends over
the transport layer to provide the following criteria for the security of wired and wireless solutions.
Criteria
confidentiality
integrity
authenticity
Description
The BlackBerry Enterprise Solution uses encryption to make sure that only the intended
message recipients can view the contents of the message.
The BlackBerry Enterprise Solution protects each message that the BlackBerry device
sends with one or more message keys. To prevent third-party decryption or alteration
of the message data, the message keys are designed to consist of random data.
Only the BlackBerry Enterprise Server and the BlackBerry device know the value of
the master encryption key, recognize the format of the decrypted and decompressed
message, and automatically reject a message that is not encrypted with the correct
master encryption key.
The BlackBerry device authenticates itself to the BlackBerry Enterprise Server to prove
that it knows the master encryption key before the BlackBerry Enterprise Server can
send data to the BlackBerry device.
BlackBerry Enterprise Solution security
1
3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise solution devices te

Table of Contents