Blackberry ENTERPRISE SOLUTION SECURITY - ENTERPRISE SOLUTION - SECURITY TECHNICAL Overview page 4

Table of Contents

Advertisement

BlackBerry Enterprise Solution
Enforcing BlackBerry device and BlackBerry Desktop Software security ................................................55
Protecting Bluetooth connections on BlackBerry devices ..........................................................................56
Controlling location-based services on the BlackBerry device.................................................................. 57
Protecting the BlackBerry device against malware .....................................................................................58
Protecting lost, stolen, or replaced BlackBerry devices................................................................................... 61
Types of remote BlackBerry device wipes......................................................................................................62
unavailable ..........................................................................................................................................................63
Remotely resetting a BlackBerry device to factory default settings .........................................................64
(standard security wipe) ...................................................................................................................................64
Unbinding the smart card from the BlackBerry device ...............................................................................65
Related resources.................................................................................................................................................. 66
Appendix A: RIM Crypto API Interface .............................................................................................................. 69
Cryptographic functionality that the RIM Crypto API provides................................................................ 69
Appendix B: TLS and WTLS standards that the RIM Crypto API supports.................................................... 72
Symmetric algorithms that the RIM Crypto API supports........................................................................... 73
Hash algorithms that the RIM Crypto API supports .................................................................................... 73
Appendix C: Previous version of wired master encryption key generation.................................................. 74
Previous version of wired master encryption key generation process...................................................... 74
Appendix D: BlackBerry device wipe process.................................................................................................... 75
Memory scrub process for RAM on BlackBerry devices............................................................................... 75
Memory scrub process for flash memory on BlackBerry devices...............................................................76
Masking operation process that the AES implementation uses when content protection is turned off78
Appendix G: BlackBerry Router protocol ...........................................................................................................80
©
2009 Research In Motion Limited. All rights reserved.
www.blackberry.com

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise server 4.1

Table of Contents