Posts tagged with "BlackBerry"

26. October 2020
Mobile Threat Defense
As a global crisis completely transformed the work environment for the majority of office professionals, the threat landscape changed with it.
16. October 2020
Mobile Threat Defense
BlackBerry just unveiled BlackBerry® Protect Mobile, a new mobile threat defense (MTD) solution that extends the powerful AI-based security in BlackBerry® Protect to mobile devices. The solution provides security teams with unprecedented visibility into their mobile, desktop, and server endpoints from a single security console, which is critical during a time when remote workers are being targeted with mobile malware and phishing attacks.
14. October 2020
BlackBerry announced BlackBerry® Cyber Suite, the industry’s first, comprehensive, AI-powered unified endpoint security (UES) solution that furthers BlackBerry’s leadership in AI. While other solutions on the market only address parts of the cybersecurity challenge, BlackBerry Cyber Suite delivers security and Zero Trust with a zero touch end-user experience through a single console and offers the end-to-end solution with the broadest set of AI-based security capabilities and visibility...
06. October 2020
ISEC7 is proud to announce that BlackBerry awarded the company as BLACKBERRY TOP PARTNER 2020 in three categories and receives the EMERALD status in the NALA and EMEA region.
21. September 2020
BlackBerry® Spark Suites leverage artificial intelligence, machine learning and automation to provide improved cyber threat prevention and remediation, while offering visibility to help you manage all endpoints with the highest level of security. BlackBerry security is trusted by organizations in government, defense, intelligence and other environments with the most stringent security requirements.
16. September 2020
Threats to mobile devices continue to increase in number and complexity as mobile devices become more critical to our everyday lives. What started out as a limited attack surface has grown into a vast landscape of devices. Mobile devices are prime for exploitation by attackers because they provide a quick, all-in-one means to acquire sensitive data from targets. Mobile devices can offer access to user location, contacts, email, texts and instant messaging, as well as encrypted communication...
08. September 2020
The number of devices, users, applications, and services touching workplace resources is increasing exponentially while attackers only need one vulnerability for success. Allowing employees to access sensitive data with tablets, phones, or other mobile devices also offers attackers new avenues for breaching security. The outcome of the traditional approach to cybersecurity is obvious: motivated attackers will find a weak link before an organization secures everything.
03. September 2020
The ability of an organization to sustain its resilience effort requires the organization to understand and develop essential crisis management frameworks and processes. Typically, frameworks will encompass the phases of preparedness, response and recovery. At the preparedness phase, the identification and prioritization of risks that threaten the existence and continuity of an organization’s delivery of critical business functions is essential for the follow up design of incident response...
28. August 2020
Click to open the video
You’re about to be overwhelmed. In the last 12 months alone, over 100 million new pieces of malware were released, costing businesses over $1.5 trillion dollars. Billions of mobile and IoT endpoints were added to corporate networks, dramatically increasing your attack surface.
20. July 2020
Some life changes occur so slowly and incrementally that we scarcely notice them happening. As parents, for example, we only dimly sense the gradual knitting together of neurons that enable our children to progress from crawling to walking. Other life changes occur so suddenly and swiftly that we have little time to fully absorb their implications. Such is the case with the COVID-19 pandemic, which is forcing many organizations to confront critical gaps in their digital workplace strategies and...

Show more