Posts tagged with "Zero Trust"



16. October 2020
Mobile Threat Defense
BlackBerry just unveiled BlackBerry® Protect Mobile, a new mobile threat defense (MTD) solution that extends the powerful AI-based security in BlackBerry® Protect to mobile devices. The solution provides security teams with unprecedented visibility into their mobile, desktop, and server endpoints from a single security console, which is critical during a time when remote workers are being targeted with mobile malware and phishing attacks.
14. October 2020
ISEC7 SPHERE
BlackBerry announced BlackBerry® Cyber Suite, the industry’s first, comprehensive, AI-powered unified endpoint security (UES) solution that furthers BlackBerry’s leadership in AI. While other solutions on the market only address parts of the cybersecurity challenge, BlackBerry Cyber Suite delivers security and Zero Trust with a zero touch end-user experience through a single console and offers the end-to-end solution with the broadest set of AI-based security capabilities and visibility...
21. September 2020
ISEC7 SPHERE
BlackBerry® Spark Suites leverage artificial intelligence, machine learning and automation to provide improved cyber threat prevention and remediation, while offering visibility to help you manage all endpoints with the highest level of security. BlackBerry security is trusted by organizations in government, defense, intelligence and other environments with the most stringent security requirements.
16. September 2020
ISEC7 SPHERE
Threats to mobile devices continue to increase in number and complexity as mobile devices become more critical to our everyday lives. What started out as a limited attack surface has grown into a vast landscape of devices. Mobile devices are prime for exploitation by attackers because they provide a quick, all-in-one means to acquire sensitive data from targets. Mobile devices can offer access to user location, contacts, email, texts and instant messaging, as well as encrypted communication...
08. September 2020
ISEC7 SPHERE
The number of devices, users, applications, and services touching workplace resources is increasing exponentially while attackers only need one vulnerability for success. Allowing employees to access sensitive data with tablets, phones, or other mobile devices also offers attackers new avenues for breaching security. The outcome of the traditional approach to cybersecurity is obvious: motivated attackers will find a weak link before an organization secures everything.
31. August 2020
ISEC7 SPHERE
The modern enterprise has an incredible diversity of endpoints accessing their data. This creates a massive attack surface, and as a result, endpoints can easily become the weakest link in your Zero Trust security strategy.