enterprise

Turn your employees into human security sensors: Qognify launches Qognify Extend

situational awareness Qognify has launched a range of integrated mobile solutions with which organisations can enhance situational awareness by harnessing field resources and responders. Cloud-based and powered by CloudScann, Qognify Extend effectively extends the reach, coverage and effectiveness of the control room by turning personnel and their smartphones into human sensors. Qognify Extend integrates with Qognify Situator, an open platform, situation management solution, and VisionHub, Qognify s video management system.

It also works as a standalone solution. Qognify Extend triggers incidents automatically in Situator, including textual, visual and geographic information captured by a smartphone. Features Advanced GIS capabilities display map location Video feed from surveillance cameras in area will pop-up and an adaptive response plan , based on organisation s best practices, guides operator actions Connectivity to VisionHub and Qognify s video analytics suite enhances automatic information analysis and takes effective action eg through apprehension of a suspect through Suspect Search. Qognify Extend modules SeeItSendIt: Field personnel can report into control room with their smartphones Live Video Broadcast: Personnel can broadcast live video directly to control room Dispatch : provides operators with simple Computer Aided Dispatch (CAD) functionality, including locating closest guard, suggesting best route to the incident, sending notifications and comments to guards mobile phones. Personal Safety: Personal security features include monitoring an individual s progress along a route, immediate report of distress situations via a panic button, and raising an alert for any failure to arrive safely Qognify VICC (Visual Intelligence Command Center) a desktop application that collects and aggregates information from various mobile applications, presenting it on a map Qognify and CloudScann say We re proud to partner with Qognify, the leader in Situation Management, said Dan Kerning, CEO of CloudScann, a specialist in crowdsourcing, human intelligence and data mining for the enterprise market. . extending to the field is firstly about collecting invaluable information, yet the trick is establishing the link to the control room, and providing a new layer of data and intelligence, allowing operators to act faster to resolve them. Says Moti Shabtai, CEO and president of Qognify: The ubiquitous nature of smartphones together with their range of capabilities, makes them an ideal tool to leverage for improving security, safety and operations. Bringing these into Situator and VisionHub is a no-brainer, as it s the Qognify vision is to provide as many sources of information as possible- smartly. With Qognify Extend, organisations can literally extend coverage, turning personnel and their mobile phones into smart sensors.

Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

Paxton releases new interface for net10 integrated building intelligence system now rebranded to Paxton10

Paxton Releases New Interface For Net10 Integrated Building Intelligence System   Now Rebranded To Paxton10

Paxton has released the latest software upgrade for net10, the integrated building intelligence system now also reincarnated as Paxton10. The software update includes a new user interface and additional features that Paxton says make the system simpler and more intuitive to navigate for both installers and system operators. Features added in the latest software update include: System health information: offline devices can be identified on the homepage System activity: access events can previewed over the last week in a simple table Access levels: give users more than one access level and add software and building permissions to a user s record Launched as net10 in the UK in early 2016, Paxton10 is a fully integrated building intelligence system that delivers out of the box access control, IP video management and building automation.

It interfaces with existing building infrastructure to control lighting, heating, air conditioning, and intruder and fire alarms. Paxton10 is pitched at both the enterprise-level market and small- to mid-size projects, including offices, hospitals and education facilities, from primary schools to university campuses. Paxton10 works in conjunction with a wide range of IP cameras to accommodate live viewing and video footage capture and recording. embedded content We are pleased to be able to offer our customers an improved user experience with this new software update, says Gareth O Hara, Paxton s sales and marketing director. However, we also want both new and existing customers to recognise our single platform, integrated solution as a Paxton product, the benefits this brings and we felt the best way to achieve this was by rebranding to Paxton10.

2017 is set to be a big year of development for Paxton10 with many incremental features set to be released, ensuring the system offers cutting edge technology to future-proof our customers businesses and the sites where it is installed. When the software update is complete, the net10 URL will auto replace to Paxton10 and the net10 URL will no longer be valid. Paxton10 also comes with more environmentally sustainable packaging.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Security Risk Consulting

/ home1 / services2 / security risk3 / security risk consulting4

Control Risks provides security professionals to help our clients understand and treat their security risks. This may be in support of a project, period of change, expansion, or to address a specific security need. Our security design team also helps integrate security measures into building designs.

Using an industry-leading risk methodology, our consultancy approach is delivered by an experienced and diverse consulting team, supported by our analysts, investigators, instructors and others as needed. For more prolonged projects, Control Risks embeds consultants in client businesses to occupy management, analysis or internal consultancy posts.

As well as programmed consultancy, our security risk consultants provide specialist advice to senior managers faced with highly complex and sensitive issues. Security risk consultants work with all types of Control Risks clients, from governments, NGOs and multinationals through medium to small business and private individuals. Strategic security consulting identifies and examines threats and risks to clients and ensures their mitigation strategy is appropriately focused and resourced. We work with senior managers, security directors, CEOs, and others to ensure that security resources are aligned to meet core business aims. This often starts with a strategic security risk assessment before developing the executive security directive. Control Risks can assist with the production of corporate policies and standards or security schemes and delivery plans for the enterprise.

Security management consultancy is focused on people and implementation. It includes assessing security management, outsourced providers, and operational planning and implementation. Control Risks can advise security managers in many areas: guard force or security systems procurement, development of operational processes, or testing and assurance. By embedding a consultant, Control Risks can provide clients with extra capacity for a specific need or to push through change. Operational security consultancy works on the frontline of security delivery at the site or security team level. It will often involve personnel, operational and technical security elements. It balances different security measures human, process, physical, and technical to ensure that security meets business needs. By reviewing a security team or physical asset, Control Risks can ensure there are no gaps in security delivery. Our consultants also test existing security measures using a blend of intrusion testing, social engineering, competency reviews, and technical security sweeps to ensure that security is effective and applied appropriately.

For more information on our security consulting services please contact us5.

References

  1. ^ home (www.controlrisks.com)
  2. ^ services (www.controlrisks.com)
  3. ^ security risk (www.controlrisks.com)
  4. ^ security risk consulting (www.controlrisks.com)
  5. ^ contact us (www.controlrisks.com)

Genetec: profile of the software pioneer behind Security Center

Genetec: Profile Of The Software Pioneer Behind Security Center

Genetec is one of the security industry s most innovative players. IFSEC Global presents the essential guide to this pioneer in software for IP video surveillance, access control and other security systems, most notably Security Center, Genetec s unified security platform. A history of Genetec Canadian video management system (VMS) company Genetec was founded in Montreal in 1997 as a software research and development company and now employs more than 600 people in one form or another.

It built one of the first security systems to use the IP protocol in the late 1990s before extending its portfolio to networked cameras and IP video surveillance systems and, more recently, access control and licence plate recognition (LPR) applications.

2010 saw Genetec acquire French software company Sipelia, which added European customised consulting and engineering capabilities and an interactive map-based command and control application, plan manager. embedded content Market position and strategy Genetec plays primarily in physical security and public safety markets, with key verticals being urban CCTV, transportation, education, retail, government and law/parking enforcement. Customers range from Avis Budget Group to the City of Calgary and the University of Brussels and Genetec s safety-critical video surveillance systems are used by some of the world s busiest airports, largest retailers, and many Fortune 500 businesses. The company is consistently ranked as one of the top two global VMS suppliers (alongside Milestone Systems) in a list compiled each year by IMS Research. The analyst firm calculates the VMS market is showing consistent double digit percentage growth and will be worth in excess of US$2.7bn by 2019. As a privately held company Genetec does not report its financials but was ranked in Deloitte s Technology Fast 500 listing in 2007, an index that requires operating revenue of at least five million US or Canadian dollars. Genetec s go-to market strategy is heavily focused on resellers and partners rather than direct sales, with the majority of its own staff engaged in research and development activity, field engineering, support and project management. It has created an extensive reseller community backed by a tiered certification programme for hardware/software companies and third party security consultancies. Technology partners receive support and integration assistance for Genetec applications and services.

Current participants include camera manufacturers (Axis Communications, Bosch, Canon, JVC, Lumerera, Panasonic, Sony); access control providers (ASSA ABLOY, Mercury Security, Stanley Security); network and storage infrastructure companies (Avaya, Dell, EMC, HP, IBM, NEC); video analytics software developers (Cognimatics, Davantis, Digisensory); IoT platform providers (Kontron, Sensity Systems) and a host of specialist IP video power, sensor, decoding and DVR companies. embedded content Genetec s open relies partly on the distribution of software development kits (SDKs) that allow both its hardware/software partners and customers to integrate video access control and LPR data feeds from Genetec Security Center into their own applications, including building (BMS) and human resource management systems (HRMS), enterprise resource planning (ERP) platforms, intrusion and fire detection panels and external visitor management software. Latest technologies Multiple platforms are provided but Genetec s core product is Security Center , a single, unified application suite that integrates IP video surveillance, access control and LPR software targeted at small to medium (SMB) and enterprise scale businesses in 80 countries worldwide. All three applications are available as standalone applications to maximise sales. Omnicast is the IP video surveillance system of Genetec s unified security platform available in different versions to suit businesses of different sizes standard (under 50 cameras), Pro (under 100) and Enterprise (over 100) versions. There is also a low cost SMB version called SV-16 licensed for 16 or less IP cameras. embedded content Based on open architecture, Omnicast is flexible enough to allow customers to choose their own hardware and utilise their existing network infrastructure, maximising its potential install base to include clients that do not want to engage in root and branch system upgrades of existing networks or camera deployments. Omincast s map feature also allows individuals to be easily pinpointed to enable easier management and time sensitive monitoring. AutoVu offers ANPR/LPR capabilities such as capture of parallel, stationary and moving vehicles travelling at speeds up to 140Mph, providing fixed and mobile installations and international number plate recognition that can be configured to send alerts if predefined registrations are spotted.

Synergis delivers the access control software, with standard, pro and enterprise versions again licensed for varying numbers of door and access points, card readers and alarms to accommodate different sizes of business. All three applications are unified under Security Center to deliver a single point of monitoring, control and management, with a larger scale Federation version scaling to tens of thousands of IP connected cameras, doors, servers and client workstations spanning multiple sites. Genetec has a video analytics software, Metadata Engine, that indexes data from multiple sources associated with the other applications to assist with the configuration of alerts triggered by a precise set of circumstances. Genetec has shown a degree of innovation in the launch of its Stratocast video surveillance as a service (VSaaS) proposition, a cloud hosted platform built on Microsoft Azure which is designed to lower VMS provision costs through on-demand, pay as you go pricing instead of on-premise licensed software fees. It is also partnering Sensity Systems in the development of an internet of things (IoT)-orientated public safety and security solution for advanced urban surveillance in city centres, airports and shopping malls. The application incorporates cameras, WiFi enabled LED lights, VMS and intelligent analytics to store and process footage at the network edge rather than transmitting it back to central servers or monitoring stations to reduce storage and staff costs. Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

How mall security guards saved a family’s Christmas : Crime Blotter

Posted on | December 26, 2012 | Comments

Jump to Link in Article

Crime Blotter usually deals with bad news, but a reader recently submitted a news tip about a bad situation that turned out very well thanks to the generosity of some mall employees.

A woman came into the security office at Ontario Mills mall with her children, ages 1 and 5, in tow.

In tears, the woman said she had just lost her purse with all her Christmas money in there.

A week later, eight security guards from Ontario Mills knocked on the woman s door. They delivered more than $300 in gifts for the woman and her children, money that came out of the security guards own pockets.

She was a stranger and yet their one random act of kindness will make her like family. Happy Holidays!

The Press-Enterprise reader wrote.

We re sure that helping someone in that manner made the security guards holiday as well.

By Brian Rokos

Comments

PE.com is now using Facebook Comments. Comments are subject to Facebook’s Privacy Policy1 and Terms of Service2 on data use. If you don’t want your comment to appear on Facebook, uncheck the ‘Post to Facebook’ box.

To find out more, read the FAQ3.

References

  1. ^ Privacy Policy (www.facebook.com)
  2. ^ Terms of Service (www.facebook.com)
  3. ^ read the FAQ (www.pe.com)

Blackberry security: How to ensure your Blackberry device is secure

One area of concern for Smartphone users is the security. There have been several reports of smartphone security breaches and this has raised concerns for mobile phone security. How has the Blackberry remained the most secure smartphone?

What are some Blackberry security tips to keep your Blackberry device secure at all times?

Security comparisons of the different smartphones have revealed that the Blackberry is the most secure smartphone in use today. Blackberry security is essential to the product s success over the years as government agencies and corporate organizations have recognized this and have adopted the Blackberry as their mobile smartphone device. So today I am going to look at the various ways you can ensure your Blackberry s security.

Whether you are using the Blackberry smartphone for professional or personal purposes, security measures should always be put in place to secure your personal data from being stolen.

Blackberry security

Data Encryption: As much as emails sent via Blackberry Enterprise Server (BES) is encrypted with an end-to-end security protocol that is completely independent of public certificate authority system, you should ensure even a greater level of encryption on your Blackberry device to secure data stored on your device or memory card. This will make it impossible to interpret your data if your device falls into the wrong hands.

To enable encryption, open menu and scroll to Security Options , choose encryption and enable encryption from the encryption menu. Choose Strongest for the encryption strength.

That way you ll be sure your stored information cannot be accessed from another device.

Use a good Antivirus program: I don t need to tell you that there are millions of smartphone viruses and malware out there targeted at smartphones and Blackberry is not left out. A spyware infected Blackberry device can intercept emails and text messages that come in and out of the device and forward it to the attackers even without your notice. Smartphone attackers know even if they intercept your blackberry messages on the network level it will be almost impossible to decrypt it so they have devised a smart means of waiting at the end point for the decrypted data before they can steal it since Blackberry-to-Blackberry messages are always encrypted.

So the only way to stay safe is to use a good antivirus/anti-malware programs for your Blackberry device to keep such viruses, spyware and malware out of your device.

I have personally used the NetQin mobile Security for Blackberry to keep my device safe against malicious programs, viruses, malware and spyware. The cloud-based scan ensures the antivirus effectively identifies and eliminates such threats. It also comes with an added package, the contacts backup that allows me to backup my contacts and anti-lost feature that helps to remotely locate, delete and lock a lost Blackberry device.

Must Read: How to locate lost mobile phone with NetQin Anti-lost1

Use a strong password: Using a strong password on your Blackberry device will give you relief knowing your data will be safe in case you leave your device behind at some point of even lose it.

So one of the first things you should do when you acquire a Blackberry phone is to enable the password protection. To password protect your Blackberry device, simply select options from the Home Screen, click Security Options , then General Settings and enable the password. Specify the number of failed password attempts you will like to permit before your Blackberry device locks itself down, choose Security Timeout period to stay locked down before enabling the password.

Ensuring the above Blackberry security will ensure your device safety.

Must Read: Tips to creating strong passwords2

Turn off Bluetooth when not in use: There are quite a growing trend of Bluetooth viruses and hacking these days for smartphones and to ensure your Blackberry security, always turn off your Bluetooth when not in use. Do not allow pairing with unknown or un-trusted Bluetooth devices or authorize such Bluetooth devices. Always put the discoverable property to NO when you are not using your Bluetooth.

Practicing this will ensure your Blackberry security.

Remote access security system: If your Blackberry is a corporate device with an enterprise Blackberry server, you can immediately contact your IT department immediately to wipe your device of your corporate data in case of loss or theft. But if it s a personal Blackberry I will advise you to install a remote access security system on your Blackberry now, so you can remotely lock or wipe it in case you lose it someday. With a remote access security system, your lost Blackberry is just a lost device.

You won t stand any risk of losing any important data.

Now I hope you can ensure maximum Blackberry security with all the above listed points to safeguarding your Blackberry device. You don t have to protect your device alone; you should also ensure safety of your data in case you lose your device someday. Blackberry security should be your paramount concern always if you are a Blackberry user.

Do you know of other Blackberry security tips? How have you kept your Blackberry device safe? Share with me using the comment form below.

Remember to subscribe to my RSS feeds.

Happy Boxing day.


Related Posts Plugin for WordPress, Blogger...

References

  1. ^ How to locate lost mobile phone with NetQin Anti-lost (netmediablog.com)
  2. ^ Tips to creating strong passwords (netmediablog.com)

 

More Discounted Bargains

 

Forward Lookout | Surveillance Cameras to protect the Privacy …

New rules for the use of surveillance cameras by city departments. This is the APM (administrative procedure memorandum) that came out yesterday from the Mayor s office. This is why I like this mayor . . . here is the resolution we passed in 20081, and Mayor Dave ignored for his administration, along with many departments.

Seems like he picked up on many of the issues we did 4 years ago. So thank you! I wonder if we will see the policies appear in 30 days or not?

Note: I do take exception with the statement that The primary purpose of this policy is to protect the privacy rights of the public and the associational/collective action rights of City employees. But otherwise, this is a step forward! Vindicated again.

SUBJECT: USE OF SURVEILLANCE CAMERAS
Purpose:
City of Madison agencies have identified a wide variety of legitimate business reasons to use surveillance cameras. The primary purpose of this policy is to protect the privacy rights of the public and the associational/collective action rights of City employees. This policy promotes security for the public and for City employees through timely surveillance of areas otherwise difficult to monitor.

Responsibilities:
Department of Information Technology (IT)
Shall design, acquire, manage and maintain the network infrastructure to support a City-wide enterprise surveillance camera system.

IT shall, in accordance with APM 4-7 (Policy for the Procurement and Disposal of Electronic Products), assist agencies in obtaining surveillance systems that meets the agency s technical requirements and complies with the City s enterprise system technological standards and policies.

IT shall manage network connectivity issues, coordinate problem remediation, maintenance and replacement of devices connected to the enterprise camera system. Agencies that have their own IT and/or facilities maintenance staff capable of maintaining camera devices may provide their own maintenance and problem remediation support.

IT shall ensure that the enterprise camera system is capable of complying with all Wisconsin Public Records Laws for the capturing, retention and timely production of public records.
Department/Division Head Responsibility

City agencies may develop their own surveillance camera programs to address the security issues. However, agencies shall not purchase, create or maintain their own independent surveillance camera systems but rather they shall work with IT.

Department/Division Heads must adopt a written surveillance camera policy on the use of surveillance cameras.

Such written policy shall be on file and available to the public for review with the City Clerk within 30 days of implementation of the surveillance camera system (See Common Council Resolution RES-08-00863). The policy must be reviewed by the IT Director, the City Attorney and the Human Resources Director prior to its implementation.

Owner Agencies
The authorized security contacts for owner agencies may grant access to their surveillance cameras for others outside the owner agency. The authority to manipulate the cameras will be restricted to owner agencies, unless otherwise specified by the owner agency.

Others may be provided view only permissions to specified surveillance cameras by the owner agency. Owner agencies are responsible for determining whether there is potential evidence of a law violation that was captured by their surveillance cameras, generate a police case number, and complete the form requesting preservation of evidence.

Agencies must provide Information Technology with at least 30 days advance notice of their intent to purchase cameras in order to afford adequate time to provision the network infrastructure required to support the new devices.
Agency policies must address the following considerations:
The circumstances which necessitate the use of surveillance cameras;
Whether the agency will utilize the City s standardized enterprise camera system and if not, specify business/technical reasons prohibiting such use;
The personnel, by name or position, that will have access to either the cameras or the data recorded by such cameras;
The circumstances under which such personnel will have access to either the cameras and/or the recorded data;
Whether the cameras will be recording video or both audio and video;.
The physical location of cameras and a description of the areas to be observed by such cameras;
The corresponding location and the verbiage of signage alerting persons that their actions are subject to audio-visual recording. Such signage shall be conspicuous and shall clearly inform all persons that their actions are being both audibly and visually recorded;
Unless otherwise prohibited by law, the Madison Police Department will be provided with immediate access to all data or recordings that may constitute evidence of a crime.

The Madison Police Department shall determine, in consultation with the Dane County District Attorney s Office, whether to obtain a warrant to take custody of such data or recording;
The time period that recorded audio/video will be retained and available. No retention period of less than fourteen days may be approved under this policy;
Procedures for ensuring that records are not destroyed during the pendency of any public records request, investigation or civil/criminal litigation.

Every agency policy shall comply and each use of surveillance cameras shall comply with the Fourth Amendment to the United States Constitution and Article 1, Section 11 of the Wisconsin Constitution. Furthermore, agencies shall comply with the requirements of sec.

968.31, Wis. Stats. This requires close consultation with the Office of the City Attorney.

Each agency policy shall address any laws unique to that agency.

For example, the Library s policy shall reflect consideration of sec.

43.30(5)(a), Wis. Stats. concerning the disclosure of library patron identities.
Every policy shall address the implications of any applicable collective bargaining agreement.

Compliance with this provision requires close consultation with the Labor Relations Unit of Human Resources.
Agencies shall be responsible for the costs of procuring and operating the surveillance cameras they employ.

Agencies shall use their budgeted funds to purchase all new camera devices, equipment, licenses, and services required to install and connect (fiber-optics, point-to-point radios, or any other network connectivity technologies) the devices to the enterprise camera system.

All enterprise cameras located in the street right-of-way will be owned by Traffic Engineering.

Traffic Engineering shall provide maintenance and remediation support for cameras located in the street right-of-way.

Authority:
Information Technology will interpret and maintain this APM.

References

  1. ^ resolution we passed in 2008 (madison.legistar.com)

U.S.

Immigration and Customs Enforcement (ICE) to Launch – Inside …

Jump to Link in Article

The BlackBerry solution has a legacy in government mobility, with more third-party security certifications1 and more government mobile device management experience than any provider of mobile solutions. Today we re excited to share the news that Research In Motion will begin a pilot program with U.S. Immigration and Customs Enforcement (ICE)2 using BlackBerry 103 smartphones and BlackBerry Enterprise Service 10 (BES 10) in early 2013.

ICE will be one of the first government organizations to pilot the new BlackBerry 10 platform.

ICE has been a valued BlackBerry customer for years, and our commitment to government agencies has influenced the development of the BlackBerry 10 platform, said Scott Totzke, Senior Vice President, BlackBerry Security, Research In Motion. Along with providing workers with secure access to behind-the-firewall confidential information, BlackBerry 10 can help organizations fully leverage the potential of mobile technology to offer new services, improve service delivery and increase organizational productivity. We look forward to sharing more features of the BlackBerry 10 platform at our global launch event on January 30.

This pilot program reinforces our commitment to providing secure mobile devices and management solutions for government and public sector agencies.

For end users, BlackBerry 10 devices will feature a seamless flow between personal and work uses through BlackBerry Balance4 technology. For administrators, BlackBerry Enterprise Service 10 will provide a complete solution for managing mobile devices from a unified web-based console.

In addition, the BlackBerry 10 platform has received FIPS 140-2 certification5, meeting the criteria for secure encryption set by the U.S. and Canadian Governments.

This certification enables government agencies to deploy both BlackBerry Enterprise Service 10 and BlackBerry 10 smartphones from the day of launch.

We look forward to launching the U.S.

Immigration and Customs Enforcement s BlackBerry 10 pilot program and to continuing our partnerships with government agencies around the world.

Related Posts

References

  1. ^ security certifications (bizblog.blackberry.com)
  2. ^ U.S.

    Immigration and Customs Enforcement (ICE) (www.ice.gov)

  3. ^ BlackBerry 10 (www.blackberry.com)
  4. ^ BlackBerry Balance (bizblog.blackberry.com)
  5. ^ FIPS 140-2 certification (bizblog.blackberry.com)

Is security the key to BlackBerry 10 regaining enterprise dominance …


BlackBerry manufacturer RIM has had a year to forget. The company s financial woes have been well-documented, and little has hopped of the production line to distract commentators from miserable quarterly reports, bleak forecasts from analysts, and news of widespread job cuts1.

Yet the customary RIM update typically finishes with a hopeful nod to the firm s big shot at redemption. The forthcoming launch of BlackBerry 10, due at the end of January 2013, may well be last chance saloon for RIM, but the company is defiant2 that the new OS and accompanying handsets will reassert BlackBerry s ailing status as a major player in the mobile arena.

Much of the attention on BB10 has come from a consumer perspective, but it is the revitalisation of BlackBerry s corporate-friendly origins that could provide the key to RIM s recovery.

One of the cornerstones of BB s enterprise platform has been security, and fresh innovation in this area will according to RIM make BB10 more secure than its predecessors and its market rivals.

Security is a key part of the BlackBerry 10 experience, Mike Brown, RIM s Vice President of Security Product Management & Research, told ITProPortal, as he frequently emphasised the importance of sophisticated but usable mobile security.

If an operating system is to work effectively in an enterprise, security has to go beyond plugging holes and merely shoring up the handset itself, Brown argues. It isn t just about the device. Security is about how the device interacts with the management software the organisation deploys, he said.

One example of management software that s seeing a significant increase in adoption is BYOD suites, and keen to capitalise on the growing bring your own device trend in the workplace, RIM has put a BYOD-friendly feature at the heart of its security offering for BB10.

BlackBerry Balance, as it is called, allows the user to run two completely separate profiles on the same device. Thus, sensitive work data is better protected by being kept apart from personal operations, while the use of applications within the work profile can be regulated remotely by the user s organisation. IT managers concerned with the merging of work and personal activity on the same company device will no doubt be intrigued by the prospect of BlackBerry Balance, which appears a viable solution to many of the stumbling blocks that arise in a BYOD environment.

BlackBerry Balance works extremely well within a BYOD deployment, Brown said, adding that RIM wanted to make sure you could keep that personal section of your life on a device within the enterprise.

This unified experience , it is claimed, means the user notices the benefits as much as the employer does, as the personal touches that make our devices unique to us are maintained, and the juggling of home and work organisation can be done with ease on the same platform.

When asked whether these fresh ideas were key to BlackBerry renewing its reputation as the secure and reliable OS, Brown slid into slightly hollow corporate-speak, twice offering that it s really about the journey as well as the destination – but his point was worthy. New features like BlackBerry Balance – the latest destination – represent only the tip of RIM s iceberg after years of careful development in the business space, and just because the company s slow-down has invited competition in the arena from iOS, Android et al, this does not mean that years of progress and innovation on BlackBerry has suddenly been lost.

Brown described BlackBerry has having a long heritage of security, and continued, I think you have to point out that BlackBerry is still a dominant player in the enterprise space and government space all around the world. Eye-catching hardware design and software gimmicks may be responsible for driving mobile success in the consumer arena, but in the enterprise, where profits can be just as great, features like security are most valuable when attracting custom.

I spend a lot of time talking to our enterprise customers, Brown explains, and I know from the conversations I ve had that security continues to be a huge topic for them, because it allows them to do so many exciting things as an organisation.

With the confidence of operating on a secure platform, companies can be more daring, creative, and ultimately, successful, Brown argued.

Recognition for BB10 s security capabilities hasn t just come from RIM either. The National Institute of Standards and Technology in the US has already awarded the OS the FIPS 140-2 certification3, giving it the stamp of approval for use at government level. With the endorsement coming nearly three months before BB10 s release, RIM described the feat as remarkable at the time.

According to Brown, it demonstrates that the latest BB iteration can dominate public and private sectors worldwide, including the UK, where he is confident RIM s long-standing relationship with organisations will continue to bear fruit.

Should BlackBerry Balance work as well in practice as it does in theory, BB10 may well have the key novelty factor to supplement the security heritage. BlackBerry has lost considerable ground in the consumer space to the ubiquitous iPhone and steady stream of attractive Android handsets, but these devices still have ground to make up if they are to become the true corporate staple that BlackBerry came to represent. In an age when BYOD and mobility is on the rise, leaving important data and a great deal of power in the hands of everyday employees, reminding the business world that RIM provides the most secure platform on the market could be vital to BlackBerries muscling their way back into blazer pockets.

And if this corporate hegemony is regained, that RIM revival may well start to materialise.

References

  1. ^ job cuts (www.itproportal.com)
  2. ^ the company is defiant (www.itproportal.com)
  3. ^ awarded the OS the FIPS 140-2 certification (www.itproportal.com)

More Offers


SIA confirms three new board members | Security Director News

SILVER SPRING, Md. The Security Industry Association has confirmed three new members to its board of directors. They are:

Thomas A.

Cellucci, executive vice-president for ICS, previously the first chief commercialization officer for the U.S.

Department of Homeland Security.

Pierre Trapanese, owner of Northland Control Systems Inc.

Herve Fages, senior vice president, global product marketing, Schneider Electric Buildings Business, previously chief marketing officer at Pelco, among other positions there.

SIA is very honored and excited by the election of these distinguished industry leaders to the SIA board, Don Erickson, chief executive officer, said in a prepared statement.

Tom, Pierre and Herve are well-known and respected throughout the industry and each of them will bring valuable and unique perspectives to the board that will help to strengthen our organization and the industry.