Not Just Secure, BlackBerry Secure

QNX

BBsecureThere is a reason that BlackBerry is synonymous with mobile security. It is because security is as elemental to an electronic system as DNA is to an organism – and security is BlackBerry’s DNA.

Originally posted on the QNX Auto Blog.

Robust security cannot just be bolted on. It must be infused right from the start, which is why BlackBerry Security has been trusted by world leaders for over two decades and is the mobility partner of all G7 governments, 16 of the G20 governments, 10 out of 10 of the largest global banks and law firms, and the top five largest managed healthcare, investment services, and oil and gas companies. BlackBerry Security has earned more than 70 government certifications and approvals ­– greater than any other mobile vendor.

The iconic example of the depth of trust in BlackBerry Security is probably the NSA’s licensing (and standardizing) of Certicom’s Elliptic Curve Cryptography (ECC) algorithms, which are quickly becoming the accepted crypto standard for enterprise, government, automotive, mobile, medical, industrial, and IoT security. Vulnerabilities are growing rapidly and present a serious risk for public and private sector organizations, so BlackBerry continues to expand its coverage with advanced technologies, tools, design consulting, and testing services for true end-to-end, layered security. The goal is simple: to ensure there are no back doors, open windows, or lost keys to exploit – anywhere in the system.

In mobile, coverage begins at the crucial hardware root of trust. OS and software authenticity is securely verified every single time any BlackBerry device in the world boots up. Data is encrypted right on the devices, in the trusted network, and behind the corporate firewall. In operating systems, the BlackBerry-QNX Neutrino microkernel ensures safe, secure, and reliable operation robust enough for over 40 car models, the space shuttle, and nuclear plants. It is designed to fail safe and protect against malware, tampering, and data leakage.

not-just-secure

Thanks to Certicom’s Security Builder Software Libraries, certificate management solutions, and secure manufacturing systems, it is easy to obtain government approved (FIPS 140-2 Level 1) validation, manage security certificates, and secure manufacturing lines without becoming a crypto expert.

Join the conversation

Show comments Hide comments
+ -
blog comments powered by Disqus