BlackBerry has more third-party security certifications and more government mobile device management experience than any provider of… / Read More
On Wednesday October 24th at 10:00 AM EST we are very excited to be hosting a Twitter®… / Read More
Learn how end users and IT administrators can protect BlackBerry smartphones from malware.
The move to ActiveSync enables more connectivity options for customers, but doesn’t change the trusted security model that Enterprises rely on to protect their corporate data.
Find out how TRC Companies, Inc. utilizes the BlackBerry solution to assist with their business.
Examining RIM’s dedication to mobile security research through sponsoring several events.
Taking a look at some of the security certifications and approvals for BlackBerry smartphones.
A video interview with Martha Stewart Living Omnimedia on their use of BlackBerry Mobile Fusion.
BlackBerry PlayBook OS 2.0 and BlackBerry Device Service have been FIPS 140-2 certified.
An interview with the Vice-President of IT at Martha Stewart Living Omnimedia, Inc., about how the company has utilized BlackBerry Mobile Fusion.
Examining the security challenges faced by the mobile world.
Australia and the U.K. have approved BlackBerry 7 and BlackBerry 7.1 OS for government use.
Examining the results of a Trend Micro report on BYOD and security.
RIM recently announced approval for the use of BlackBerry 7 OS smartphones across the Department Of Defense (DoD) in the US.
Recapping last week’s “Appy Hour” event in Washington, D.C.
Discussing the use of BlackBerry solutions in the area of police enforcement and public safety.
Announcing the launch of BlackBerry Mobile Fusion and the Universal Device Service solution.
Discussing “jailbreaking” and the implications it has for device security.
BlackBerry Balance allows employees to use their personal mobile devices for work without compromising the enterprise’s need for security and IT controls.
Read a statement from Scott Totzke, Senior Vice President of BlackBerry Security at RIM, about the role of communications networks in cybersecurity.