RIM BlackBerry 10 Gets Government Security Clearance
By Eric Zeman
InformationWeek
RIM has always taken security seriously. The bulk of its devices are protected by AES 256-bit encryption. The FIPS certification is just icing on the cake that RIM hopes to stuff into the mouths of government and business customers once its BB10 platform launches.
"Achieving FIPS certification for an entirely new platform in a very short period of time, and before launch, is quite remarkable and a testament to the dedication of our security team," said David MacFarlane, security certifications director at RIM. "BlackBerry 10 will deliver security, a superior user experience, the ability to separately manage corporate and personal data on the same device and ease of manageability for IT managers in an enterprise or government environment."
FIPS certification may not be enough to convince those potential government and business customers to pick BlackBerry 10 over rivals such as iOS, Android or Windows Phone, however.
[ RIM may have already missed the boat. See BlackBerry 10 Launch: Is March Too Late? ]
At least one analyst is not holding out hope for the unreleased smartphone platform.
"We believe BB10 is likely to be [dead on arrival]," said James Faucette, a Pacific Crest analyst, reports Bloomberg. "We expect the new OS to be met with a lukewarm response at best and ultimately likely to fail."
RIM seeded BlackBerry 10 to more than 50 mobile network operators around the world in late October. Those operators will take three to four months to evaluate the platform and make it ready for their networks. RIM's launch windows will fall somewhere between mid-February and possibly as late as mid-April.
It has two smartphones on deck for launch. The first will be an all-touch device and the second will include a QWERTY keyboard. Most wireless network operators in North America have said they will support the new platform from RIM. Whether or not it can make a dent in the stranglehold Android and iOS have on the market is not clear.
Dead on arrival or not, we can rest easy knowing that, at least, BlackBerry 10 will be secure.
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).
Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new Holes In BYOD issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)
| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
InformationWeek Reports
Mobility's Next Challenge: 8 Steps to a Secure Environment
Taking your company's mobile capabilities to the next level--whether on personally or company-owned devices-requires a lifecycle management plan that encompasses application security, development, distribution, support and enhancement. We show you how to get there and provide insight into five mobile application development options.
Buyer's Guide: Mobile Device Management
Want the lowdown on nine top MDM products? Our InformationWeek Buyer's Guide is your one-stop guide for choosing an MDM system that match your requirements. ZIP file includes: Detailed comparison charts on security, administration, and platform and reporting features; our full questionnaire; and responses from Absolute Software, AirWatch, Fiberlink Communications, JAMF Software, MobileIron, Odyssey Software, Symantec, Tangoe, and Zenprise.
Dark Side of Mobile Apps
Companies are rushing headlong to develop applications for Android, Apple and BlackBerry devices. But IT must maintain its secure development lifecycle process or risk a black eye.
Reducing Mobile Device Risks to Enterprise Data
Innovative IT shops are turning the mobile device management challenge into a business opportunity--and showing that we can help people be more connected and collaborative, regardless of location. We offer a framework of four possible strategies to secure the mobile environment.



Subscribe to RSS