BlackBerry 2FA. Datasheet. BlackBerry 2FA

Similar documents
BlackBerry Enterprise Identity

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

How a Global Insurance Provider in Japan uses BlackBerry UEM to Secure, Protect and Connect its Mobile Workforce

BlackBerry UEM + Samsung Knox

Authlogics for Azure and Office 365

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

BlackBerry UEM is a Wise Investment for ABANCA

Why This Major Energy Company Surged Back to BlackBerry After Trying AirWatch

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Single Secure Credential to Access Facilities and IT Resources

Introduction to the Extended Development Platform

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Keeping your VPN protected. proven. trusted.

Yubico with Centrify for Mac - Deployment Guide

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Centrify for Dropbox Deployment Guide

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

The Challenge. The Solution. The Modern Approach to Remote Access

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Enabling Compliance for Physical and Cyber Security in Mobile Devices

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

XenApp, XenDesktop and XenMobile Integration

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars

A comprehensive security solution for enhanced mobility and productivity

Maximize your move to Microsoft in the cloud

Enterprise Product Guide

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

App Gateway Deployment Guide

Solution. Imagine... a New World of Authentication.

Huawei AppGallery --Expand your business globally

Securing Office 365 with MobileIron

SharePoint 2019 and Extranet User Manager

The Device Has Left the Building

Maximize your investment in Microsoft Office 365 with Citrix Workspace

How Next Generation Trusted Identities Can Help Transform Your Business

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

LinQ2FA. Helping You. Network. Direct Communication. Stay Fraud Free!

Welcome! Ready To Secure Access to Your Microsoft Applications?

Google Identity Services for work

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

Colocation Enabler for Hybrid and Multi Cloud Solutions. Toan Nguyen, Director Business Development & Cloud Platform, e-shelter services GmbH

Securing Today s Mobile Workforce

Two-Factor Authentication User FAQ s

Cloud Access Manager Overview

MObile. end. complexity

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

Six steps to control the uncontrollable

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access

The Lord of the Keys How two-part seed records solve all safety concerns regarding two-factor authentication

Next Generation Authentication

PROGRAM GUIDE RED HAT CONNECT FOR TECHNOLOGY PARTNERS

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

JUNIPER NETWORKS PRODUCT BULLETIN

Keeping your VPN protected

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

ManageEngine ADSelfService Plus

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents

BYOD: BRING YOUR OWN DEVICE.

Okta SAML Authentication with WatchGuard Access Portal. Integration Guide

Centrify Identity Services for AWS

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Dell One Identity Cloud Access Manager 8.0. Overview

The Next Generation of Credential Technology

How BlackBerry 2FA and BlackBerry UEM Help This Law Enforcement Agency to Protect and Serve New York

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

HID Mobile Access. Simple. Secure. Smart.

White Paper Taking Windows Mobile on Any Device Taking Windows Mobile on Any Device

Android Enterprise Device Management with ZENworks 2017 Update 2

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

1. Introduction. 2. Why Mi-Token? Product Overview

MOBILE SECURITY, SECURE ACCESS AND BYOD AS A SERVICE. Jonas Gyllenhammar NNTF 2012

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

SAP Security in a Hybrid World. Kiran Kola

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

1 The intersection of IAM and the cloud

Deploying Cisco SD-WAN on AWS

The only authentication platform you ll

Choosing the right two-factor authentication solution for healthcare

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Meeting the requirements of PCI DSS 3.2 standard to user authentication

IT professionals are grappling with

Securing Health Data in a BYOD World

Integrated Access Management Solutions. Access Televentures

Transcription:

Datasheet BlackBerry 2FA BlackBerry 2FA The Challenge: Critical enterprise systems especially cloud services are more exposed than ever before because of the growing threat of cybercrime. Passwords alone are not enough for the expanding number of endpoints in your network. Two-factor authentication for cloud apps and VPNs is a top priority for today s organizations. Yet many two-factor systems are complicated and error-prone, place heavy burdens on IT, and fail to secure cloud and other services. The Solution: BlackBerry 2FA offers strong, high-security user authentication that safeguards cloud and standards-based services while still protecting your existing VPN. Two-factor authentication is vital for protecting your company s high-value systems, whether it s critical cloud services like Microsoft Office 365 and Salesforce, or your VPN. There s a growing awareness in today s organizations that legacy twofactor authentication solutions are deficient. The user experience is complex and frustrating, and they don t adequately protect cloud services. BlackBerry 2FA uses Certificate-Based Authentication of devices, meeting or exceeding the level of security offered by legacy systems but with lower cost and better user experience. 1

Enter Password User Accept You re in Provide a Superior End-User Experience BlackBerry 2FA delivers a positive user experience, and supports a wide range of employee devices (ios, Android, and BlackBerry). Once employees have registered one or more mobile devices, they can access critical systems simply by entering their usual password and clicking OK on a registered mobile device to authenticate. Endpoint PC, Mac, Tablet It s a simple, high-security solution, with an improved user experience compared with legacy two-factor authentication systems. BlackBerry 2FA: Login Request Check Verify Eliminates the frustration of complex authentication processes Removes the need to remember PINs, carry additional devices, or manually transcribe codes from tiny screens Provides a superior, one-click user experience Critical System Cloud app, VPN, other BlackBerry 2FA Enables access to critical systems, even in emergencies Allows for the use of multiple, preferred devices 2

Support Any Type of User: With BlackBerry 2FA, you can provide two-factor authentication to every type of user inside and outside your organization from traditional employees and part-time contractors to partners. It supports unmanaged devices and devices managed by a third party, so it can easily map onto almost any device external users may have. If they have a device, you can provision r emote users without requiring any new hardware. BlackBerry 2FA supports affordable, standards-based hardware tokens for users without mobile devices, or users unwilling to put software on their devices. Compared with legacy hard tokens on the market, the tokens supported by BlackBerry 2FA are designed to be less expensive, have longer battery life (typically double), and are available through a wide range of vendors. Lower Your Operating Costs: BlackBerry 2FA has low up-front costs, with no new authentication devices or infrastructure required. Legacy two-factor authentication systems are expensive to maintain. They often have high maintenance or subscription fees, in addition to high operational costs due to complex provisioning and heavy use of IT resources for resolving user issues. BlackBerry 2FA virtually eliminates help desk requests that occur frequently with legacy two-factor authentication systems, such as forgotten PINs and lost hard token devices. User errors are also drastically decreased. Easy to Deploy and Scalable: With BlackBerry 2FA, deployment is simple. It allows automatic provisioning to devices managed by BlackBerry UEM, and a simple activation procedure for users with other devices. In either case, no IT support is required. There are no new physical devices to ship, and no seed files to manage. And you can easily set up BlackBerry 2FA on as many devices as users have. BlackBerry 2FA also offers flexible deployment options. You can choose to make the move to BlackBerry 2FA all at once with simple, quick deployment. Or you can opt to deploy in a chosen number of users, then work in parallel with your legacy system and easily scale up as desired. BlackBerry 2FA integrates with BlackBerry UEM, allowing for better device security, and increasing your trust and confidence in the BYOD model. It can also coexist with other mobility solutions. The integration with UEM simplifies the provisioning process. Equip Users to Self-Rescue: BlackBerry 2FA offers optional features that can ensure users always have access to your cloud services, VPN, or other systems they need to keep working without involving IT. Users can authenticate when offline, or even pre-authenticate ahead of planned network connectivity loss for example, heading into an area of poor network coverage or air travel. For device loss, users can self-rescue via a portal, with the option of self-issuing a new authentication device. 3

Compatibility Authentication Devices Popular VPN/VDI systems (e.g. Cisco, Citrix, others) RADIUS systems SAML 2.0 services* OIDC services* Services federated with Microsoft Azure AD* Various BlackBerry products* Internal and external users Push authentication Software OTP tokens OATH TOTP-compliant hardware tokens Contextual authentication* Password and 2FA processing can be kept on-premises Android, ios, BB 10 BlackBerry UEMmanaged Unmanaged/BYOD Managed by third-party solutions * Requires use of BlackBerry Enterprise Identity 4

About BlackBerry BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world s most sensitive data across all end points from cars to smartphones making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols BB on the Toronto Stock Exchange and BBRY on the NASDAQ. For more information, visit www.blackberry.com. 5

2018 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY, BLACKBERRY WORKSPACES and EMBLEM Design are the trademarks or registered trademarks of BlackBerry Limited. All other trademarks are the property of their respective owners. Content: 12/16 Rev. 02DEC2016