BlackBerry has unveiled a new mobile security solution that has been dubbed BlackBerry Protect Mobile. The enterprise-grade mobile threat defense (MTD) system utilizes AI technology to identify malware before it is able to execute on a device.
Protect Mobile was developed in response to the COVID-19 pandemic and the remote work environment it created. The increase in remote activity corresponded with a similarly dramatic increase in phishing attacks (BlackBerry indicated that phishing attempts are up nearly 40 percent), and many are not spotted until well after a system has been compromised.
With that in mind, Protect Mobile uses AI to identify malicious URLs and spoofing websites that use malware to collect sensitive information. The solution monitors activity at the device and the application level, for all of an enterprise’s mobile, desktop, and server endpoints.
Protect Mobile will send an alert before opening a suspicious link, thereby stopping the threat before it gains access to an endpoint device. The AI analyzes system libraries, system parameters, and device configurations to identify potential malware, and will also block applications that do not come from an approved source. An IT team can view and manage the entire Protect Mobile infrastructure from a single security console for added convenience.
“The number of phishing attacks that target mobile users will continue to rise because business is being conducted on mobile devices and users are more susceptible to attacks when viewing and accessing content on the go,” said BlackBerry Spark EVP Billy Ho.
“Remote work is here to stay,” added IDC Enterprise Mobility VP Phil Hochmuth. “We expect that the Work From Home boom will spark initiatives to modernize enterprise security, including mobile threat detection, which is essential for organizations to defend their users from growing mobile risks.”
Protect Mobile is built with the BlackBerry Spark platform, and is part of the company’s broader Cyber Suite portfolio. That portfolio offers continuous authentication and behavioral analytics in addition to endpoint protection, detection, and response.
Follow Us