1. <wbr id="bhbpf"></wbr>

  2. <form id="bhbpf"></form>

        Skip Navigation


        Adaptive Security and AI to Protect Mobile Endpoints

        CylancePERSONA? uses machine learning and predictive AI to dynamically adapt a security policy based on user location, device and other factors. By improving the user experience, it protects against human mistakes and well-intentioned workarounds.

        Security that Travels and Adjusts with Your Users

        What if your security policies could relax when your users are at the office or other trusted spaces, or change dynamically if they’re traveling in a higher-risk location? Or if those policies could sense when something is amiss and automatically lock down a device?

        CylancePERSONA enables a Zero Trust?security environment, focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. ?

        Meet your highest security standards with CylancePERSONA.

        • Dynamically adapts a security policy based on user geolocation, device, time, IP address and BlackBerry? Dynamics? app identifiers.
        • Decreases the risk that comes with lost devices
        • Protects against device/app cloning and/or user impersonation?

        Continuous Authentication leverages passive biometrics and other usage-based patterns to continuously verify user identity in an unobtrusive fashion. A malicious user is automatically blocked from accessing apps when they exhibit anomalous behavior. This enhances the security posture and at the same time, improves the end user experience over having a static timeout.?

        CylancePERSONA creates the best experience for end users while ensuring the best security and compliance posture.

        • Streamlined access to apps and services without having to re-authenticate when in trusted locations
        • Adapts security and policy posture to actual context, versus applying only static policies
        • Enables “zero sign-in” and/or increasing timeouts if a user is in a low-risk pattern in high-trust location

        CylancePERSONA provides a contextual system for Unified Endpoint Management and protection.

        • Relaxes security policies when an end user is in a trusted location and dynamically adjusts when they travel to a higher-risk location
        • Adapts device security to local regulatory requirements as an employee travels from one country to another
        • Quarantines devices and apps before they can be used for malicious purposes

        CylancePERSONA allows the user experience design and security/policy posture to be mutually and dynamically optimized, versus in conflict.

        • Determines what level of access should be granted to any device or application at any given moment
        • Dynamically adapts security requirements for devices and applications without impacting performance
        • Proactively detects anomalous behavior and prevents potentially malicious activity?

        CylancePERSONA adds a layer of adaptive security to your existing UEM or UEM Cloud domain without introducing an additional software footprint.

        • Builds on existing investments in BlackBerry UEM, BlackBerry? Dynamics, and BlackBerry? Enterprise Identity
        • Can work with existing third-party infrastructure, like external IDPs (i.e. Ping, Okta, ADFS) or applications (i.e. Salesforce?, Microsoft? Office 365?)
        • Allows organizations to extend data, services and models with third-party threat detection systems
        Image of women at home and in office image of globe with risk scores Image of fingerprint and authentication challenge

        Featured White Paper: ESG Technical Validation of BlackBerry Intelligent Security

        Enterprise Strategy Group (ESG) recently completed testing of BlackBerry Intelligent Security. Testing focused on ease of deployment and management, and simplification of the user experience.

        Download this white paper to learn about their findings.


        How it Works

        CylancePERSONA, a part of the BlackBerry Spark? platform, uses analytics-driven security to provide trust within Zero Trust?environments. It adapts endpoint security policies based on situational risk:

        User Location

        CylancePERSONA uses Machine Learning to identify behavioral and location patterns of multiple users to determine location-based risk. Known work locations can also be preloaded.

        Network Trust

        CylancePERSONA determines the frequency of network use and adjusts security dynamically based on that profile. Accessing a public Wi-Fi for the first time would adjust the risk score accordingly.

        User Behavior

        CylancePERSONA can determine and build a contextual risk score based on learning how and when a user normally accesses data, identifying when the user’s behavior seems consistent and trusted (coming soon).

        Device and App DNA

        CylancePERSONA has the ability to determine whether a device and apps are compliant and up to date, and can adjust the security policy based on the device and app DNA profile (coming soon).

        AI, combined with spatial data, determine a real-time risk score that adapts security policies for the user to create the best experience and security posture. It can:

        • Grant access
        • Adopt a policy
        • Issue an authentication challenge
        • Alert and remediate

        Use Cases

        Image of woman entering door code
        Adaptive Policy: Regional Bank Manager

        Anne enters a retail branch

        Anne is the regional manager for a major retail bank. With CylancePERSONA, when she enters a retail branch, her presence is detected based on her mobile device’s geolocation. Her access to privileged apps appropriate for her role ?is automatically enabled upon her arrival. When she leaves, that access is disabled.

        Image of woman typing on keyboard
        Adaptive Policy: Office Professional

        Malicious hacker tries to access Salesforce app

        Sally is an inside sales employee who primarily works from a corporate office. When CylancePERSONA detects a combination of IP address, location and time that aren’t possible based on her last known access, it immediately denies access and takes remediating action to automate a logout, add the IP address to a watchlist and alert BlackBerry? UEM of the high-risk event.

        Image of soldier
        Adaptive Policy: Government Military Base

        Colonel Smith enters a restricted zone

        Colonel Smith works at a government military base that has a restricted, high-security zone. With CylancePERSONA, upon entering this zone, his camera and Bluetooth? connection are disabled and access to restricted websites is enabled. When he leaves, camera and Bluetooth are enabled and restricted website access is disabled.

        Get Started

        Contact us to get a free demo of how CylancePERSONA can use AI to secure all your mobile endpoints.

        Request a Demo
        Image of man and women talking in front of laptop



        White Paper: Zero Trust for Enterprise Mobility: The Brakes that Help Your Users Go Faster


        White Paper: Adaptive Security and AI to Protect Mobile Endpoints


        White Paper: Endpoint Security and Privacy in a Hyperconnected World


        Brochure: Security That Travels and Adapts to You

        Download View More Resources