BlackBerry has announced enhancements to its multi-OS enterprise mobility management (EMM) solution with the release of BlackBerry Enterprise Service 10 (BES10) version 10.2.
BES10 customers including Morgan Stanley, Boeing, Aneurin Bevan University Health Board and Secusmart are currently participating in the BES10 version 10.2 Early Adopter and Beta programs, and are running the new version in a test environment.
To date, customers have installed nearly 30,000 BES10 commercial and test servers around the world. Organizations continue to choose BlackBerry because it is the most proven and trusted enterprise mobility management (EMM) solution, supporting iOS, Android and BlackBerry smartphones. That is why Secusmart, a leading expert in the field of highly secure mobile voice and data communication, uses BES10, and chose to be an early adopter of version 10.2.
“Secusmart’s needs an EMM solution that can enable our workforce to be more productive and connected, while maintaining our strict security standards and not compromising on our end user experience,‚”” said Dr. Hans-Christoph Quelle, CEO of Secusmart. ‚””BES10 provides the necessary functionality and security for our employees and has truly exceeded our expectations. We’ve benefitted tremendously from BlackBerry’s single, secure multi-platform connectivity model to mobilize our business and empower our employees to be more productive and better equipped to serve our customers.‚””
Recently named the Best Mobile Device Management Software for 2013 by UK enterprise IT publication V3, BES10 is the only enterprise mobility management solution capable of delivering comprehensive management and security for devices, apps and content across iOS, Android and BlackBerry devices, all easily managed through a single console. Backed by industry leading global support services, BES10 offers a seamless, scalable and cost-effective way to truly mobilize businesses, enabling organizations to balance end user and corporate needs without compromising security.
“”There’s a huge opportunity in the enterprise market for vendors that can meet customer requirements for full turn-key solutions for their security and enterprise mobility management demands,‚”” says Stacy Crook, Research Director, Mobile Enterprise at IDC. ‚””By adding features that support BYOD across any device type, self-service, scalability, and the flexibility to build mobile management into business processes, BlackBerry’s latest release of BES10 demonstrates the company’s ongoing commitment to its enterprise customer base.””
‚””We enable any organization or government agency to manage iOS, Android and BlackBerry devices without compromising security,‚”” said Stephen Bates, Head of the Enterprise Business Unit at BlackBerry. ‚””No other mobile vendor has the same level of trusted and proven security as BlackBerry. We’ve achieved this with an end-to-end multi-platform solution that’s secured at the device, server and network layer. And now BES10 version 10.2 provides even more tools to help manage BYOD environments and achieve cost efficiencies.‚””
BES10 version 10.2 brings key new features to the EMM solution, including:
¬∑ Expanded Multi-Platform support:
Includes Secure Work Space support for iOS 7 background email sync, API support allowing the automation of BES10 functions for iOS and Android devices through BlackBerry Web Services, and dynamic support for iOS and Android OS updates, which allows IT administrators to create activation and application distribution rules for the latest iOS and Android devices that employees bring into the organization, without requiring a server upgrade.
¬∑ BYOD Enrolment for iOS and Android:
Truly enable BYOD by allowing administrators to manage only the Secure Work Space container on iOS and Android devices, thereby providing BYOD users with the assurance that the personal information and apps on their device remains in their control.
¬∑ Reduced Cost:
BES10 now easily scales to support 100,000 devices per domain, with any mix of BlackBerry, iOS and Android devices, reducing the number of servers and resources required for large scale deployments, and significantly reducing costs.
BES10 version 10.2 server software is free to download at www.bes10.com.
BlackBerry’s Global Enterprise Support Services
Customers are actively taking advantage of BlackBerry’s global enterprise support services. The company provides support to enterprise customers in more than 90 countries, with some of the largest device deployments across a variety of industries, including Health Care, Public Safety, Finance, Public Sector, Education and more.
BlackBerry Care Support is included when customers deploy BES10. It comes with 12×5 electronic access to experts at BlackBerry for two named IT administrators with a next business day response, as well as access to training, productivity and diagnostic tools. Additional levels of technical support services are also available, including support for BES10 deployments with iOS and Android devices.
In addition, BlackBerry is introducing BlackBerry Software Assurance. This new service offering helps customers upgrade to BES10 from earlier versions of BES. BlackBerry Software Assurance is included with the ‚””Advantage‚”” level or higher technical support or as a standalone annual subscription service for customers who may not require full support. For more information about BlackBerry’s technical support services, visit www.blackberry.com/btss
Scammers cleaning up with gullible computer users
Kaspersky experts have detected a two-fold rise in the number of users being attacked with fake system cleaners – fraudulent programmes designed to trick users into paying for alleged serious computer issues to be fixed. The number of users hit reached 1,456,219 in the first half of 2019, compared to just 747,322 for the same period in 2018. During this time, some of the attacks have become more sophisticated and dangerous.
A slow-working or poorly performing computer is a common complaint among PC users, and there are many legitimate tools available to solve such issues. However, alongside genuine system cleaners, there are fake ones developed by fraudsters that are designed to trick users into believing their computer is in critical danger, for example through memory overload, and needs immediate cleaning. The attackers then offer to provide such a service in return for payment. Kaspersky defines and detects such programmes as ‘hoax system cleaners’.
Upon receiving user permission and payment, the fraudsters install the hoax programmes that claim to clean the PC, but which often either do nothing or install adware – an annoying, but not critical, storm of unsolicited advertising – on the computer. Increasingly, however, the cybercriminals are using the installation of hoax cleaners to download or disguise malware such as Trojans or ransomware.
The countries most affected by attacks with hoax cleaners in the first half of 2019 show how geographically widespread the threat is; leading the list is Japan with 12% of affectedusers, followed by Germany (10%), Belarus (10%), Italy (10%) and Brazil (9%).
“We’ve been watching how the phenomenon of hoax cleaners has been growing for the last couple of years, and it is a curious threat. On the one hand, many samples that we have seen are spreading more widely and becoming more dangerous, evolving from a simple ‘fraudulent’ scheme into fully functioning and dangerous malware. On the other hand, they are so widespread and seemingly innocent, that it is much easier for them to trick users into paying for a service, rather than frightening them with screen blockers and other unpleasant malware. However, these two ways end up with the same results with users losing their money,” says Artemiy Ovchinnikov, security researcher at Kaspersky.
Kaspersky detects hoax system cleaners as:
To avoid falling victim to hoax threats, Kaspersky researchers advise users to:
- Always check that the PC services that you are about to adopt are legitimate and easy to understand. If it sounds confusing, use a search engine to find out more about the service as there may be a more detailed explanation available
- Use a reliable security solution for comprehensive protection with a clean-up function for a wide range of threats and PC cleansing, such as Kaspersky Security Cloud.
- If you are purposely looking for a PC cleaner, use reliable, IT-targeted sources of information for recommendations, with a long-built reputation and software reviews.
Read the full report on Kaspersky Daily.
Trend Micro unveils security suite for Azure in Africa
Cybersecurity leader Trend Micro Incorporated has announced highly optimised security solutions for Microsoft Azure workloads for customers in sub-Saharan Africa.
The Trend Micro Deep Security suite takes into consideration that a customer needs to approach cloud security differently than one would traditional security. As a result, it is fully optimised for Microsoft Azure. The suite ensures that a customer can tap into a solution that provides flexible, scalable protection of operating systems, applications, and data without slowing you down.
“Microsoft is an important partner to Trend Micro and as a result we have built a series of technologies that support their position in the cloud,” says Indi Siriniwasa, vice president at Trend Micro Sub-Saharan Africa. “Our security solutions are uniquely optimised for Microsoft Azure and complement Microsoft Azure Security Centre so customers across the world continue to turn to Trend Micro to help better secure their Azure real estate. With Microsoft Azure now available from new cloud regions in South Africa, customers can rest assured that we support the use of Microsoft to streamline provisioning of security for Windows virtual machines and SharePoint workloads.
“This will help customers to ensure that their security follows them from their physical environment to the cloud and back again, customers can automate security with Microsoft PowerShell scripting to streamline provisioning of security for Windows virtual machines and SharePoint workloads plus many other orchestration tools for Azure, including Chef, Puppet, and RightScale, we can also help clients to better automate security control deployments.”
With Deep Security for Azure, businesses can detect and protect against intrusions as well as protect their business against serious vulnerabilities with intrusion detection and prevention (IDS/IPS). The solution will also help uncover suspicious changes to a system and immediately highlight and alert the business to these activities – without security admins having to manually sort through logs.
It also has the ability to keep malware off of workloads by using predictive machine learning mechanisms to detect unknown threats and prevalent attacks, so that a user can identify and then remove malware and blacklist domains known to be command-and-control (C&C) servers. Customers can also stop applications attached with IPS rules that block XSS or SQL attacks and other serious vulnerabilities until systems can be patched, as well as increase application visibility and control.
A particularly relevant feature within the South African context is that Deep Security is able to speed up a client’s route to PCI DSS compliance. The Deep Security solution allows a client to meet multiple PCI requirements with a single product, including intrusion detection and prevention, file integrity monitoring, and log inspection.
“Trend Micro’s integration with Microsoft Azure reduces the dependence on multiple point security tools, helping you to identify and address security and configuration issues quickly,” says Adwait Joshi, director, Azure Product Marketing at Microsoft Corp.
Trend Micro provided the following information:
Trend Micro’s Deep Security currently secures more servers globally than any other solution and specialises in protection for cloud and virtualised workload. It acts as part of the Trend Micro Hybrid Cloud Security solution, powered by XGen and provides comprehensive, flexible security for Azure workloads in a single product, so you can build new applications or move existing resources to the cloud with confidence.
Deep Security protects workloads by:
- Defending against network threats with intrusion detection and prevention (IDS/IPS)
- Immediately protecting against vulnerabilities like Shellshock and Heartbleed
- Keeping malware off Windows and Linux workloads
- Alerting when unplanned or suspicious changes are made to systems
- Stopping SQL injection and XSS attacks on applications
- Gaining visibility and control of elastic workloads with application control that fits DevOps
Local Trend Micro customers can also turn to the company’s Trend Micro Cloud App Security which is directly integrated into Office 365 via APIs. This includes advanced email protection, as well as compliance on third-party cloud file sharing services such as: Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business.