BlackBerry Playbook security divides work and play

One of Research in Motion’s biggest challenges in a world of the iPhone and Android has been how to keep its products fun and fresh while maintaining the high level of security its corporate users have come to rely on.

RIM has employed many methods to meet this challenge with its PlayBook tablet, none more obvious than the BlackBerry Balance technology that it introduced at BlackBerry World this week. Essentially, BlackBerry Balance allows users and IT departments to erect a firewall between personal and corporate data on devices so that end users have more personal freedom to run their own apps while ensuring that corporate data doesn’t get compromised.

Among other things, BlackBerry Balance forbids users from copying and pasting information from an enterprise application into a personal application and restricts corporate data access for social networking applications. Additionally, if an employee is leaving their current company with a device that they personally own that contains corporate data, IT departments can perform remote wipes of enterprise data on the device without affecting users’ personal data.

Related story: Should your business buy the BlackBerry Playbook?

RIM is also keeping PlayBook secure through its BlackBerry Bridge system that allows the PlayBook to get access to corporate data by connecting it to BlackBerry smartphones over Bluetooth. RIM touts this as a simple way for IT departments to manage PlayBook because Bridge has a lot of features that automatically protect data wiith minimal intervention from IT.

This is largely because RIM has designed Bridge to provide PlayBook with a “window” into a BlackBerry smartphone’s data without actually syncing that data onto the tablet itself. This means that when the PlayBook loses its Bluetooth connection with a BlackBerry device, it also loses access to corporate data. Furthermore, a remote wipe of a BlackBerry device will automatically lock down its cache of PlayBook data to ensure that it cannot be decrypted. Additionally, implementing a password reset on any BlackBerry device will automatically require a new password for Bridge, meaning that a PlayBook will not be able to view data from a reset device until both the smartphone and the tablet have a new password to connect to one another.

Bridge is also convenient for IT departments because it creates a list of applications on PlayBook that can function solely using Bridge, including BlackBerry Messenger, email, contacts, calendar and a special “Bridge Browser” that lets users surf the web securely through the data connection on their smartphone. To sum up, if an IT department wants to manage PlayBooks the easy way, they can simply mandate that employees can only access key corporate applications if they use Bridge to connect to their current IT-supported smartphone.

Related story: RIM buys Montreal-based Tungle to boost its calendar capabilities

Of course, this won’t be enough for some users who will want email and calendar information on their PlayBook even if they don’t have their smartphone handy. For these users, who will be able to access corporate email once RIM pushes out a software upgrade to its tablet operating system later this year, RIM has developed the PlayBook Administration Service, a Web-based administration console that has the same core features as the BlackBerry Administration Service currently used to manage smartphones.

The Administration Service lets IT departments enforce software configurations, IT policies and connectivity profiles while also managing the kinds of applications users can have on their PlayBooks. RIM is also providing IT departments with a catalog of business-approved applications that can be safely downloaded onto PlayBooks and given access to corporate data.

When you combine these three security features – Balance, Bridge and the Administration Service – it becomes clear that RIM’s PlayBook gives enterprise users the most security features and options of any other tablet on the market. The tablet’s ultimate success, though, could come down to whether corporate users feel they need these strong precautions or whether they can mostly get by with the more limited security features available on the iPad.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Story

How the CTO can Maintain Cloud Momentum Across the Enterprise

Embracing cloud is easy for some individuals. But embedding widespread cloud adoption at the enterprise level is...

Related Tech News

Get ITBusiness Delivered

Our experienced team of journalists brings you engaging content targeted to IT professionals and line-of-business executives delivered directly to your inbox.

Featured Tech Jobs