Thread: iPad v. A500
View Single Post
  #95  
Old 09-03-2012, 09:38 PM
MCSL MCSL is offline
Officially Welcomed to the 'Fest
Location: Nor Cal
 
Join Date: Jan 2005
Posts: 2,349
Mein Auto: 330i
For business users who supply BlackBerry smartphones or tablets to employees, BlackBerry Balance is the perfect way to keep business and personal content separate.

The application allows IT managers to partition the BlackBerry, so staff are not able to copy and share work data to their personal applications. There is also a big advantage to the employee with BlackBerry Balance - using the app will allow them to still use all the personal apps they want, such as social networking, therefore eliminating the need to carry a second 'personal' device – everyone is a winner. BlackBerry Balance is all about giving businesses peace of mind.

A major headache for CIOs and IT managers is preventing the accidental leakage of data from smartphones and tablet computers when employees use these devices in both their personal and professional lives. RIM is helping managers address this with tools such as BlackBerry® BalanceTMtechnology, which enables businesses to protect their assets while letting employees install their favourite applications. BlackBerry Balance is designed to separate corporate and personal data within the operating system of BlackBerry smartphones and BlackBerry PlayBook tablets. This ensures, for example, that a user can't copy and paste data from a work app into a personal app. This prevents accidental or deliberate sharing of company data through the user's personal email or social media accounts.

Mobile devices can be easily lost or stolen so companies need to take steps to secure data stored on the devices and prevent unauthorised users from accessing corporate networks. Companies need to look for end-to-end solutions, from on-device features to centralised management of end-user handsets and tablets. Some features to look for include the ability to protect corporate data stored on devices using strong encryption methods; IT controls to remotely lock, wipe or de-register devices in the event that they are lost or stolen; and the ability to wirelessly adjust security levels up or down or implement new policies without needing to touch devices.

Reply With Quote