<form id="svpxb"></form>
    <wbr id="svpxb"><legend id="svpxb"></legend></wbr>
    <form id="svpxb"><legend id="svpxb"><noscript id="svpxb"></noscript></legend></form>
  1. <form id="svpxb"><span id="svpxb"></span></form>

    <form id="svpxb"></form>
    Skip Navigation

    CylancePERSONA

    Adaptive Security and AI to Protect Mobile Endpoints

    CylancePERSONA? uses machine learning and predictive AI to dynamically adapt a security policy based on user location, device and other factors. By improving the user experience, it protects against human mistakes and well-intentioned workarounds.

    Security that Travels and Adjusts with Your Users

    What if your security policies could relax when your users are at the office or other trusted spaces, or change dynamically if they’re traveling in a higher-risk location? Or if those policies could sense when something is amiss and automatically lock down a device?

    CylancePERSONA enables a Zero Trust?security environment, focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. ?

    Meet your highest security standards with CylancePERSONA.

    • Dynamically adapts a security policy based on user geolocation, device, time, IP address and BlackBerry? Dynamics? app identifiers.
    • Decreases the risk that comes with lost devices
    • Protects against device/app cloning and/or user impersonation?

    Continuous Authentication leverages passive biometrics and other usage-based patterns to continuously verify user identity in an unobtrusive fashion. A malicious user is automatically blocked from accessing apps when they exhibit anomalous behavior. This enhances the security posture and at the same time, improves the end user experience over having a static timeout.?

    CylancePERSONA creates the best experience for end users while ensuring the best security and compliance posture.

    • Streamlined access to apps and services without having to re-authenticate when in trusted locations
    • Adapts security and policy posture to actual context, versus applying only static policies
    • Enables “zero sign-in” and/or increasing timeouts if a user is in a low-risk pattern in high-trust location

    CylancePERSONA provides a contextual system for Unified Endpoint Management and protection.

    • Relaxes security policies when an end user is in a trusted location and dynamically adjusts when they travel to a higher-risk location
    • Adapts device security to local regulatory requirements as an employee travels from one country to another
    • Quarantines devices and apps before they can be used for malicious purposes

    CylancePERSONA allows the user experience design and security/policy posture to be mutually and dynamically optimized, versus in conflict.

    • Determines what level of access should be granted to any device or application at any given moment
    • Dynamically adapts security requirements for devices and applications without impacting performance
    • Proactively detects anomalous behavior and prevents potentially malicious activity?

    CylancePERSONA adds a layer of adaptive security to your existing UEM or UEM Cloud domain without introducing an additional software footprint.

    • Builds on existing investments in BlackBerry UEM, BlackBerry? Dynamics, and BlackBerry? Enterprise Identity
    • Can work with existing third-party infrastructure, like external IDPs (i.e. Ping, Okta, ADFS) or applications (i.e. Salesforce?, Microsoft? Office 365?)
    • Allows organizations to extend data, services and models with third-party threat detection systems
    Image of women at home and in office image of globe with risk scores Image of fingerprint and authentication challenge

    Featured White Paper: ESG Technical Validation of BlackBerry Intelligent Security

    Enterprise Strategy Group (ESG) recently completed testing of BlackBerry Intelligent Security. Testing focused on ease of deployment and management, and simplification of the user experience.

    Download this white paper to learn about their findings.

    DOWNLOAD

    How it Works

    CylancePERSONA, a part of the BlackBerry Spark? platform, uses analytics-driven security to provide trust within Zero Trust?environments. It adapts endpoint security policies based on situational risk:

    User Location

    CylancePERSONA uses Machine Learning to identify behavioral and location patterns of multiple users to determine location-based risk. Known work locations can also be preloaded.

    Network Trust

    CylancePERSONA determines the frequency of network use and adjusts security dynamically based on that profile. Accessing a public Wi-Fi for the first time would adjust the risk score accordingly.

    User Behavior

    CylancePERSONA can determine and build a contextual risk score based on learning how and when a user normally accesses data, identifying when the user’s behavior seems consistent and trusted (coming soon).

    Device and App DNA

    CylancePERSONA has the ability to determine whether a device and apps are compliant and up to date, and can adjust the security policy based on the device and app DNA profile (coming soon).

    AI, combined with spatial data, determine a real-time risk score that adapts security policies for the user to create the best experience and security posture. It can:

    • Grant access
    • Adopt a policy
    • Issue an authentication challenge
    • Alert and remediate

    Use Cases

    Image of woman entering door code
    Adaptive Policy: Regional Bank Manager

    Anne enters a retail branch

    Anne is the regional manager for a major retail bank. With CylancePERSONA, when she enters a retail branch, her presence is detected based on her mobile device’s geolocation. Her access to privileged apps appropriate for her role ?is automatically enabled upon her arrival. When she leaves, that access is disabled.

    Image of woman typing on keyboard
    Adaptive Policy: Office Professional

    Malicious hacker tries to access Salesforce app

    Sally is an inside sales employee who primarily works from a corporate office. When CylancePERSONA detects a combination of IP address, location and time that aren’t possible based on her last known access, it immediately denies access and takes remediating action to automate a logout, add the IP address to a watchlist and alert BlackBerry? UEM of the high-risk event.

    Image of soldier
    Adaptive Policy: Government Military Base

    Colonel Smith enters a restricted zone

    Colonel Smith works at a government military base that has a restricted, high-security zone. With CylancePERSONA, upon entering this zone, his camera and Bluetooth? connection are disabled and access to restricted websites is enabled. When he leaves, camera and Bluetooth are enabled and restricted website access is disabled.

    Get Started

    Contact us to get a free demo of how CylancePERSONA can use AI to secure all your mobile endpoints.

    Request a Demo
    Image of man and women talking in front of laptop

    Resources

    Featured

    White Paper: Zero Trust for Enterprise Mobility: The Brakes that Help Your Users Go Faster

    Download

    White Paper: Adaptive Security and AI to Protect Mobile Endpoints

    Download

    White Paper: Endpoint Security and Privacy in a Hyperconnected World

    Download

    Brochure: Security That Travels and Adapts to You

    Download View More Resources
    久操网