Feeds

And for BlackBerry's next trick: Sawing Android, iOS IN HALF

'Secure' biz app and data on mobes to fall under BES spell

The essential guide to IT transformation

BlackBerry has built software to split apps and files on Android and iOS phones into so-called "Secure Work Spaces" to prevent workers from mixing business with pleasure.

These protected containers of data and applications will be managed by installations of BlackBerry Enterprise Server, effectively bringing BlackBerry OS 10's Balance feature - which also cleaves smartphones into work-safe and personal halves - to the forces threatening its future. Secure Work Space attempts to accommodate BlackBerry's rivals, which have gatecrashed what the smartphone maker considered a private party in the enterprise world.

BlackBerry's latest handsets include BlackBerry Balance, which allows the user to switch between work and home profiles. The business side remains under the control of your office sysadmin while the personal portion lies beyond his or her reach. This is designed for companies that issue everyone a BlackBerry handset, but such organisations are increasingly rare so extending the container concept to iOS and Android is a necessity for BlackBerry.

Secure Work Space won't be quite as elegant as Balance, which (for example) understands that one human can't be in two places at once so it won't let Home and Work appointments clash, but it will - we're told - provide a secure space in which applications are run and corporate data is stored, all in isolation from the untrusted operating system beneath.

But putting a secure space within an insecure environment is very difficult. Even Samsung isn't planning to put its competing KNOX system onto existing handsets, having declared it would require additional hardware - such electronics will be present in the Galaxy S4 (although may already have been snuck into a couple of Galaxy Notes).

BlackBerry reckons its reputation for security will engender confidence, and its skills in the area support that confidence, but it's still taking things slow with closed beta testing now and more details coming at BlackBerry Live in May.

It certainly seems as though secure containers are the preferred answer to the Bring-Your-Own-Device question: just managing each of those gadgets as one single handheld is not enough as enterprises and punters want to keep their own data private. Other device-management companies will respond with containers of their own, unless the narrowing field leaves just Samsung and BlackBerry competing for virtual space in business pockets. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Déjà vu: Virgin Media jacks up broadband prices
Screw copper phone lines, we're UNIQUE, bleats telco
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
What's the nature of your emergency, Vodafone?
Oh, you've dialled the wrong number for ad fibs, rules ASA
EE network whacked by 'PDP authentication failure' blunder
Carrier is 'aware' of cockup, working on a fix NOW
ROAD TRIP! An FCC road trip – Leahy demands net neutrality debate across US
You crashed watchdog's site, now time to crash its ears
Google's so smart it's discovered SHARKS HAVE TEETH
Congratulations, world media, for rediscovering submarine cable armour
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?