BlackBerry 10 Achieves FIPS Certification

By

Research In Motion (RIM) announces FIPS 140-2 certification for the BlackBerry 10 platform.

According to the announcement, FIPS (Federal Information Processing Standard) certification “provides confidence” to security-conscious organizations and regulated companies that data on smartphones running BlackBerry 10  can be properly secured and encrypted.

This certification in advance of the BlackBerry 10 platform release, which is expected in January 2013, will allow government agencies to deploy BlackBerry 10 smartphones and BlackBerry Enterprise Service 10, RIM’s new mobile enterprise management solution, immediately upon launch. The announcement states that this is the first time BlackBerry products have been FIPS certified ahead of launch.

“IDC expects the mobile enterprise security market to experience a high rate of growth from 2012 to 2016,” said Stacy Crook, Program Manager for Mobile Enterprise research at IDC. “Maintaining the BlackBerry solution’s reputation for security while introducing an enhanced user experience gives BlackBerry 10 the opportunity to be a highly competitive platform in the government, enterprise and consumer sectors.”

BlackBerry products and solutions are protected by AES 256-bit encryption, a highly secure data protection standard.

11/15/2012

Related content

  • VMware AirWatch mobile device management
    Tame your mobile device zoo with the VMware mobile security solution AirWatch.
  • Secure remote access and web applications with two-factor authentication
    Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present potential approaches for common use cases.
  • New security features in Windows 10
    With each version of Windows, Microsoft has expanded the built-in security functions. Windows 10 includes a number of new and interesting security features.
  • Nine home clouds compared
    Dropbox was the first of a number of cloud service providers. However, only services that promise full control over your own data can give users a feeling of security. We provide an overview of nine cloud projects and two BitTorrent tools.
  • Two-Factor Authentication

    Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present potential approaches for common use cases.

comments powered by Disqus