BlackBerry Persona Desktop delivers zero-trust security at the endpoint

New security solution learns user behavior and can take action if there’s an abnormality

screen showing BlackBerry Persona interface

BlackBerry has announced BlackBerry Persona Desktop, an all-new security solution that uses advanced artificial intelligence (AI) and machine learning to detect user and entity behavior abnormalities.

Once the new BlackBerry Persona Desktop notices an irregularity in behavior, it protects the endpoint, network and data. 

BlackBerry Persona Desktop works at the endpoint, eliminating the need to share data back to the cloud before acting. This allows it to work in real-time with minimal delay to prevent hacks and data breaches.

On top of working faster, BlackBerry Persona Desktop also protects against even the most challenging security challenges, including:

  • Stolen credentials: Persona Desktop protects in the event of stolen credentials by learning how a user works and their interaction with a device. If Persona Desktop senses abnormal interaction, it sends an alert through the cloud and takes other threat-mitigation actions, like asking for second-factor authentication. 
  • Insider threats: If a rogue employee attempts to breach your system, the Persona Desktop can detect the abnormal behavior and flag the risk. It’ll then alert the administrator, who determines what action Persona Desktop takes to mitigate the threat. 
  • Physical compromise: If someone physically compromises or steals a device, BlackBerry Persona Desktop uses biometric capabilities, including keystrokes and mouse movement, to sense a different user and alert an administrator or lock the user out. 

BlackBerry Personal is available with the BlackBerry Cyber Suite, which is a unique combination of endpoint protection (EPP), mobile threat defense (MTD), endpoint detection and response (EDR), and user and entity behavior analytics (UEBA) products together in one package.

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

BillQuick billing software exploit lets hackers deploy ransomware
Security

BillQuick billing software exploit lets hackers deploy ransomware

26 Oct 2021
Ransomware hit industrial sector the hardest in the third quarter
ransomware

Ransomware hit industrial sector the hardest in the third quarter

25 Oct 2021
Tesco services knocked offline after suspected cyber attack
hacking

Tesco services knocked offline after suspected cyber attack

25 Oct 2021
Microsoft touts new cyber security help for nonprofits
cyber security

Microsoft touts new cyber security help for nonprofits

22 Oct 2021

Most Popular

UK spy agencies supercharge espionage efforts with AWS data deal
cloud computing

UK spy agencies supercharge espionage efforts with AWS data deal

26 Oct 2021
Cryptocurrency: Should you invest?
cryptocurrencies

Cryptocurrency: Should you invest?

27 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021