BlackBerry Persona Desktop delivers zero-trust security at the endpoint

New security solution learns user behavior and can take action if there’s an abnormality

screen showing BlackBerry Persona interface

BlackBerry has announced BlackBerry Persona Desktop, an all-new security solution that uses advanced artificial intelligence (AI) and machine learning to detect user and entity behavior abnormalities.

Once the new BlackBerry Persona Desktop notices an irregularity in behavior, it protects the endpoint, network and data. 

BlackBerry Persona Desktop works at the endpoint, eliminating the need to share data back to the cloud before acting. This allows it to work in real-time with minimal delay to prevent hacks and data breaches.

On top of working faster, BlackBerry Persona Desktop also protects against even the most challenging security challenges, including:

  • Stolen credentials: Persona Desktop protects in the event of stolen credentials by learning how a user works and their interaction with a device. If Persona Desktop senses abnormal interaction, it sends an alert through the cloud and takes other threat-mitigation actions, like asking for second-factor authentication. 
  • Insider threats: If a rogue employee attempts to breach your system, the Persona Desktop can detect the abnormal behavior and flag the risk. It’ll then alert the administrator, who determines what action Persona Desktop takes to mitigate the threat. 
  • Physical compromise: If someone physically compromises or steals a device, BlackBerry Persona Desktop uses biometric capabilities, including keystrokes and mouse movement, to sense a different user and alert an administrator or lock the user out. 

BlackBerry Personal is available with the BlackBerry Cyber Suite, which is a unique combination of endpoint protection (EPP), mobile threat defense (MTD), endpoint detection and response (EDR), and user and entity behavior analytics (UEBA) products together in one package.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

IT security awareness and training firm KnowBe4 acquires MediaPRO
Acquisition

IT security awareness and training firm KnowBe4 acquires MediaPRO

3 Mar 2021
High-risk email security threats increased by 32% last year
phishing

High-risk email security threats increased by 32% last year

3 Mar 2021
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021
Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021

Most Popular

How to build a CMS with React and Google Sheets
content management system (CMS)

How to build a CMS with React and Google Sheets

24 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021