Premium Content

Access "BES 5.0.2 and Exchange 2010 SP1: What you should know "

Published: 12 Oct 2012

With the rapid evolution of the smartphone industry, IT administrators find themselves pulled in a few different directions -- ensuring compliance and security while staying flexible enough to support a diverse number of devices. Because it’s extremely difficult to physically secure and audit mobile devices, many administrators defer to BlackBerry devices, which provide granular security, compliance control and auditing capabilities through BlackBerry Enterprise Server (BES). A defining characteristic of the BlackBerry security model is the user/device pairing. The relationship of the BlackBerry device to a BlackBerry-enabled user is 1:1, meaning that a user can only synchronize with one device at a time. While this may not be optimal for all users, it has benefits that go beyond administrative. Users can configure BES 5.0.2 to translate their BlackBerry PIN to their network credentials. BES can then impersonate the user, allowing them access to Web-based apps, RIM apps and line-of-business applications without having to continually enter their credentials. ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free