PRO+ Premium Content/Exchange Insider

Thank you for joining!
Access your Pro+ Content below.
February 2011, Vol. 8

BES 5.0.2 and Exchange 2010 SP1: What you should know

With the rapid evolution of the smartphone industry, IT administrators find themselves pulled in a few different directions -- ensuring compliance and security while staying flexible enough to support a diverse number of devices. Because it’s extremely difficult to physically secure and audit mobile devices, many administrators defer to BlackBerry devices, which provide granular security, compliance control and auditing capabilities through BlackBerry Enterprise Server (BES). A defining characteristic of the BlackBerry security model is the user/device pairing. The relationship of the BlackBerry device to a BlackBerry-enabled user is 1:1, meaning that a user can only synchronize with one device at a time. While this may not be optimal for all users, it has benefits that go beyond administrative. Users can configure BES 5.0.2 to translate their BlackBerry PIN to their network credentials. BES can then impersonate the user, allowing them access to Web-based apps, RIM apps and line-of-business applications without having to ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue