September 11, 2012 at 12:06 pm #7890
I have been asked to perform a vulnerability assessment of a Blackberry Enterprise Server later in October and frankly, I don’t know much about it…
Does anyone know about some good reading, tools and/or methodologie?
I couldn’t find much on the web…
September 11, 2012 at 1:17 pm #49806m0wgliParticipant
The National Vulnerability database has the DoD requirements for securing BES (currently 5.0.3):
Hopefully, you’ll at least get an overview of what can be secured and inversely any possible vulnerabilities if there not implemented.
September 11, 2012 at 5:25 pm #49807
Thanks, I will start with that and see what I can find from there.
I will post my findings…
December 31, 2012 at 8:37 am #49808amol_dParticipant
hey so how did it go? I was hoping to read about your experience on this one
December 31, 2012 at 2:46 pm #49809
I ended up working with two guys who knew more about it than me, so I didn’t much myself.
But they spent more time looking at the policies than anything else. So for what I have seen, RIM seems to know what they are doing and they kind of making it easy for people to secure the Blackberry Enterprise Server infrastructure properly.
So sorry about this, but I ended up not doing much on that regard.
January 1, 2013 at 4:44 am #49810amol_dParticipant
no worries and Thanks for the reply hitmonkey. i suppose what you could and could not do would be based on the contract with the client.
January 2, 2013 at 1:16 am #49811
Yes, indeed. And I was quite busy on other things…
January 6, 2013 at 3:28 pm #49812TribanParticipant
Yeah BES is pretty cut and dry. Keep it patched and configure the policies correctly, then there isn’t much to worry about. Granted you compromise a BES server and you have a nice MIM for the corporate email. Compared to the other mobile solutions out there, BES is still top notch for securely sending data to your mobile workforce. Not to mention you have the ability to centrally manage the phones without adding other 3rd party solutions. As much as I hate the blackberry phone itself, I can’t argue about the security of the device. Going to a full Microsoft solution, you still need something to manage the applications and other non-Exchange related data. Though that all may be changing with Windows 8 mobile and Exchange 2010. MS has InTune which comes in local or cloud flavor (pick your debates for that one). Depending on the cost, it may make moving platforms to Windows mobile a considerable idea. I think BES currently runs almost 100 bucks a license for SMBs, 500 or more drops to 55 a license. For a Windows 8 solution, ActiveSync would be use to talk to Exchange. That should still have the ability to lock and remote-wipe a device. But managing the device configurations would require a subscription to InTune which is 6-11 per device per month. So the an org with 500 devices is looking at 65K a year to manage them. Exchange and ActiveSync are already bought and paid for. BES I believe is a one time cost with yearly support costs. So MS is looking a bit higher in the price tag.
Anyway sorry a bit off topic, but good things to way if an organization is thinking of moving away from BES in order to look at a BYOD type solution or switch to Microsoft only platform.
January 7, 2013 at 12:55 pm #49813
And RIM’s new Blackberry OS 10, with their multi-layered security model seems promessing too.
I used to be a BB fan, but now that I have an Android phone, I wouldn’t go back…
But like you said, you can’t blame RIM for not taking security seriously.
January 14, 2013 at 3:09 am #49814TribanParticipant
RIM has always been the EZ-Mode for Mobile security I think, compared to Apple/Android. I am in the middle of doing a mobile device security assessment between tablet platforms. Luckily Android is out per the corp response. But that still leaves us with Apple and Windows. Apple is proven technology, but their love for the enterprise is non-existent. MS has huge support for the enterprise and will sometimes jump through hoops to customize something, but their tech has not been out long enough. In either case both solutions require a 3rd party MDM/MAM solution to secure the devices. I would love to say “get whatever, we only support VDI or Citrix with no local data storage” but not quite there yet.
- You must be logged in to reply to this topic.