SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
! 
The NOC is 
“mission control.” 
Data actually 
runs through 
data centers. 
global infrastructure with data centers around the world 
None of these “challenges” can be validated. We’ll #BBFactCheck each one 
1 
Another 
first made 
possible by 
BlackBerry 
415 East Middlefield Road 
Mountain View, CA 94043 USA 
Tel. +1.650.919.8100 
Fax +1.650.919.8006 
info@mobileiron.com 
NOC: Network Operations 
Center (MobileIron has this 
confused with data center) 
Advantages of the NOC-less 
Architecture 
revolutionary 
When BlackBerry released their first e-mail enabled device in 1999, there were 
significant architectural challenges to overcome. Mobile networks were not 
inherently reliable and were optimized for occasional data use rather than always-on 
connectivity. BlackBerry’s service, designed to deliver always on, push e-mail 
services, leveraged a unique NOC-based architecture to overcome these 
challenges. Using the NOC, BlackBerry maintained network connections to each 
carrier, allowing them to provide secure network access from corporate enterprises 
to mobile devices across disparate networks with varying qualities of service. Other 
vendors in the email mobilization market would quickly follow suit with similar 
models. 
While the NOC architecture had technological advantages for the time, it was not 
without fault. First, the NOC represented a single point of transit for all e-mail 
communications, representing concerns for both availability and security. Second, 
the NOC architectures presented potential issues with regard to security. And third, 
NOC-based solutions present significant challenges in terms of scale. 
Fortunately, alternatives to the NOC have since been developed and today’s mobile 
networks are inherently more reliable making the NOC obsolete. This whitepaper 
will explore the challenges that the NOC poses in the modern mobility world and 
new architectures that can solve these challenges. 
Service Reliability 
One challenge with NOC-based architectures is that the NOC results in a single 
point where all enterprise mobile traffic traverses. This poses two challenges, one of 
reliability and another of security. 
From a reliability perspective, an end user’s access to enterprise e-mail, data and 
applications is only as good as the NOC’s connectivity. When the NOC goes down, 
devices instantaneously lose connectivity to enterprise resources, even if those 
resources are highly available within the enterprise. In the last six years, 
BlackBerry’s NOC experienced seven major outages that were reported in the 
press. During those outages, millions of subscribers completely access to their e-mail 
The modern mobility world needs to be secure, 
multi-platform and easily manageable. 
and other services like mobile intranet access via BlackBerry Mobile Data 
Services (MDS) until service was restored. 
Next generation EMM systems do not have the same architectural constraints as 
previous, NOC-based systems. Because platforms like MobileIron use an 
application proxy to transfer data from the endpoint to the corporate resources, 
availability can be architected to whatever SLA the enterprise desires. Without a 
single point of failure as a part of the architecture, failover and availability can be 
handled not just across individual components (e.g. a load balancer, or a Sentry) but 
across entire datacenters for mission-critical deployments. 
BlackBerry does NOT rely on 
a single point of data transfer 
All of our customers' data remained locked down and secure as we worked to 
restore 
connectivity 
BES10 architecture also 
allows for flexibility 
Failovers are built 
into the BlackBerry 
architecture. 
TO BLACKBERRY 
ENTERPRISE 
SERVICE 10 (BES10) 
The global BlackBerry network 
has 99.9% average uptime over 
the past four years.
! 
2! 
Figure 1: A network diagram showing Sentry architected in a cluster for high 
availability. This cluster could be replicated across datacenters for multi site 
resiliency if desired. 
False. With BlackBerry, the 
security of your data is always 
in the control of the customer 
because they are the only ones 
that have access to the keys 
used to protect BES traffic. 
Data Security 
From a security perspective, the NOC architecture represents a single point at 
which traffic can be intercepted. While NOC-based vendors generally institute 
cryptographically secured sessions between the endpoint and the enterprise 
servers, there have been concerns around placement of alternate NOCs for 
governments to intercept device traffic and the security of these systems. 
With MobileIron, organizations control their data. Sessions are cryptographically 
secured between the endpoint and Sentry to ensure confidentiality of data between 
the endpoint and the device. Sessions can be also validated with the use of 
certificates to ensure integrity between the mobile device and the Sentry server. 
These two factors, combined with the lack of a central point of intercept, helps to 
ensure a high degree of confidentiality and integrity for mobile data sessions. 
Scale 
NOC based solutions have face significant scale challenges. BlackBerry servers 
have, traditionally, only been able to scale to 2000 devices per management server. 
Similar NOC-based architectures face the same scale challenges. While there are 
many ways to scale these architectures to tens of thousands of devices, these 
deployments end up resulting in a high degree of complexity and a high total cost of 
ownership. As an example, a NOC-based platform might support 35,000 within a 
single management domain, but might require upwards of 36 servers; one server 
per 1000 devices for mail relay and data transport, plus the central management 
console. When one adds the additional complexity of OS and database server 
This ensures your data is 
protected as it travels 
across carrier networks, the 
internet and anywhere else. 
BlackBerry also supports 
the use of strong VPNs as 
an additional way to protect 
your sensitive traffic. 
Security-focused enterprises need an end-to-end solution, 
which only BlackBerry can provide. 
This is false. BES10 can 
handle up to 100,000 
devices per domain, allowing 
us to handle mobility needs 
for the biggest companies 
in the world. 
BES10 is the lowest TCO 
EMM solution on the market
! 
See note on TCO above… The BlackBerry cloud 
licenses, plus physical or virtual hardware resources, the overall cost of managing a 
NOC-based EMM system is extraordinarily high. 
By comparison, a modern EMM system can be deployed either as a series of 
appliances, or as a cloud-based service, which reduces overall complexity. 
MobileIron has been built specifically to address the needs of securing and 
managing modern mobile devices and has no overhead from legacy architecture to 
contend with. Because of this, MobileIron’s management platform is able to manage 
not just tens of thousands, but instead 100,000 devices per appliance. MobileIron is 
also able to replicate the same access control and data tunneling resources as a 
NOC infrastructure using Sentry as an inline data proxy. Again, the lack of legacy 
overhead allows MobileIron Sentry to manage upwards of 10,000 simultaneous 
application or email sessions per appliance, compared to only a thousand or two for 
legacy competitors. In short, the lack of a legacy NOC to contend with affords 
MobileIron upwards of a 3x performance scale improvement at the management 
and policy layer and a 9x improvement in data traffic security over legacy, NOC-based 
3! 
architectures. 
BES10 does this too! 
This doesn’t even make sense… BlackBerry 
uses the AES-256 bit encryption for all 
data in-transit and at-rest. The BES10 
Conclusion 
While NOC-based architectures solved several challenges in the early days of 
mobile, wireless networks have caught up in reliability, obviating the need for the 
NOC architecture. There are solutions today, like MobileIron, which can address the 
challenges posed by the NOC while still providing availability, confidentiality and 
integrity for mobile information. 
offering is in market 
preview 
BlackBerry’s network 
architecture was 
built with security in 
mind from the very 
beginning, long before 
MobileIron was even 
a company. 
BlackBerry’s NOC and data center architecture beats 
the competition in all three customer-based needs: 
reliability, data security and scale. #BBFactCheck 
architecture 
allows it to manage 
up to 20,000 
simultaneous 
applications or 
email sessions 
per server.

Weitere ähnliche Inhalte

Mehr von BlackBerry

Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
BlackBerry
 

Mehr von BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
anilsa9823
 

Kürzlich hochgeladen (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

Educating MobileIron on the "NOC"

  • 1. ! The NOC is “mission control.” Data actually runs through data centers. global infrastructure with data centers around the world None of these “challenges” can be validated. We’ll #BBFactCheck each one 1 Another first made possible by BlackBerry 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com NOC: Network Operations Center (MobileIron has this confused with data center) Advantages of the NOC-less Architecture revolutionary When BlackBerry released their first e-mail enabled device in 1999, there were significant architectural challenges to overcome. Mobile networks were not inherently reliable and were optimized for occasional data use rather than always-on connectivity. BlackBerry’s service, designed to deliver always on, push e-mail services, leveraged a unique NOC-based architecture to overcome these challenges. Using the NOC, BlackBerry maintained network connections to each carrier, allowing them to provide secure network access from corporate enterprises to mobile devices across disparate networks with varying qualities of service. Other vendors in the email mobilization market would quickly follow suit with similar models. While the NOC architecture had technological advantages for the time, it was not without fault. First, the NOC represented a single point of transit for all e-mail communications, representing concerns for both availability and security. Second, the NOC architectures presented potential issues with regard to security. And third, NOC-based solutions present significant challenges in terms of scale. Fortunately, alternatives to the NOC have since been developed and today’s mobile networks are inherently more reliable making the NOC obsolete. This whitepaper will explore the challenges that the NOC poses in the modern mobility world and new architectures that can solve these challenges. Service Reliability One challenge with NOC-based architectures is that the NOC results in a single point where all enterprise mobile traffic traverses. This poses two challenges, one of reliability and another of security. From a reliability perspective, an end user’s access to enterprise e-mail, data and applications is only as good as the NOC’s connectivity. When the NOC goes down, devices instantaneously lose connectivity to enterprise resources, even if those resources are highly available within the enterprise. In the last six years, BlackBerry’s NOC experienced seven major outages that were reported in the press. During those outages, millions of subscribers completely access to their e-mail The modern mobility world needs to be secure, multi-platform and easily manageable. and other services like mobile intranet access via BlackBerry Mobile Data Services (MDS) until service was restored. Next generation EMM systems do not have the same architectural constraints as previous, NOC-based systems. Because platforms like MobileIron use an application proxy to transfer data from the endpoint to the corporate resources, availability can be architected to whatever SLA the enterprise desires. Without a single point of failure as a part of the architecture, failover and availability can be handled not just across individual components (e.g. a load balancer, or a Sentry) but across entire datacenters for mission-critical deployments. BlackBerry does NOT rely on a single point of data transfer All of our customers' data remained locked down and secure as we worked to restore connectivity BES10 architecture also allows for flexibility Failovers are built into the BlackBerry architecture. TO BLACKBERRY ENTERPRISE SERVICE 10 (BES10) The global BlackBerry network has 99.9% average uptime over the past four years.
  • 2. ! 2! Figure 1: A network diagram showing Sentry architected in a cluster for high availability. This cluster could be replicated across datacenters for multi site resiliency if desired. False. With BlackBerry, the security of your data is always in the control of the customer because they are the only ones that have access to the keys used to protect BES traffic. Data Security From a security perspective, the NOC architecture represents a single point at which traffic can be intercepted. While NOC-based vendors generally institute cryptographically secured sessions between the endpoint and the enterprise servers, there have been concerns around placement of alternate NOCs for governments to intercept device traffic and the security of these systems. With MobileIron, organizations control their data. Sessions are cryptographically secured between the endpoint and Sentry to ensure confidentiality of data between the endpoint and the device. Sessions can be also validated with the use of certificates to ensure integrity between the mobile device and the Sentry server. These two factors, combined with the lack of a central point of intercept, helps to ensure a high degree of confidentiality and integrity for mobile data sessions. Scale NOC based solutions have face significant scale challenges. BlackBerry servers have, traditionally, only been able to scale to 2000 devices per management server. Similar NOC-based architectures face the same scale challenges. While there are many ways to scale these architectures to tens of thousands of devices, these deployments end up resulting in a high degree of complexity and a high total cost of ownership. As an example, a NOC-based platform might support 35,000 within a single management domain, but might require upwards of 36 servers; one server per 1000 devices for mail relay and data transport, plus the central management console. When one adds the additional complexity of OS and database server This ensures your data is protected as it travels across carrier networks, the internet and anywhere else. BlackBerry also supports the use of strong VPNs as an additional way to protect your sensitive traffic. Security-focused enterprises need an end-to-end solution, which only BlackBerry can provide. This is false. BES10 can handle up to 100,000 devices per domain, allowing us to handle mobility needs for the biggest companies in the world. BES10 is the lowest TCO EMM solution on the market
  • 3. ! See note on TCO above… The BlackBerry cloud licenses, plus physical or virtual hardware resources, the overall cost of managing a NOC-based EMM system is extraordinarily high. By comparison, a modern EMM system can be deployed either as a series of appliances, or as a cloud-based service, which reduces overall complexity. MobileIron has been built specifically to address the needs of securing and managing modern mobile devices and has no overhead from legacy architecture to contend with. Because of this, MobileIron’s management platform is able to manage not just tens of thousands, but instead 100,000 devices per appliance. MobileIron is also able to replicate the same access control and data tunneling resources as a NOC infrastructure using Sentry as an inline data proxy. Again, the lack of legacy overhead allows MobileIron Sentry to manage upwards of 10,000 simultaneous application or email sessions per appliance, compared to only a thousand or two for legacy competitors. In short, the lack of a legacy NOC to contend with affords MobileIron upwards of a 3x performance scale improvement at the management and policy layer and a 9x improvement in data traffic security over legacy, NOC-based 3! architectures. BES10 does this too! This doesn’t even make sense… BlackBerry uses the AES-256 bit encryption for all data in-transit and at-rest. The BES10 Conclusion While NOC-based architectures solved several challenges in the early days of mobile, wireless networks have caught up in reliability, obviating the need for the NOC architecture. There are solutions today, like MobileIron, which can address the challenges posed by the NOC while still providing availability, confidentiality and integrity for mobile information. offering is in market preview BlackBerry’s network architecture was built with security in mind from the very beginning, long before MobileIron was even a company. BlackBerry’s NOC and data center architecture beats the competition in all three customer-based needs: reliability, data security and scale. #BBFactCheck architecture allows it to manage up to 20,000 simultaneous applications or email sessions per server.