BlackBerry Balance is a product that we have covered a few times here, but it is also one of those topics that many people may not have actually paid too much attention to as it doesn't affect us all. For business users who supply BlackBerry smartphones or tablets to employees, BlackBerry Balance is the perfect way to keep business and personal content separate and the above new video from RIM demonstrates this in a simple fashion.
The application allows IT managers to partition the BlackBerry so staff are not able to copy and share work data to their personal applications. There is also a big advantage to the employee with BlackBerry Balance - using the app will allow them to still use all the personal apps they want, such as social networking, therefore eliminating the need to carry a second 'personal' device - everyones a winner. BlackBerry Balance is all about giving businesses peace of mind and from an outsiders point of view it looks to be the perfect tool.
Coincidentally I got the following quote from Alexandra Zagury today who is the Managing Director for Research in Motion South and Southern Africa:
A major headache for CIOs and IT managers is preventing the accidental leakage of data from smartphones and tablet computers when employees use these devices in both their personal and professional lives. RIM is helping managers address this with tools such as BlackBerry® BalanceTMtechnology, which enables businesses to protect their assets while letting employees install their favourite applications. BlackBerry Balance is designed to separate corporate and personal data within the operating system of BlackBerry smartphones and BlackBerry PlayBook tablets. This ensures, for example, that a user can't copy and paste data from a work app into a personal app. This prevents accidental or deliberate sharing of company data through the user's personal email or social media accounts.
Mobile devices can be easily lost or stolen so companies need to take steps to secure data stored on the devices and prevent unauthorised users from accessing corporate networks. Companies need to look for end-to-end solutions, from on-device features to centralised management of end-user handsets and tablets. Some features to look for include the ability to protect corporate data stored on devices using strong encryption methods; IT controls to remotely lock, wipe or de-register devices in the event that they are lost or stolen; and the ability to wirelessly adjust security levels up or down or implement new policies without needing to touch devices.