Confirming a user's identity
Michael is the main point of contact for an important project that his team is working on. He regularly fields questions and requests from key stakeholders within the company.
As Michael travels between offices to work with different team members and meet with project contacts, he uses
BlackBerry Work
to keep up with his emails. Two weeks ago, Michael’s company implemented BlackBerry Persona
. His administrator enabled the continuous authentication feature.As Michael has been using
BlackBerry Work
, Persona
has been collecting data about how he uses the app, including the physical gestures and the app features that he typically uses. Persona
has used this information to train and develop a model that characterizes how Michael uses BlackBerry Work
on a daily basis.Michael is currently out of the office attending a conference. While he is having a discussion with a prospective customer, he sets his unlocked
Android
device on a table. Malcolm, an employee from a competing company, steals Michael’s device.Malcolm quickly leaves the conference hall and opens
BlackBerry Work
on Michael’s device. He forwards several confidential emails to his own email account. Persona
recognizes this as abnormal behavior that does not fit Michael’s usage model; Michael rarely forwards emails to other people. Persona
immediately triggers a reauthentication request in BlackBerry Work
. BlackBerry Work
and all other BlackBerry
Dynamics
apps on Michael’s device are blocked until the correct password or fingerprint is provided.