PLAGIARISM FREE WRITING SERVICE
We accept
MONEY BACK GUARANTEE
100%
QUALITY

Unilever Secures Its CELLULAR DEVICES Computer Knowledge Essay

Content
  1. BlackBerry mds services act as a secure gateway between the wireless network and commercial intranets and the internet. They leverage the BlackBerry aes or Triple des encryption carry and also allow https associations to application machines. BlackBerry smartphones support https communication in one of two settings, depending on corporate and business security requirements: Proxy Function: An ssl/tls connection is created between BlackBerry Enterprise Server and the application form server with respect to BlackBerry smartphones. Data from the application server is then aes or Triple des encrypted and sent over the cordless network to BlackBerry smartphones. End-to-End Function: Data is encrypted over ssl/tls for the entire connection between BlackBerry smartphones and the application form server, making end-to-end method connections best suited for applications where only the purchase end-points are trusted. BlackBerry smartphones applications made out of the BlackBerry java development environment (jde), that have certain functionality such as the ability to do on startup or even to access potentially sensitive BlackBerry smartphone software data, require programmers to hint and sign-up their applications with Research In Movement. This adds coverage by providing a greater degree of control and predictability to the launching and patterns of applications on BlackBerry smartphones. On top of that, the BlackBerry putting your signature on authority tool can help protect usage of the functionality and data of alternative party applications by enabling corporate creators or administrators to control usage of specific sensitive Program Encoding Interfaces and data stores by using server-side software and open public and private personal keys. To help protect BlackBerry mds Studio room applications from tampering, corporate and business developers can sign an application bundle with a digital certificate. (Research In Motion, 2011)
  2. They can use either a trusted certificate expert or a produced certificate. BlackBerry mds studio generates and indications applications with certificates that are in line with the general public key infrastructure (X. 509) standard. For stored data security, The BlackBerry Venture Solution extends commercial security to the cellular device and provides administrators with tools to control this security. To secure information stored on BlackBerry smartphones, security password authentication can be produced necessary through the customizable IT procedures of the BlackBerry Business Server. By default, password authentication is limited to ten attempts and the device's memory is erased. Local encryption of most data (emails, address book entries, calendar entries, memos and duties) may also be enforced via IT policy.
  3. And with the Security password Keeper, advanced encryption standard (aes) encryption technology allows password entries to be stored firmly on these devices. Additionally, system administrators can create and send cordless directions to remotely change BlackBerry smartphone passwords and lock or delete information from lost or stolen BlackBerry smartphones. The BlackBerry Organization Server Security also is a form of security. BlackBerry Venture Server does not store any email or data. To increase security from unauthorized celebrations, there is absolutely no staging area between the server and the BlackBerry smartphone where data is decrypted. Security is further increased by allowing only authenticated, outbound-initiated relationships through port 3101 of the firewall. No inbound traffic is allowed from sources apart from the BlackBerry smartphone or the e-mail server, indicating unauthorized commands cannot be executed on the system. Only communications that can be decrypted with a valid encryption key are allowed between the server and the wireless network. (Research In Movement, 2011)
  4. The three pictures I have attached give a further insight concerning the way the security works.

As a student of John Byrnes training, I am doing the research study entitled "Unilever secures its mobile devices". The principal objective of this assignment is to determine and evaluate the impact wireless devices including the BlackBerry mobile handsets are having on the business and how they are increasing production and performance. Another objective includes examining security features that Blackberry offers its users, and what impact a security breach might well have on this multi-national company. Last but not least, my objective is to make my own evaluations and make my very own tips on what else could be achieved to improve this example and also what else could be done to improve the performance of the company.

Unilever is a multi-national company stretches across all the continents on the globe such as Asia, Africa, The Americas and Oceania. They may be well known for developing brands such as Dove, Lux and Vaseline as personal hygiene products. They are also globally known because of their food brands including Flora, Lipton and Pavements. (Unilever, 2011). As a worldwide company, performance must be at their perfect levels to ensure operational excellence in the business. In March 2004, Unilever's mature management ordered the company's thousand top professionals to be prepared with mobile handheld devices to increase their output. The company preferred BlackBerry 7100, 7290, and 8700 handhelds from Research in Movement because they were the leader in their category and they caused hetero- geneous e-mail machines and multiple wireless network expectations, including CDMA and Wi-Fi. These handsets have allowed the executives to basically focus on the move, and keep an eye on the company's performance such as sales numbers. It has allowed them to check their messages, and answer them promptly. This handset also allowed the executives to discuss more with the clients. Due to the introduction of Blackberry handsets to the company; it has increased output and performance. This is shown through the company's 2005 annual record/review. The company's turnover was $49, 352, 000, 000 USD. This was an increase from their 2004 turnover by 1, 608, 000, 000 USD. Another interesting statistic which was within the 2005 charts was that their world wide web profit margins increased by 2. 4 % to 10% in 2005. The business's net profit also marginally increased from $3, 641, 000, 000 USD in 2004 to $ 4, 945, 000, 000 USD in 2005. These characters may be used to show the affect that mobile handsets have had on the business's performance.

I have fastened the 2005 Unilever graphs for a further understanding of the changes in the web income and the web profit. For the net profit graph, the inexperienced lines is the signal for the US us dollars and the light dark brown range in the income graph is employed to show the web profit margin changes. I have also included the turnover graph and the inexperienced brand shows the turnover in USD.

A security breach at Unilever might lead to severe harm to the company for a while and lasting. A security breach can be induced through many things, including through the hacking of the BlackBerry handsets and their company computer systems, or it could be caused of a straightforward problem such as misplacing your telephone or departing it susceptible to be stolen. The BlackBerry handsets and Unilever pcs and notebooks have sensitive data stored in them such as customer information and confidential company information. The loss of customer information may lead to the company to be sued by the clients. It is Unilever's responsibility to ensure the protection of the data. Another threat is unauthorized users who are able to access corporate networks. This may lead to the benefits of computer infections and worms. If this is to happen, everything which was stored may be corrupted and destroyed. Such an event can greatly cripple the company's ability to perform, and may even drive them out of business if indeed they don't have a back up system set up. The loss of private company information such as sales statistics and sales forecasting data can lead to a loss of revenue and allow competitors to utilize this information to a full extent to get an upper benefits on the market. Finally, security breaches likewise have the ability to tarnish a companies' reputation and put the business under scrutiny. So far, Unilever has not been affected with a security breach.

In 2004, the Unilever professionals were outfitted with BlackBerry handsets in a bet to raise the company's performance. In the event the security steps are too severe, then executives will never be in a position to use these devices efficiently, which means that this will have a poor impact on the businesses ability to execute business thoroughly. By using example, a management factor that must definitely be taken into consideration is that to make certain that the security procedures and techniques don't hinder the company's capability to conduct business. Both these issues must be placed balanced. Within this workplace, some professionals know that they have a tool which is associated with the company's information and repository and know very well what the effects can be if the device enters some unauthorized people hands. On the other hand, there are professionals who are not aware of the consequences this can have. Therefore, an organization factor that must be considered is having less knowledge. Many steps can be studied to ensure this won't happen. Some steps can include offering a training curriculum to the professionals about the proper use of the BlackBerry handset and so forth. A scientific factor that needs to be addressed is deciding the features of the cordless handheld device required. These requirements must reach a balance between its security features, how user friendly the device is as well as its cost. Unilever determined that handful of BlackBerry models best suited their needs. Each company will have different needs and priorities. Management, group and scientific factors that need to be studied into consideration depends on those needs and priorities.

BlackBerry Enterprise Solutions allows you to mobilize your work place, your personnel can make timely decisions based on the best information available, increasing their production and boosting your business performance. The BlackBerry Business Solution allows mobile users to access communications and information wirelessly, including email and texting, corporate data and the organizer. It offers provided Unilever with benefits that include versatility and lowest total cost of procedure of mobile business solutions. For versatility, this solution helps all leading organization email platforms, back-end systems and applications from a variety of vendors. It also allows you to manage multiple wireless network systems, devices, messaging machines and enterprise systems with an individual BlackBerry Business Server. The BlackBerry Venture Solution allows organizations to keep their workers connected to the information and people that matter, while still profiting from a low overall total cost of procedure. This solution offers very good cellular data security and stored data security. For wireless data security, end to end encryption and rsa secur-id two factor authentications are utilized. In end to end encryption, the BlackBerry Business Solution offers two transportation encryption options, advanced encryption standard (aes) and triple data encryption standard (triple des), for many data transmitted between BlackBerry Business Server and BlackBerry smartphones. Private encryption keys are generated in a secure, two-way authenticated environment and are designated to each BlackBerry smartphone consumer. Each top secret key is stored only in the user's secure venture bank account such as Microsoft Exchange and on the BlackBerry smartphone and can be regenerated wirelessly by an individual. (Research In Action, 2011),

Data delivered to the BlackBerry smartphone is encrypted by BlackBerry Venture Server using the private key retrieved from the user's mailbox. The encrypted information travels securely over the network to the device where it is decrypted with the main element stored there. Data remains encrypted in transit and is never decrypted beyond the organization firewall. Rsa secur-id two factor authentications provides organizations with additional authorization when users access software data or corporate intranets on their BlackBerry smartphones. BlackBerry mds Services (mobile data system) utilize rsa ace/agent authorization api 5. 0 to interface to rsa ace servers. Users are prompted for their username and token passcode when navigating to a niche site or application needing authorization. Other security features include https secure data gain access to and code signing and digital certificates. (Research In Action, 2011)

BlackBerry mds services act as a secure gateway between the wireless network and commercial intranets and the internet. They leverage the BlackBerry aes or Triple des encryption carry and also allow https associations to application machines. BlackBerry smartphones support https communication in one of two settings, depending on corporate and business security requirements: Proxy Function: An ssl/tls connection is created between BlackBerry Enterprise Server and the application form server with respect to BlackBerry smartphones. Data from the application server is then aes or Triple des encrypted and sent over the cordless network to BlackBerry smartphones. End-to-End Function: Data is encrypted over ssl/tls for the entire connection between BlackBerry smartphones and the application form server, making end-to-end method connections best suited for applications where only the purchase end-points are trusted. BlackBerry smartphones applications made out of the BlackBerry java development environment (jde), that have certain functionality such as the ability to do on startup or even to access potentially sensitive BlackBerry smartphone software data, require programmers to hint and sign-up their applications with Research In Movement. This adds coverage by providing a greater degree of control and predictability to the launching and patterns of applications on BlackBerry smartphones. On top of that, the BlackBerry putting your signature on authority tool can help protect usage of the functionality and data of alternative party applications by enabling corporate creators or administrators to control usage of specific sensitive Program Encoding Interfaces and data stores by using server-side software and open public and private personal keys. To help protect BlackBerry mds Studio room applications from tampering, corporate and business developers can sign an application bundle with a digital certificate. (Research In Motion, 2011)

They can use either a trusted certificate expert or a produced certificate. BlackBerry mds studio generates and indications applications with certificates that are in line with the general public key infrastructure (X. 509) standard. For stored data security, The BlackBerry Venture Solution extends commercial security to the cellular device and provides administrators with tools to control this security. To secure information stored on BlackBerry smartphones, security password authentication can be produced necessary through the customizable IT procedures of the BlackBerry Business Server. By default, password authentication is limited to ten attempts and the device's memory is erased. Local encryption of most data (emails, address book entries, calendar entries, memos and duties) may also be enforced via IT policy.

And with the Security password Keeper, advanced encryption standard (aes) encryption technology allows password entries to be stored firmly on these devices. Additionally, system administrators can create and send cordless directions to remotely change BlackBerry smartphone passwords and lock or delete information from lost or stolen BlackBerry smartphones. The BlackBerry Organization Server Security also is a form of security. BlackBerry Venture Server does not store any email or data. To increase security from unauthorized celebrations, there is absolutely no staging area between the server and the BlackBerry smartphone where data is decrypted. Security is further increased by allowing only authenticated, outbound-initiated relationships through port 3101 of the firewall. No inbound traffic is allowed from sources apart from the BlackBerry smartphone or the e-mail server, indicating unauthorized commands cannot be executed on the system. Only communications that can be decrypted with a valid encryption key are allowed between the server and the wireless network. (Research In Movement, 2011)

The three pictures I have attached give a further insight concerning the way the security works.

( BlackBerry security, 2011)

Flow diagram for end-to-end encryption

(BlackBerry security, 2011).

http://uk. blackberry. com/ataglance/security/secure_data_access. gif

(BlackBerry security, 2011)

http://us. blackberry. com/ataglance/security/bes-diag_large. jpg

BlackBerry tools provide effective anti-virus protections for a BlackBerry deployment. They use containment methods that can prevent malware that may gain access to the BlackBerry smartphone from leading to damage to the BlackBerry smartphone, its applications and its data, and also to the organization network. BlackBerry smartphone applications include inherent virus cover and spyware protection that was created to contain preventing the get spread around of viruses and spyware and adware to other applications. Software controls can be found on BlackBerry smartphones that are working over a BlackBerry Business Server or on the BlackBerry ONLINE SITES. BlackBerry smartphone users may use the application adjustments on their BlackBerry smartphones to avoid the installation of specific third-party applications and also to limit the permissions of third-party applications. Start to see the "BlackBerry Internet Service Security Feature Analysis" to find out more on using BlackBerry smartphone software controls to safeguard a BlackBerry smartphone working on the BlackBerry Internet Service against malware. (Research In Movement, 2011)

The BlackBerry Venture Solution is designed to provide anti-virus safeguard through its malware safeguard. The BlackBerry Organization Solution includes tools that provide against all malware. Administrators can use IT plan and program control policies on the BlackBerry Enterprise Server, and BlackBerry smartphone users may use application settings on BlackBerry smartphones to contain malware by handling third-party Java software access to BlackBerry smartphone resources and applications. (Research In Movement, 2011)

Finally, Unilever uses various mobile services in their current business operations. This year 2010, Vodafone was selected as Unilever's service provider of all mobile communication needs. Various mobile services that are being used are mobile e-mail, text message texting (short message service) and mms (multi-media service), as well as the basic telephone call. Other mobile services include voicemail and simply using included content such as calendars applications. Many of these services are play vital role in creating an agile and cost competitive corporation that works in a sustainable way. Unilever, using Vodafone's home elevators trends in flexibility, will slightly provide them with an upper edge and invite Unilever to build up innovative ways to stay closely connected with our consumers and customers. (Adobe flash, 2011)

I personally feel that the mobile handsets experienced an effect on the business's performance in a confident way. It offers allowed more discussion with the customers and has allowed e-commerce to be achieved efficiently on the go.

WORDS : 2, 282.

Examples of completed orders
More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
PLACE AN ORDER
Check the price
for your assignment
FREE