HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
This content is provided by FinTechBenchmarker.com who are responsible for the content. Please contact them if you have any questions.
A unified endpoint security (UES) solution that provides mobile threat defense, secure browsing, data loss prevention, and secure communications for wealth management advisors. Features include AI-based malware detection, containerization of sensitive client data, FIPS 140-2 validated encryption, and integration with financial compliance tools.
Tablets and smartphones with enhanced security features allowing advisors to access client information and financial planning tools while meeting with clients outside the office.
More Secure Mobile Devices
More Wealth Management ...
Multi-Factor Authentication (MFA) Requires users to provide multiple forms of identification before granting access. |
AI-based malware detection and strong authentication controls are core elements of BlackBerry Spark's UES solution. | |
Biometric Authentication Supports authentication via fingerprint, facial recognition, or iris scanning. |
The suite supports biometric logins as mentioned in BlackBerry's documentation (face/fingerprint ID on mobile). | |
Single Sign-On (SSO) Allows users to use one set of login credentials across multiple related systems. |
Single Sign-On (SSO) supported via integration with enterprise identity providers (IdPs). | |
Role-Based Access Control (RBAC) Grants access based on user roles, limiting exposure to sensitive features and data. |
Role-Based Access Control (RBAC) is part of BlackBerry UEM and Spark Suite. | |
Time-based Access Restrictions Restricts platform access to set periods for added security and oversight. |
No information available | |
Geofencing Limits platform access to predefined geographic locations. |
Geofencing is available in BlackBerry UEM to restrict access by geographic location. | |
Session Timeout Automatically logs out users after a period of inactivity. |
No information available | |
Device Registration Allows only registered and approved devices to access sensitive information. |
Device registration and approval workflow are standard in BlackBerry UEM for Spark Suite. | |
Jailbreak/Root Detection Detects devices with compromised operating systems and restricts access. |
BlackBerry Spark detects rooted or jailbroken devices and can restrict access or wipe data. | |
Remote Lock/Wipe Ability to lock or erase device data remotely if lost or stolen. |
Remote lock/wipe is a feature for lost/stolen devices in BlackBerry Spark Suite. | |
Customizable Password Policies Enforces complexity and frequency rules for password creation and updates. |
Custom password policies can be enforced in BlackBerry UEM. | |
User Activity Logging Tracks user actions on the platform for accountability and investigation. |
User activity (audit) logging is a feature of both BlackBerry UEM and Spark Suite. | |
Access Approval Workflow Requires admin approval before granting user or device access. |
No information available |
End-to-End Encryption Encrypts data at rest and in transit between devices and servers. |
End-to-end encryption is a core Spark Suite feature (FIPS 140-2 validated). | |
On-Device Data Encryption Secures stored data locally on the mobile device using encryption. |
On-device data encryption is specifically cited in Spark Suite literature. | |
Secure Backup Backs up data securely in compliance with privacy standards. |
BlackBerry backup solution meets financial data privacy requirements and encrypts backups. | |
Encrypted Communications Ensures all messaging, calls, and file transfers are encrypted. |
Encrypted communications are explicitly offered (secure messaging, encrypted calls). | |
Secure Key Management Safeguards encryption keys with restricted access and best practices. |
FIPS 140-2 validates key management and handling. Secure key management is detailed in product documentation. | |
Data Masking Masks sensitive financial data displayed on screens to prevent exposure. |
Data masking can be enforced by containerization and policy configuration on sensitive apps. | |
Granular Encryption Levels Allows different levels of encryption for different data types. |
No information available | |
Privacy Policy Transparency Displays clear information about data collection, use, and sharing. |
BlackBerry provides a transparent privacy policy; data usage is clear in admin and user docs. | |
Compliance with GDPR/CCPA Adheres to data privacy regulations such as GDPR or CCPA. |
Compliance with GDPR and CCPA is mentioned in BlackBerry regulatory compliance statements. | |
Audit Logging Maintains logs of all access and changes to client data for auditing. |
Audit logging is a compliance feature of Spark Suite. | |
Secure Cache Management Automatically clears or encrypts application cache to prevent data leaks. |
Cache encryption/purging capabilities are available in BlackBerry secure workspace containers. |
MDM Integration Offers compatibility with leading MDM solutions for device oversight. |
Spark Suite and UEM provide integration with popular MDM tools. | |
Device Inventory Tracking Tracks all approved devices accessing financial systems. |
Device inventory tracking is part of the centralized UEM dashboard. | |
App Whitelisting/Blacklisting Prevents installation or use of non-approved applications. |
Admins can whitelist/blacklist apps on managed devices. | |
Mobile Threat Detection Continuously monitors for malware, phishing, or other threats. |
AI-driven mobile threat detection is a key feature of the suite. | |
Patch & Update Management Ensures devices and apps are running the latest secure versions. |
Patch & update management is available for managed devices and apps via UEM. | |
VPN Enforcement Requires VPN connections for external or remote access. |
VPN settings and enforcement for remote access are available for managed clients. | |
Compliance Reporting Generates reports on device compliance with security policies. |
Compliance reporting tools and dashboards are available for regulatory reporting. | |
Remote Configuration Centrally manages security settings and configurations across devices. |
Centralized remote configuration of devices and security settings is part of the UEM platform. | |
Lost Device Tracking Allows real-time location and status tracking of lost devices. |
Lost device tracking/location is available for managed assets. | |
Security Incident Alerts Automatically notifies administrators of security breaches or risks. |
Security and compliance incident alerts configurable in BlackBerry UEM. | |
Usage Analytics Provides analytics on device engagement and usage by advisors. |
Usage analytics for devices and users is available via UEM reports. |
Intuitive Navigation Easy-to-use interface for advisors and clients. |
User interface emphasizes simple, intuitive navigation for administrators and users. | |
Customizable Dashboard Allows users to personalize information and shortcuts. |
No information available | |
Multi-Language Support Available in a variety of languages to serve diverse client bases. |
No information available | |
Accessibility Features Supports screen readers, high contrast mode, and large text. |
No information available | |
Offline Mode Limited functionality without network connection for emergencies. |
No information available | |
In-App Notifications Provides timely alerts and updates to users inside the app. |
The platform supports in-app notifications and alerts. | |
Seamless Document Upload/Download Secure and easy handling of financial documents. |
Document management and secure upload/download is an enterprise feature of Spark Suite. | |
Dedicated Client/Advisor Portal Separate portal areas for advisors and clients with tailored functions. |
Dedicated portals for administrators and end-users are available via web and app. | |
Voice Assistant Integration Integrates with voice assistants for hands-free operation. |
No information available | |
Search Functionality Advanced search tools for transactions, documents, and contacts. |
No information available | |
Responsive Design Adapts interface for phones, tablets, and different screen sizes. |
Responsive design for both desktop and mobile apps is promoted in product collateral. |
Transaction Approvals Requires one or more approvals before large or sensitive transactions proceed. |
Administrators can set approval workflows for critical user actions and transactions. | |
Real-Time Transaction Monitoring Monitors and flags potentially suspicious activity as it happens. |
Real-time monitoring of device and app activity; suspicious activity is flagged. | |
Limits on Transaction Amounts Configurable maximums for transactions approved via mobile. |
No information available | |
Automated Fraud Detection AI-based detection and prevention of fraudulent transactions. |
Automated fraud detection through AI-based threat detection is explicitly marketed. | |
Transaction Notifications Instant alerts for every transaction initiated or completed. |
Transaction and security notifications are supported natively in the suite. | |
Dual Authorization Two users must independently authorize critical transactions. |
No information available | |
Audit Trail of Transactions Comprehensive log of all transaction details and authorizations. |
Comprehensive audit trail on all administrative and certain user actions is provided. | |
Regulatory Compliance Checks Automated screening of transactions for regulatory compliance. |
Regulatory compliance checks and audit integration with third-party tools are highlighted in product literature. | |
Transaction Reversal Tools Ability to reverse incorrect or fraudulent transactions swiftly. |
No information available | |
User Permissions for Transaction Types Administrator control to restrict types of transactions by user. |
Granular permissions available to restrict transaction/data access by user. |
API Access Robust, secure API for integrating with other platforms and services. |
Robust API support for integration with financial, compliance, and productivity tools. | |
Data Import/Export Allows seamless transfer of financial information to and from other systems. |
Data import/export capabilities to various platforms and toolsets are part of the offering. | |
CRM Integration Integrates with Client Relationship Management software. |
No information available | |
Portfolio Management Integration Works with third-party portfolio management and analytics tools. |
No information available | |
Bank Connection Aggregation Aggregates holdings and balances from multiple banks and custodians. |
No information available | |
Document Management Integration Connects with document storage and e-signature platforms. |
No information available | |
Secure Open Banking Support Supports open banking APIs with OAuth2 and PSD2 compliance. |
No information available | |
Alerting System Integrations Can send alerts to external monitoring and support systems. |
Alert integrations with SOC/SIEM platforms are available in the suite. | |
App Marketplace Compatibility Supports plug-ins and third-party apps from curated marketplaces. |
No information available | |
Single Data Format Standardization Uses open standards for financial data for easier interoperability. |
No information available |
Regulatory Audit Trail Captures full audit logs for all data and actions, meeting compliance obligations. |
Detailed regulatory audit logs maintained for all device and user activities. | |
Real-Time Compliance Alerts Instantly flags actions or transactions that may breach compliance rules. |
Real-time compliance and risk alerts are part of the core threat and compliance dashboard. | |
Scheduled Compliance Reporting Automatically generates and distributes compliance reports. |
Compliance reporting is automatable and customizable in Spark Suite. | |
Role-Based Compliance Controls Compliance checks vary based on user roles and access. |
Compliance controls can be tuned by group, role, or user within UEM. | |
e-Discovery Support Facilitates discovery of electronic records for legal/audit review. |
No information available | |
Customizable Policy Engine Policy rules can be tailored to organizational and regulatory needs. |
Policy customization engine available for compliance and reporting in BlackBerry UEM. | |
Conflict of Interest Monitoring Detects and reports potential advisor conflicts. |
No information available | |
Transaction Reporting Standards Supports formats (e.g., SWIFT, FIX) required for external reporting. |
No information available | |
Automated Record Retention Automatically applies record retention/destruction based on policy. |
Automated record retention and data disposal policies are supported. | |
Data Residency Awareness Ensures data is stored in approved jurisdictions. |
Data residency and regional storage management features available for compliance. |
Secure In-App Messaging Enables end-to-end encrypted communication between users. |
BlackBerry's secure communications includes encrypted in-app chat/messaging. | |
Document Sharing and Signatures Securely share, collaborate and sign important documents. |
Secure document sharing and electronic signatures through partners/integration. | |
Client Scheduling Tools Integrates calendars and scheduling for advisor-client meetings. |
No information available | |
Group Chat Capability Supports group discussions among teams or family members. |
Group communication (chat/voice/video) is included as a collaborative feature for teams. | |
Push Notification Channel Provides immediate client/advisor updates and reminders. |
Push notifications for updates/reminders are standard. | |
Voice and Video Communication Enables secure audio and video calls through the app. |
Secure voice/video calls can be made within BlackBerry secure apps. | |
Audit Logging of Communications Maintains logs for all advisor-client communications for compliance. |
No information available | |
Conversation Archival and Search Archives all chat and call transcripts and allows keyword searching. |
No information available | |
Automated Meeting Summaries Records and summarizes client meetings for audit and convenience. |
No information available | |
Integration with Email/Other Channels Can synchronize communications with email, SMS, or third-party chat. |
No information available |
99.99% Uptime SLA Guaranteed uptime or availability level for the application. |
No information available | |
Real-Time Performance Monitoring Tracks system performance metrics for rapid issue detection. |
Real-time system health, compliance, and threat monitoring dashboards are provided. | |
Scalability Supports growing users or device numbers without service degradation. |
Product supports enterprise-level scalability (designed for banks/large FIs). | |
Load Balancing Balances traffic across servers for optimal responsiveness. |
Load balancing is available as part of cloud infrastructure. | |
Disaster Recovery Plan Comprehensive plan and backup for service continuity after outage. |
Disaster recovery and business continuity plans are a feature of enterprise and regulated sector offerings. | |
Auto Failover Seamlessly switches users to backup systems in case of primary failure. |
Failover systems to backup environments are engineered into the service. | |
Response Time Average time for screen or transaction to load/process. |
No information available | |
Regular Maintenance Scheduling Planned maintenance that does not interrupt critical user activity. |
Scheduled maintenance processes are designed to minimize user disruption. | |
Bug Reporting & Resolution SLA Defined timelines for responding to and fixing reported bugs. |
No information available | |
User Feedback Loop Allows real users to report issues and suggest improvements. |
The system includes a portal for user feedback and support requests. |
Guided Onboarding Step-by-step instructions for initial setup for users and administrators. |
Step-by-step onboarding and admin setup guidance are provided. | |
In-App Tutorials & Help Embedded resources to assist new or returning users. |
In-app tutorials and context help are standard in both web and mobile admin interfaces. | |
24/7 Help Desk Support Continuous support by phone, chat, or web. |
24/7 support desk via phone/web, marketed on BlackBerry's solutions site. | |
Knowledge Base Online repository of FAQs, guides and troubleshooting tips. |
BlackBerry provides an extensive online knowledge base and documentation. | |
Dedicated Account Manager Assigned specialist for organizational needs and issue escalation. |
Dedicated account management for large/enterprise clients is stated in product details. | |
Flexible Deployment Options Supports cloud, on-premises, or hybrid deployment models. |
Supports both cloud and on-premises deployments per customer need. | |
User Role Training Programs Custom training by user function (advisor, admin, client). |
No information available | |
API Documentation Complete documentation for developers integrating the platform. |
Comprehensive developer/API documentation available on BlackBerry developer site. | |
Test/Sandbox Environment Safe environment for testing new features/configurations. |
Test/sandbox environments provided for development and proof-of-concept. | |
Feedback & Feature Request System Enables users to submit suggestions and requests for enhancements. |
Users can request features and enhancements through managed service/support channels. |
This data was generated by an AI system. Please check
with the supplier. While you are talking to them, remind them that they need
to update their entry.