BlackBerry pushes upcoming BBM Protected for end-to-end encrypted messaging

Service expected to launch this summer

BlackBerry is promoting an upcoming end-to-end encrypted messaging service called BBM Protected for industries that need the highest levels of security. It will launch sometime in the summer.

"We're getting lots of customer interest from security-conscious customers because there's no solution that provides this balance with security and manageability, along with a great user experience," said Thad White, director of BBM for Business.

BBM Protected was first announced in late February as part of the eBBM Suite, an upcoming family of products that works with BlackBerry's Messenger, its smartphones and Enterprise Server (BES) as well as BlackBerry Enterprise Service 10 servers. Pricing was not announced, but will charged on a monthly per-user basis.

BlackBerry Protected and the entire eBBM Suite appear to be part of the company's strategy to hold onto its BES customers, many of which are in the government and securities sectors. Blackberry continues to face problems selling smartphones and attracting more customers to its BES 10 servers.

Last September, the company reported 25,000 commercial and test deployments of BES 10 servers, up from 19,000 in July 2013, but then soon after said in a filing with the U.S. Securities and Exchange Commission that BES 10 had experienced a "slower-than-anticipated rate of adoption."

In last month's fourth-quarter earnings report, BlackBerry didn't indicate how many BES 10 deployments there have been in recent months, although revenue for the quarter was down 64% from a year earlier, while smartphone sales were down by nearly half.

White said BBM for consumers is now available for Android and iOS smartphones as well as BlackBerry. He said BBM Protected will be available first for BlackBerry phones, followed by iPhone and Android phones and eventually Windows Phones.

While the encryption and other management tools with BBM Protected will be tied to customers running BES or BES 10, White didn't reveal any details of the service for non-BES settings. "We want to make [BBM Protected] turnkey for BES customers," he said. "We're not announcing anything related to [offerings for non-BES customers]."

Jack Gold, an analyst at J. Gold Associates, said BlackBerry's move to open consumer-grade BBM to Android and iOS shows the company sees the need for a cross-platform approach. He said BBM Protected also needs to be available for non-BES shops to be successful.

White said there are 85 million BBM customers globally, made up of consumers and enterprise workers.

The BBM Preferred approach will allow workers to communicate over an automatically created end-to-end encrypted link with other workers as well as others outside of their organization.

Microsoft and Cisco both offer secure real-time messaging services, but "they are limited to communications inside an organization, unless you set up a complex federation of servers," White said. "This ability to communicate [securely] inside and outside is critical to a user."

Last December, BlackBerry said that BBM is used by 85% of BES-enabled organizations using BlackBerry smartphones. IT administrators in many regulated industries must keep records of messages sent and received by employees, and BBM allows IT shops to log, archive and audit all BBM text messages and access the metadata for BBM voice and video messages.

BBM also allows up to 30 people to collaborate, while BBM videoconferencing and screen sharing is possible from BlackBerry 10 smartphones, such as the Z10 or Q10.

This article, BlackBerry pushes BBM Protected for end-to-end encrypted messaging, was originally published at

Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen or subscribe to Matt's RSS feed. His email address is

See more by Matt Hamblen on

Read more about encryption in Computerworld's Encryption Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Blackberryconsumer electronicssecuritysmartphonesencryptionendpoint security

More about AppleBlackBerryCiscoMessengerMicrosoftSecurities and Exchange CommissionTopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Matt Hamblen

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts