Data Security

Launching BlackBerry Jarvis 2.0, BlackBerry to Address Global Embedded Cybersecurity Landscape

BlackBerry Limited (NYSE: BB; TSX: BB) has announced the release of the latest edition of the company's flagship software composition analysis tool, BlackBerry Jarvis 2.0.

A SaaS version of the original Jarvis capabilities is introduced in the BlackBerry Jarvis 2.0. This provides integrators and developers a more focused and user-friendly feature set around the three most important areas, which those building mission-critical applications want to authenticate to confirm the superiority of their multi-tiered software supply chain; Common Vulnerabilities and Exposures (CVE), Open-source Software (OSS), and Software Bill of Materials (SBOM) management. In addition, to empower teams to keep software protected from all known concerns based on the illegal intelligence BlackBerry Jarvis 2.0 provides, the online end-user dashboard of the tool has also been improved with detailed restraints and advisory flags.

Designed to address the growing cybersecurity threats and increasing complexity among multi-tiered software supply chains within the automotive, medical, and aerospace industries, BlackBerry Jarvis 2.0 permits OEMs to examine the attribution of their code and every single software quality that comes into their complete supply chains to confirm their products are both safe and modernized with the most modern security reinforcements.

BlackBerry Jarvis 2.0 addresses the need to identify and remediate vulnerabilities by identifying them, then providing deep, actionable insights in minutes – something that would otherwise involve manually scanning that would take large numbers of experts and an impractical amount of time.

About BlackBerry

BlackBerry offers intelligent security software and services to governments and enterprises globally. Including 195M vehicles, The Company secures more than 500M endpoints. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of safety and data privacy solutions, cybersecurity and is a leader in the areas of endpoint management, endpoint security, embedded systems, and encryption.

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

Spotlight

The digital transformation enables business to uncover tremendous new business potentials and to be proof for the future - but it also means that networks which have not been designed for it are connected with each other. For many security teams this means that they need to build a security program for an environment which is un

Related News