BlackBerry Seeks To Appease Indian Government With Cloud Computing Solution

Blackberry Cloud Computing Solution?

BlackBerry manufacturer RIM (Research In Motion) and the Indian government have been at loggerheads for some time now due to the latter’s insistence on monitoring BlackBerry data citing security concerns. With such data being stored on servers outside India, the country’s security agencies could not access it leading to friction with the company.

Now, it seems that RIM has found a solution to meet official demands while at the same time maintaining its security agreements with BlackBerry users in India. According to reports, RIM has offered lawful interception in its security architecture through cloud computing from Indian operators, and the government is evaluating the proposal.

RIM infrastructure is ready to receive and process through the cloud computing-based system, lawfully intercepted BlackBerry Messenger data from Indian service providers, the Canada-based firm said in a letter to the government. It is still waiting to hear back from the government.

This contentious issue arose in August last year when the Indian government demanded access to BlackBerry’s encrypted corporate e-mail service and messaging services, amid fears that these could be used by terrorists. Moreover, India was not the only country with this demand; RIM has faced this issue in Saudi Arabia and the UAE as well.

RIM’s move comes close to the 31st January 2011 deadline set by the Indian government to accede to its demands, failing which it has threatened to ban the BlackBerry service in the country. Although deadlines had been set, and relaxed earlier, industry watchers believe that the government may take concrete steps in case of non-adherence this time.

RIM has around one million subscribers in India, with thousands being added every month, making India one of the fastest growing markets for the company. It has reiterated that its security systems are still cutting edge by saying, “RIM maintains a consistent global standard for lawful access requirements that does not include special deals for specific countries”.

The current issue is concerned specifically with BlackBerry Messenger, a proprietary Instant Messenger application included on BlackBerry devices. Messages sent via Blackberry Messenger are sent over the BlackBerry PIN system; thus, communication is only possible between two BlackBerry devices.

Exchanging messages is also possible through dedicated discussion or chat groups, which allow multiple BlackBerry devices to communicate in a single session. Other than text instant messages, BlackBerry Messenger also allows users to send pictures, voice-notes (audio recordings), files, location on a map, and a wide selection of emoticons (also known as “smileys”) over the Blackberry network.

By Sourya Biswas

Sorry, comments are closed for this post.

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…