| Managing a distributed environment for BlackBerry Enterprise Server components | 47 |
| Wireless activation | 47 |
6 | BlackBerry Enterprise Solution security | 48 |
| Security features of the BlackBerry Enterprise Solution | 49 |
| Encrypting data that the BlackBerry Enterprise Server and a BlackBerry device send to each other | 50 |
| Algorithms that the BlackBerry Enterprise Solution uses to encrypt data | 50 |
| Extending messaging security to a BlackBerry device | 51 |
| Encrypting user data on a locked device | 51 |
| Encrypting the device transport key on a locked device | 52 |
| Managing device access to the BlackBerry Enterprise Server | 52 |
| Using an IT policy to manage BlackBerry Enterprise Solution security | 53 |
| Using IT administration commands to protect a lost or stolen device | 54 |
7 | BlackBerry Enterprise Server high availability | 56 |
| BlackBerry Enterprise Server high availability in a | 56 |
| How the BlackBerry Enterprise Server calculates health scores | 57 |
| Conditions for failover to a standby BlackBerry Enterprise Server | 58 |
| How a primary BlackBerry Enterprise Server | 58 |
| Scenario: What happens after a primary BlackBerry Enterprise Server stops responding | 59 |
| Scenario: What happens after the health score of a primary BlackBerry Enterprise Server falls below the failover |
|
| threshold | 60 |
| BlackBerry Configuration Database high availability | 60 |
| BlackBerry Configuration Database mirroring | 61 |
| Scenario: What happens after the principal BlackBerry Configuration Database stops responding | 62 |
| High availability in a distributed environment | 63 |
8 |
| 65 |
| Types of | 65 |
| Wireless access points | 66 |
| Connections that BlackBerry devices make to mobile and | 67 |
| Connecting | 68 |
| Direct connections between BlackBerry devices and the BlackBerry Router over an enterprise | 68 |
|
| |
| Router is not possible | 69 |
| Priority for connections that BlackBerry devices make over a | 69 |
| BlackBerry services that are available over | 70 |
| IEEE 802.11 wireless networking standards that | 72 |
| Characteristics of the IEEE 802.11a wireless networking standard that | 72 |
| Characteristics of the IEEE 802.11b wireless networking standard that | 73 |
| Characteristics of the IEEE 802.11g wireless networking standard that | 74 |
| Security features of a | 74 |