Solved

Opening Password Protected Attachments on a Blackberry

Posted on 2007-03-30
3
420 Views
Last Modified: 2008-02-01
Hi,

We are looking for software to enable our Blackberries (Models 7230 and 8700, software version 4.2 via BES Enterprise server)  to open password protected Word and Excel attachments (And Powerpoint if possible).

We have tried Repligo but do not like the fact the attachment is sent to an external server.

Does anybody have any other solutions?

Cheers,

Pete
0
Comment
Question by:itlplc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 26

Accepted Solution

by:
Gary Cutri earned 500 total points
ID: 18823840
You can use the enterprise version of Repligo which uses an attachment server on the same server as your BES.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After going through the deployment of BlackBerry Device Service 10, and seeing a number of questions posted about it, this article addresses some of the issues and particulars of the installation. There have been a number of other questions posted, …
Introduction Everyone is using a smartphone these days. Contacts, messages, applications, documents, bookmarks, pictures, videos and other stuff which you created and are present only on your device come under the umbrella called “Personal Data”.…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question