Professional Documents
Culture Documents
CASE36
CASE36
CASE 36
BLACKBERRY IN 2019 *
Ten years ago, BlackBerry’s annual report featured a picture Excellence Awards: Best Cybersecurity Company, Most
of its phone followed by the statement, “Ask Someone Why Innovative Cybersecurity Company, Endpoint Detection
They Love BlackBerry.” The next page answered, “People love and Response, Endpoint Security, and Best Cybersecurity
BlackBerry smartphones because they make life easier.” Once Podcast.4
a market leader in the smartphone industry, BlackBerry’s In the past three years, BlackBerry formed a number of
all-time high share price of $144.56 in 2008 came crashing corporate and government partnerships. The government
down to less than $7 by 2016. Over the last decade, BlackBerry of Canada will invest up to CAD $40 Million to support the
has lost significant market share in the smartphone indus- development of BlackBerry QNX software for autonomous
try. Speculations began to rise among investors whether cars.5 Along with its QNX software, the company’s core
BlackBerry would ever recover. After experiencing severe end-to-end Internet of Things platform includes BlackBerry
losses in both hardware revenues and mobile subscribers, Dynamics, BlackBerry AtHoc, Secusmart, BlackBerry
the company hired John Chen in 2013, a turnaround Workspaces, and the BlackBerry Unified Endpoint Man-
specialist, as its CEO to get the formerly dominant smart- agement (UEM). The BlackBerry UEM offers a “single
phone producer back to profitability. Soon after joining the pane of glass,” or unified console view, for managing and
company, Chen formulated a plan that emphasized a focus securing devices, applications, identity, content, and Inter-
on corporate and government enterprises. This significantly net of Things endpoints across all leading operating systems.
reduced the company’s operating costs. With Chen at the BlackBerry UEM was ranked as a leader in the Forrester
helm, BlackBerry appeared to be stabilizing, but would this enterprise mobility management report,6 alongside IBM,
strategy be sustainable? Microsoft, and VMware.7
“Everybody remembered BlackBerry as the handset But what about the BlackBerry devices? After realizing
company. But what is the essence of that handset? Secu- that they had fallen behind in the touchscreen game and
rity,” said John Chen, Executive Chairman and CEO. “This reentering the smartphone industry seemed like a long
is why President Obama uses it, you know. This is why a lot shot, BlackBerry decided to stop making its own phones in
of politicians, bankers, all [use] it—because of security.”1 2016. As of February 2019, handheld devices resulted in
The realization that security has always been a company only 1.4 percent of BlackBerry’s revenue, while its enter-
strength inspired a new direction. BlackBerry acquisitions prise software and services dominated with 40.1 percent
from 2014 to 2016, Secusmart, WatchDox (now BlackBerry (see Exhibit 1). Although we can confidently say BlackBerry,
Workspaces), AtHoc, and Encription, highlight this shift of that just a couple of years ago was barely surviving, has
focus.2 made an impressive move from smartphones to software
In February 2019, BlackBerry became a billion-dollar and security, investors are still a little doubtful about its
cybersecurity company after acquiring Cylance, an Artifi- future. “We don’t own BlackBerry [stock] and we’re not
cial Intelligence (AI) and cybersecurity company. “Today looking to add it,” says Poole, CEO and Managing Director
BlackBerry took a giant step forward towards our goal of of GlobeInvest Capital. “I think that the CEO has made
being the world’s largest and most trusted AI-cybersecurity good moves to transition from hardware into software, but I
company,” said Chen. “Securing endpoints and the data think going forward there’s still not a lot of visibility about
that flows between them is absolutely critical in today’s how they’re going to grow their top line.”8
hyper-connected world. By adding Cylance’s technology to
our arsenal of cybersecurity solutions we will help enter- Research in Motion
prises intelligently connect, protect and build secure end-
points that users can trust.”3 Already considered a leader Mihal “Mike” Lazaridis and his childhood friend Doug
in the Global Automotive Infotainment OS market share Fregin founded Research in Motion (RIM) in 1984. Lazaridis
by Strategy Analytics, BlackBerry Cylance’s leadership was was born in Istanbul in 1960 and came from a Greek working-
also recognized in five categories of the 2019 Cybersecurity class family. His father’s aspirations to become a tool-
and-die maker led the family to relocate to Ontario, Canada.
Lazaridis displayed remarkable intelligence at an early age
* This case was prepared by Professor Alan B. Eisner and graduate student Saad and excelled in both reading and science. Lazaridis was fre-
Nazir of Pace University, and Professor Helaine J. Korn of Baruch College, City
University of New York. This case was solely based on library research and was
quently exposed to electrical engineering, sharpening his
developed for class discussion rather than to illustrate either effective or ineffective intuitive understanding of the basic science behind every
handling of an administrative situation. Copyright © 2019 Alan B. Eisner. electrical innovation. After graduating from high school,
Lazaridis attended the University of Waterloo, however, he RIM had great technological potential; it needed strong
dropped out before graduation and decided to try his luck business leadership. Enter Harvard graduate Jim Balsillie.
in business at the age of 23. The Canadian government en- In the 1990s, Balsillie was an employee of a small technol-
abled the formation of RIM by granting Lazaridis and ogy company called Sutherland and Schultz, which would
Fregin a $15,000 loan. The duo set up RIM headquarters in become one of RIM’s clients. Lazaridis and Balsillie first
Waterloo, Canada, as an electronics and computer science crossed paths when Sutherland and Schultz tried to acquire
consulting company. According to Lazaridis, the name Re- RIM. Lazaridis passed on the offer, but he got a chance to
search in Motion meant, “we never stop, we never end,” see Balsillie in action and was impressed. Lazaridis wanted
signaling innovation that would drive RIM forward. someone to help out with the business aspect of his com-
During the company’s early years, Lazaridis accepted all pany. When a company from the Netherlands bought
sorts of contracts, most of which entailed writing code or Sutherland and Schultz in 1992, Balsillie was left without a
making small insignificant technological gadgets. None of job. Lazaridis quickly picked up the phone and invited
the early projects proved to be a commercial success, but Balsillie to join his company. Due to RIM’s small size and
they generated enough revenue to keep the company viable limited resources, Balsillie would have to accept a severe
for more than a decade. salary reduction and to spend $250,000 to acquire 33 percent
The company’s game changer was introduction of e-mail of RIM. Balsillie believed in Lazaridis’s abilities and the po-
and data devices. Lazaridis was introduced to e-mail while tential for the company, so he agreed to the terms. The two
in college, at a time when only professors and scientists shared duties as co-CEOs and formed a powerful leadership
were using the service. Lazaridis was convinced that data team in which Lazaridis focused on product development,
would become extremely important in the near future, but it and Balsillie took responsibility for management of the
was hard to find the funding for a project involving e-mail. company. With limited success up until 1992, RIM made a
In the early 1990s, major mobile carriers were focused on conscious decision to leave its comfort zone and pursue the
devices with voice capabilities and in selling as much as brass ring: wireless data. Balsillie truly believed that the
possible until the market became saturated. Reading e-mails future could be great for RIM, and according to former
on a handheld device was unheard of. Lack of demand for Senior VP Patrick Spence, “Balsillie was really strategic in
devices with e-mail support did not weaken Lazaridis’s de- terms of how he was thinking and really ambitious in terms
termination; he developed initial prototypes by writing gate- of what he wanted to do.”10 Introduced in 1996, the Inter-
way codes hooked up to an HP Palmtop, the company’s active Pager 900 contained peer-to-peer messaging and also
first device with “e-mail on a belt.” Although the device was an e-mail gateway. Unfortunately, the device had several de-
not commercially applicable, it became extremely popular ficiencies and operating errors. It was also too big and
with RIM employees. Lazaridis recalls that “employees bulky to gain commercial acceptance. Thinking of its size,
started taking these things home, and they wouldn’t return Lazaridis nicknamed it “the Bullfrog.”
them.”9 What he then understood was that the idea of After “the Bullfrog” came “the Leapfrog.” The revolu-
“e-mail on a belt” had the potential to generate high demand, tionary component of “the Leapfrog” was its ability to send
but the challenge lay in making such a product practical e-mails at any time from any place. A forerunner to the
enough for consumers to use on a daily basis. hugely popular signature product we know today as
Stronger
current
offering Mobilelron VMware
IBM 4 5
5
Leaders
Citrix Systems
3 Microsoft
BlackBerry 5
Matrix 42 1 5
2 Sophos
Strong
3 Ivanti Performers
Cisco
2
1 3 Jamf
Kaspersky Lab
Contenders
Weaker
current Challengers
offering
Weaker strategy Stronger strategy
Market presence*
1 2 3 4 5
lower higher
*A double-circled marker indicates incomplete vendor participation.
Source: 2018 Forrester research, Inc. 2018. The Forrester WaveTM: Unified Endpoint Management, Q4.
case in organizations. In 2019, Dell introduced Unified computers, endpoints, networks, and cloud from viruses,
Workspace, a comprehensive solution to help IT deploy, se- malware, and other security threats. McAfee was pur-
cure, manage, and support endpoints from the cloud. Dell chased by Intel in February 2011 to build Intel’s security
teamed up with VMware; Workspace ONE transforms and division of online computing. “With the rapid expansion
automates every phase of PC management—from configura- of growth across a vast array of Internet-connected de-
tion to onboarding to pushing regular updates—and is the vices, more and more of the elements of our lives have
backbone of Dell Technologies Unified Workspace.35 moved online,” said Paul Otellini, former Intel president
and CEO. “In the past, energy-efficient performance and
McAfee connectivity have defined computing requirements. Look-
A familiar name that comes to mind when we think of ing forward, security will join those as a third pillar of
cyber security is McAfee. Its products help secure what people demand from all computing experiences.”37