Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Consumer apps are especially challenging for most MDM solutions. Policy controls and data encryption cannot address potential
security risks that lie within the apps themselves, for example an app that was designed to directly or indirectly access and share
corporate data with other 3rd party apps and cloud services. Most corporate data leakage is due to the unintentional actions of the
employee who uses these consumer apps. Given that most MDM solutions are limited to security controls at the device level, most
MDM functions are also unable to address potential security risks at the app level.
Mobile Device Management: Integrated device and application management capabilities provides IT with full visibility of devices
under MDM management. IT can easily provision new devices, enforce security policies and remote wipe just the organizations data
or the entire device.
Consistent security across multiple platforms. IT can rest assured that security policies are consistently applied regardless of
what security capabilities are available in the underlying operating system or device. Users will not be limited to a
single platform.
Respect employee privacy. IT can manage corporate data on personally owned devices while respecting employee privacy. By
applying policies at the app level, IT can implement and enforce strong enterprise-grade policies for passwords, timeouts,
and other security controls without requiring MDM and impacting the employees overall personal experience.
Freedom of choice. Since app containerization separates personal and work data and provides policy controls at an
application level, IT can more readily embrace BYOD programs. IT manages only the corporate data. For example, rather than
remote wiping the entire device, IT can wipe only the corporate data, leaving personal data and apps intact. Employees
can use their own mobile devices, confident in the knowledge that they will not have to compromise on their privacy or
Secure Workflows
Instead of simply protecting apps in walled-off silos, Goods mobile app containerization supports secure app-to-app data sharing.
From each of the apps in the Good Collaboration Suite, it is possible to call app features in the other apps. For example, Good Share
integrates with Good for Enterprise and Good Connect, enabling easy and secure file sharing. Because of this integration, users can
easily attach a file accessible via Good Share when composing an email in Good for Enterprise or link to a file accessible via Good
Share from their Good Connect instant message. This app-to-app data sharing allows users to use the Good Collaboration Suite for the
workflows that they need in order to be most productive when using the organizations data on their mobile devices. At the same time,
because the data is shared securely between apps, IT retains constant control.
consistently across platforms. Also, IT can define policies to wipe any of the Good-secured containers and its data for failure
to provide the correct password after a set number of failed attempts. Strong policies let IT disable sequential numbers
in passwords, require special characters and more. When strong over the air (OTA) policies are deployed, only employees that
are authenticated can connect to the Good network operations center (NOC).
2.
Data Protection. With any of the apps in the Good Collaboration Suite, IT can be confident that the organizations data is
protected even when that data is on a device with potentially insecure consumer apps, downloaded from a public app store
such as the Apple App StoreSM or Google PlayTM. Its possible because all Good-secured apps encrypt the organizations data
with strong encryption. In addition to a secure container, Good-secured apps also encrypt any data thats in transit between
the device and servers behind your firewall. So data protection extends all the way from the firewall to the device
3. Enforcing Access Controls. With Good-secured apps, administrators can restrict access to Good servers, based on a particular
device OS and/or the version number of the client app. With Good for Enterprise, IT can distribute management tasks across
a hierarchy of administrators using role-based administration that offers a set of roles with varying permissions for
administering the Good for Enterprise server and any employee devices that are under MDM control. Routine tasks, such
as loading of software, can be delegated to a wider group of administrators across multiple locations. More restricted tasks,
such as setting global policies or remotely erasing a handheld when lost or stolen, can be limited to a smaller group.
4. Securing Network Access. A key component of Goods trusted secure architecture is that the behind-the-firewall Good server
establishes an outbound connection to the enterprise firewall, so theres no need to open inbound ports and expose the
enterprise network to attack. In addition, network traffic between the device and the server is always encrypted with AES
192-bit encryption. Good employs a network operations center (NOC) in its architecture, which brokers requests from
Good-secured apps to behind the firewall resources. The Good NOC only services encrypted packets, so it provides the
additional functionality of authenticating devices to the network, granting access only to devices that have been provisioned
to access their respective servers and servicesthus preventing rogue devices from gaining access to the network.
5.
Securing the Platform. Protections are available across platforms, with policy controls that include strong encryption of
data (OTA and data at rest), remote wipe of only the Good-secured container or full device wipe for those devices that are
under MDM management, and detecting jailbroken or rooted devices. Additionally, for devices under MDM management
there are policies available to impose app-level restrictions if thats what your business needs. For example, on an iOS
Global Headquarters
+1 408 212 7500 (main)
+1 866 7 BE GOOD (sales)
EMEA Headquarters
+44 (0) 20 7845 5300
2014 Good Technology Corporation and its related entities. All use is subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR
ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, GOOD VAULT and GOOD DYNAMICS
APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks may be claimed as the property of their respective owners.
Goods technology and products are protected by issued and pending U.S. and foreign patents. 07/14 Rev. 07022014