|By PR Newswire||
|December 4, 2012 03:05 AM EST||
SUNNYVALE, Calif. and LAS VEGAS, Dec. 4, 2012 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today introduced Good Vault™, the first product built on the newly introduced Good Trust™ mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and S/MIME security to Good's award-winning Good for Enterprise™ email application. Leveraging Good Vault, highly regulated organizations in the government, healthcare and financial services industries can more effectively battle escalating mobile security threats while meeting compliance regulations. The new solution was unveiled at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.
"Mobility has been the ultimate disruptive technology. The number of bring your own device (BYOD) programs is increasing within enterprises and application authentication is not immune from this influence," said Michael W. Mahan, senior vice president of special markets for Good Technology, who leads the Good Trust product line. "BYOD impacts the controls and management options available to the enterprise—underscoring the need for more flexible and extendable secure access solutions. At Good, we believe that mobile two-factor authentication is on track to become the dominant force in the IAM market and we intend to lead the pack in its adoption with our Good Trust platform and the Good Vault solution."
According to recent research by Gartner, IAM processes and technologies make significant contributions to the business strategies and technologies that are among CIOs' higher priorities. Good Vault allows IT, Security, and Information Assurance leaders to:
- Ensure integrity and security of corporate email and data
- Prevent data loss using S/MIME encryption with credentials stored in a Secure Element
- Drive employee adoption with convenience and portability
- Meet stringent compliance regulations and security standards
- Better comply with HSPD-12, FIPS, FFIEC, PCI-DSS, HITEC, HIPAA and other regulatory standards
- Leverage current IAM investments to increase ROI and extend mobility
- Lower overall costs for mobile IAM
Unlike other authentication solutions for mobile devices, Good Vault leverages a Secure Element on a microSD or smart card, enabling strong authentication without compromising the mobile form factor or the user experience. Access to Good for Enterprise is secured through card-based authentication, and mobile email messages are encrypted and signed to ensure privacy and integrity. Good Vault requires four components:
- A hardware-based Secure Element to store user credentials and keys; this comes in two options:
- Smart card
- MicroSD card
- A slim Sleeve/Reader that slides onto the phone and stores the smart card or microSD card
- The Good Vault smart card reader—provided by Precise Biometrics—which is a casing that adds smart card readers to the iPhone 4 or 4S. The reader is designed so that the iPhone maintains its sleek design adding only ½ inch (16 mm) in length, 0.16 inches (4mm) in width, and 0.22 inches (5.7 mm) in thickness, and weighs only 1.5oz (41g).
- The microSD reader, supplied by HID Global®, which is a slim casing for the iPhone 4 or 4S that contains a slot for inserting the microSD card, and;
- HID Global's ActivID Credential Management System to issue and manage the microSD cards for either primary or derived credentials.
- Server side software that is a Web-based Admin console for configuring Good Vault.
The above components work together to provide enterprises the benefits of two-factor authentication without adding cumbersome standalone readers - reducing solution complexity and overall costs, while streamlining deployment and adoption.
Good Technology and HID Global have been working together to mobilize smart cards and the underlying secure element technology for use within mobile devices for over a year now. Good Vault is the first product to integrate the authentication tools needed to enable secure access to organizational systems using highly popular mobile devices, such as smartphones and tablets.
"Supporting a mobile and wireless workforce is becoming an increasingly critical, yet somewhat daunting task for many corporations and governments today due to the increasing number of mobile attacks and security breaches," said Jerome Becquart, vice president and general manager of Identity Assurance with HID Global, Good's strategic IAM development partner. "Now, as a result of our partnership with Good, companies with highly mobile workforces can provide digital keys over-the-air and to employees' phones and use them to access all of their enterprise resources from anywhere in the world—just like they had previously been doing with their photo ID cards, keyfobs or tags—without compromising security."
Good Vault is immediately available for download in the iTunes App Store. End users must first be licensed for Good for Enterprise and Good Vault to activate the application. To learn more the Good Vault platform visit http://www1.good.com/products/good-vault. Those attending the Gartner Identity and Access Management summit at Caesar's Palace in Las Vegas can also visit booth #S29 for a demo and additional product information.
About Good Technology
Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100™ leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government. Learn more at www.good.com.
©2012 Good Technology Corporation and its related entities. All use subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks are the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.
iPhone is a trademark of Apple Inc., registered in the U.S. and other countries.
SOURCE Good Technology
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
Feb. 20, 2017 06:00 AM EST Reads: 1,608
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, ...
Feb. 20, 2017 05:30 AM EST Reads: 4,574
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Feb. 20, 2017 05:15 AM EST
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
Feb. 20, 2017 04:30 AM EST Reads: 151
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Feb. 20, 2017 03:30 AM EST Reads: 6,145
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 20, 2017 03:15 AM EST Reads: 1,336
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Feb. 20, 2017 02:00 AM EST Reads: 4,156
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...
Feb. 20, 2017 01:00 AM EST Reads: 832
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 20, 2017 01:00 AM EST Reads: 5,214
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Feb. 20, 2017 12:15 AM EST Reads: 971
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Feb. 20, 2017 12:00 AM EST Reads: 1,415
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Feb. 19, 2017 10:30 PM EST Reads: 6,156
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Feb. 19, 2017 09:30 PM EST Reads: 843
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often un...
Feb. 19, 2017 08:00 PM EST Reads: 2,838
SYS-CON Events announced today that Technologic Systems Inc., an embedded systems solutions company, will exhibit at SYS-CON's @ThingsExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Technologic Systems is an embedded systems company with headquarters in Fountain Hills, Arizona. They have been in business for 32 years, helping more than 8,000 OEM customers and building over a hundred COTS products that have never been discontinued. Technologic Systems’ pr...
Feb. 19, 2017 06:45 PM EST Reads: 3,162
SYS-CON Events announced today that IoT Now has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
Feb. 19, 2017 06:15 PM EST Reads: 1,098
SYS-CON Events announced today that WineSOFT will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Based in Seoul and Irvine, WineSOFT is an innovative software house focusing on internet infrastructure solutions. The venture started as a bootstrap start-up in 2010 by focusing on making the internet faster and more powerful. WineSOFT’s knowledge is based on the expertise of TCP/IP, VPN, SSL, peer-to-peer, mob...
Feb. 19, 2017 06:00 PM EST Reads: 1,411
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
Feb. 19, 2017 05:45 PM EST Reads: 5,385
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Feb. 19, 2017 05:45 PM EST Reads: 967
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Feb. 19, 2017 05:00 PM EST Reads: 8,170