Good Collaboration Suite

The Good Collaboration Suite includes Good for Enterprise®, Good Share™ and Good Connect™ secure mobile apps that simplify access to email, calendar, contacts, tasks, instant messaging, browsing and document sharing.

Good Dynamics Secure Mobility Platform

Newly empowered users with their BYOD devices are now demanding more than just corporate email support on their smartphones and tablets. Wanting to be as productive on mobile devices as on legacy laptops and desktops, users are demanding consistent access to apps and data from any device at any time. However, they aren’t willing to sacrifice personal privacy in the name of security.

Good for Government

Good for Government brings the highest levels of security, visibility, and manageability to mobile deployments used for critical communications with constituents, vendors, and other agencies. Users benefit from enterprise-class messaging and secure access to behind-the-firewall data and applications, while IT can secure and manage its mobile deployment from a simple web-based console. S/MIME is available for agencies that require the highest level of end-to-end security.

Good for You

Good for You delivers an exceptional, integrated user experience for mobile email, social networking, and media sharing on the most popular mobile device platforms, including Android, Symbian S60 v3.0, Windows Mobile, BREW and Java. Good for You includes Good Mobile Email, Good Mobile Exchange Access, Good Mobile Portal and Good Mobile Social Networking to give mobile operators and device makers a flexible and extensible white-label solution that delivers a great mobile experience to end users.

Good Mobile Collaboration Solutions

Fuel mobile collaboration. Protect company data and employee privacy. Create mobile app workflows that include patent-pending app-to-app security.

Top Considerations for Defining a Successful BYOD Strategy

The Bring-Your-Own-Device (BYOD) ownership model is here to stay. However, with the plethora of mobile device choices available to your employees, this model introduces inconsistent user experiences, data security challenges and potential deployment complexity.

Data Sheets

BYOD Policy Construct

Create and implement a BYOD program as quickly and seamlessly as possible.

Drive Mobile Adoption of CRM

CRM, cloud, and mobile service technologies are at the center of enterprise sales, service, and marketing business transformation. The powerful combination of cloud and mobile gives organizations the unique ability to employ heavily customized implementations that meet many sales-process needs while also automating as many steps as possible.

Good Access

Good Access is a secure mobile browser that enables business users to securely access their intranet and popular web based productivity applications using their mobile device of choice.

Good and HIPAA

Provides the firewall, transmission, and handheld device security required by HIPAA's Security Rule

Good Connect

Good Connect delivers a secure instant messaging platform that protects corporate data at the application level. It leverages FIPS-certified AES encryption libraries, providing an additional layer of defense against malware-infected applications.

Good for Enterprise

Good for Enterprise securely manages data and devices. It is part of the Good Collaboration Suite and accelerates day one productivity, offering the following benefits to enterprises.

Good for Government - iOS

iOS enables U.S. Department of Defense (DoD) agencies to secure and manage sensitive government data on the entire range of iOS devices.

Good Mobile Manager

Good Mobile Manager provides IT professionals with total control of mobile devices and applications from a single Web-based console.

Good Share

Good Share provides a push/pull data exchange between app and document server. This means you can meet your employees’ needs without further investment in VPN, firewall re-configurations, or risky cloud or DMZ stores.

Good Transition Services

Corporate-liable is out. BYOD is in. Get Good and secure it all. Seamlessly transition from legacy services to a new mobile device platform with this valuable service set.

Good Vault

Now, IT can extend 2-factor authentication to Good for Enterprise—and provide S/MIME mail security—all without compromising the mobile form factor.

Mobile Device Management

Good® Mobile Device Management (MDM) supports the complete mobile device lifecycle, providing IT with a central location from which to view, configure and control any managed smart device over the air. Mobile users can work on the devices they choose and IT can ensure safe access to proprietary business information.

Mobile Service Management

Enterprise mobility users have little tolerance for service downtime and, as companies move to enterprise-wide mobility, IT will have to maintain SLAs similar to other enterprise platforms. With Good Mobile Service Management, IT can continually monitor the mobility infrastructure, enable mobility services to be restored before mobile users are aware of issues and allow existing helpdesk teams to provide users with actionable intelligence without having to be mobility experts.

MobileSputnik for Good

MobileSputnik for Good opens up easy and secure access to corporate information assets with on-premises deployment and smooth integration into an existing enterprise IT and information security landscape. MobileSputnik for Good provides a rich toolset for document access, viewing, sharing and management directly on tablets, giving users familiar PC capabilities and providing rich functionality, usability and security while working with corporate files at any time in any place.

Protecting The 3 C's of Secure Mobility

Containers Need to Protect The 3 C’s of Secure Mobility.
Not all mobile app containers are created equal. Containers need to protect documents, yet also ensure secure mobility beyond content to both credentials and configuration information.

White Papers

10 Best Practices for Implementing a Successful BYOD Program

The Bring-Your-Own-Device (BYOD) ownership model is no longer hype or a privilege of early adopters. According to Gartner, “By 2017, half of employers will require employees to supply their own device for work purposes”1. Businesses everywhere have acknowledged the benefits that a BYOD model delivers – including improved user productivity, engagement and satisfaction as well as potential cost savings.

451 Research Report: BYOD Challenges, MDM Trends, Vendor Landscape

As the bring-your-own-device model continues to grow at twice the rate of corporate-owned devices, enterprises are facing an increasingly diversified mobility landscape. And though the productivity, cost and user-satisfaction benefits of BYOD abound, with them come complex management requirements and potential security challenges. This 451 Group report explains the BYOD challenges that can be addressed with an MDM solution, MDM investment changes and vendor implementation and adoption trends.

7 Must Haves for Mobile App Security

Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity.

A Business Case for Enterprise Mobility Management

Managing a diverse environment of devices, apps, and use cases in a manner that’s not just secure, but also cost efficient and scalable, can be challenging. The key to managing this diversity is to focus on data management, not device management. In our latest paper, “A Business Case for Enterprise Mobility Management,” we provide a framework for constructing a business case for enterprise mobility management.

A Business Case for Secure Mobile Collaboration

The new productivity is driven by a generation of secure, collaborative mobile apps that let employees do more with their devices. By keeping workflows integrated and safe, these apps promote greater levels of collaboration and convenience in the areas of document retrieval, storage, editing, and transmission. These benefits, as well as costs, risks, and solutions are provided in the framework of a business case in our latest paper, “A Business Case for Mobile Collaboration.” This paper examines the business benefits of enabling mobile app workflows and elaborates on the business drivers behind supporting a secure collaboration strategy. Examines use cases of leaders driving productivity via mobility. The paper reviews the costs and benefits of opening mobile access to fuel interactions between employees.

A Trusted Method for Mobile Platform Transitions

Good Technology’s Professional Services organization has deep experience advising and supporting Fortune 500 organizations on mobile platform migrations, and has developed a trusted, validated migration method. Below is a sample planning chart that depicts Good’s platform transition method.

Analyst White Paper: Enterprise-Grade BYOD Strategies: Flexible, Compliant, Secure (Aberdeen Group, September 2011)

Aberdeen’s analyst reports provide a unique perspective on the trends in corporate mobility and the rise in Bring-Your-Own Devices within large enterprises. This insightful article describes the steps IT organizations can take to cost-effectively manage their mobile workforce, while supporting the productivity benefits and collaboration that are fundamental to the BYOD movement.

Analyst White Paper: Latest Enterprise Mobility Survey: Sometimes Less Control Means More Productivity (Yankee Group, September 2010)

The right mobile devices provided to the right employee segments can dramatically boost productivity. Letting employees choose their own devices can gain your company even greater returns. Finally: Meeting employees halfway on carrier bills is one of the best things you can do for business. Read all about it in the new Yankee Group Mobility Report.

Analyst White Paper: Managing and Securing Mobile Applications in Today's BYOD Enterprise Environments (IDC, January 2013)

With the consumerization of IT, technology innovation is centered on consumer devices that are more sophisticated and user friendly and that enable greater staff productivity than those provided by employers. In addition, new applications sourced from app stores are also empowering the employees who use these devices. Yet with the rush to rapidly leverage mobile apps, companies often fail to establish effective application life-cycle processes or secure data management guidelines. An effective enterprise mobile strategy must include an approach to creating secure end-to-end mobile applications and leveraging third-party applications appropriately. In this paper written by IDC, learn important considerations and best practices for securing mobile applications in BYOD environments.

Analyst White Paper: Securing the Mobile Workforce (Fierce MobileIT, March 2012)

The rise of BYOD programs in the enterprise has introduced new questions to those in charge of enterprise mobility. Though a BYOD model can mean increased productivity and revenue gains for your organization, it also brings into question security risks, increased complexity, and user privacy concerns. Fierce MobileIT’s ebook, “Securing the Mobile Workforce,” covers the trends and challenges of securing corporate data on employee owned devices.

Are You App Able? Beyond the basics of email and calendar to LOB advantages: Mobile Apps

For once, high-tech industries are technology laggards. With service industries leading the adoption of mobile app software, traditional businesses are gaining productivity and revenue growth as they move beyond mobile email to line of business apps that enable workflows, collaboration, and communication. The mobile development talent pool continues to grow and security technology has become painless. With that, mobile app deployment has become fast, easy, and scalable. In this whitepaper, you’ll learn how to secure apps that allow enterprises to capture the most value from the exploding mobile opportunity – and what it means to your bottom line.

Balancing Mobile Healthcare Risk With Productivity

Healthcare IT are keenly aware of just how much their healthcare organizations benefit from mobile technologies. Doctors, nurses and other clinicians can interact with applications and each other more easily and efficiently—on-the-go within healthcare facilities as well as from home, on the road, or in the air. But when selecting mobile technology, healthcare organizations face a large roadblock: the missing or limited security features and controls that mobile devices and supporting mobile applications introduce. This whitepaper examines the various process efficiencies that healthcare organizations gain by adopting a business-enabling mobile platform and how to employ supporting technologies to protect patient information so lives can be saved and regulations can be adhered to.

Balancing Mobile Technology Risk With Productivity

IT administrators responsible for keeping the financial services industry up-and-running and productive are keenly aware just how much their firms benefit from mobile technologies. Brokers, agents, processors, managers and other client services personnel can interact with applications more easily and efficiently—on-the-go within corporate offices as well as from home, on the road, or in the air. Whether using smartphones, tablets or laptops, all personnel can share and process information in ways that not only improve client services, but also streamline administrative tasks such as trade execution and client billing as well as critical and timely data exchanges with business partners.

Balancing Security and Speed: Developing Mobile Apps for Enterprise

Mobility has become synonymous with productivity in the modern enterprise. Everyday business routines have been transformed by the ability to remotely access mission-critical corporate information from the road. Because mobile workers are always connected, highly pragmatic, independent, and demanding, enterprise application developers are constantly challenged with having to deliver secure mobile applications quickly enough to satisfy the needs of their end users. This whitepaper shows you how to effectively negotiate ensuring enterprise app security while maintaining the velocity required in today's enterprise.

Best Practices for Globally Deploying Wireless Messaging

This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project. The paper also describes how Good Mobile Messaging and Good Mobile Control, components of the Good for Enterprise™ solution, address those key issues, and finally, provides two case studies of recent Good Technology customer deployments.

Bring Your Own Devices Best Practices Guide

The consumerization of IT is coming to your business. It’s a given that employees will either bring their own smartphones and tablets into the workplace or will want to work on these devices when away from the office. Mass adoption of smartphones, tablets, and a variety of mobile applications has set expectations, causing the “I want my iPad” phenomenon to ripple through workplaces.

BYOD Policy Consideration (Security)

As more and more of your employees begin using their own iOS and Android devices for work purposes, you have a tremendous opportunity. Launching a "bring your own device" (BYOD) program can help you reduce mobile expenses. Drive employee satisfaction. And increase the productivity of your workforce. But first, you'll need to identify which employees are eligible to bring their own devices. And then know the mobile applications they require to be productive. This report will help you Build a reliable security strategy for employee mobile devices, Define financial reimbursement policies and Develop mobile support policies.

Collaboration without Compromise

In the wake of BYOD’s proliferation in the enterprise, mobile users are once again pushing the boundaries of enterprise IT, using consumer applications to support business collaboration. In this whitepaper, Good SVP and Forbes contributor, John Herrema discusses how a secure mobile collaboration strategy can provide flexibility, enhance productivity, and protect privacy.

Effective Identity and Access Management in a Mobile World

Effective Identity and Access Management in a Mobile World. Few developments have created more IT disruption in the past five years than the explosion of mobile devices in the workplace. Organization after organization has reaped the benefits of mobile devices for employee productivity, collaboration, and customer communication and satisfaction. Hand in hand with the mobile explosion has been the trend of employees bringing their own devices to work, called Bring Your Own Device or BYOD, which has enhanced employee satisfaction, productivity, and competitive advantage in companies looking to hire the best of the younger generation or fulfill the needs of traveling executives.

Exchange ActiveSync Management Challenges

Exchange ActiveSync has become the de facto standard for synchronizing mobile device calendar, contact, and e-mail data. A successful mobile device deployment depends on giving users a reliable, stable synchronization experience, but there are many parts in the Exchange ActiveSync data path, and if any of these parts fail or degrades the overall experience for some or all of your users will be substandard. This paper describes the Exchange ActiveSync protocol, the data path used for provisioning and synchronizing devices, describes the major challenges inherent in providing reliable sync services particularly for bring-your-own-device (BYOD) users, and discusses how Good Technology’s solutions help meet those challenges by improving uptime and availability, reducing mean time to repair (MTTR) and increasing first-call problem resolution rates.

Give All the People What They Want (Safely)

Face it. Modern workers are addicted to mobile devices. Not just any vanilla corporate-issued devices, but our carefully selected and personalized expressions of ourselves: iPads®, iPhones®, Androids™, and whatever-comes-next. Many of us get to use our devices in the office: 6 out of 10 businesses have welcomed the savings, satisfaction, and simplicity of BYOD programs enabling corporate application and network access from employee-owned devices. Another 32% plan to move to BYOD soon.

Good Technology State of BYOD Report

A variety of mobile devices have taken root in the enterprise. Android phones and tablets, iPads and iPhones have become increasingly popular, and the public's desire for these devices has propelled the consumerization of IT. For IT, employee passion to use personal devices and an overall desire by companies to reduce costs, are rendering the traditional model of supporting only company‐owned devices increasingly obsolete. As Good’s survey results show, enterprises are widely embracing Bring Your Own Device (BYOD) programs, including the most highly‐regulated and security‐conscious industries.

Good Technology's Security and Architecture

This white paper provides a detailed description of Good Technology’s Security and Architecture. It provides an overview of the changing landscape of mobile technologies within the enterprise and enumerates the key mobile device challenges faced by enterprise and government organizations. It describes how the Good secure mobility solution helps administrators manage and control their mobile deployments while maintaining a high level of security that encapsulates enterprise data.

Good’s Quarterly Mobility Index Report Q4 2013

What are the latest trends in enterprise mobility—and how can you capitalize? Check out Good’s new Mobility Index Report to get the latest data on app, platform and device preferences. See which apps are the most popular, how the market feels about secure mobility solutions, and which app categories recorded the greatest growth. Get the facts to learn how a simple, affordable approach to secure mobility means you can say yes to BYOD.

Increasingly On the Go: Mobility Compliance in Regulated Industries

Learn how financial institutions, healthcare companies, government agencies, and other regulated entities maintain successful—and compliant—mobile deployments.

MAM Evaluation Guide

Mobile Device Management (MDM) has ushered in on-the-go access to enterprise data, but that convenience has only whetted the appetite of enterprise users. Today’s employees now want access to the whole universe of enterprise applications, network resources, and collaboration tools on demand, on their devices of choice. More apps, more data, more convenience, these expectations add up to a requirement for more creative enterprise enablement within the necessary boundaries of IT control.

Managing the Mobile Enterprise

A guide for creating effective enterprise wireless strategies. The key to turning wireless information access into a strategic IT initiative that delivers tangible ROI is developing an enterprise wireless information access strategy. Building such a strategy requires the cooperation of IT and business managers who together determine how wireless information access can be used to improve productivity, customer responsiveness and other key metrics within their business.

Mobile App Security through Containerization: 10 Essential Questions

Mobile devices present a unique dilemma to the enterprise. On the one hand, workers empowered with tablets and smartphones can transform the way they do business; they’re more agile, closer to customers, and more productive. Bring Your Own Device (BYOD) programs give users the freedom to work on the devices of their own choosing, while still allowing an enterprise to reap the productivity benefits of these always connected, readily accessible mobile devices.

Securing Business Mobility

Managing mobility is an ever increasing challenge, especially as more and more users demand support for popular new platforms and devices. Good for Enterprise™ provides critical security and management features that allow corporate IT to secure and control the most popular devices on the market. You can rest easy with over-the-air and on-device encryption of enterprise data, remote application password policies, and remote wipe of enterprise data across a wide range of handsets including the newest Apple and Android devices.

Securing Patient Data in Today's Mobilized Healthcare Industry

The modern mobile worker is radically transforming healthcare. Time-stretched doctors now rely on smartphones and tablets to keep connected while they keep moving. In hospitals andclinics throughout the country, these no-nonsense, independent, and demanding clinicians are already using iPhones, iPads, and Windows Phone devices to access electronic medical records, view radiological images, reference medical journals, or file prescriptions electronically—in addition to carrying out regular email, collaboration, and backoffice processes. The use of mobile technology has been justified: a recent survey found that healthcare professionals save as much as a half-hour per day using mobile apps. But how can IT keep all this data secure?

Transforming Public Sector through Secure Mobile Workflows

Government agencies are rapidly embracing mobility as a means to transform their organizations. These agencies are aggressively pursuing application development projects to help public sector employees increase efficiency and productivity through mobile workflows. This whitepaper discusses public sector mobility challenges, application use case examples, and Good’s solution to help agencies deliver greater user productivity.

When Mobile Device Management Isn't Enough

Organizations are turning to Mobile Device Management (MDM) solutions to better secure, monitor, manage and support the variety of mobile devices used by their employees. However, in many instances, MDM alone is not enough to prevent data loss. This paper presents Good for Enterprise and its unique approach to managing security on mobile devices, which does address some of the shortcomings of an MDM-only strategy.

Wrapping or Coding: Pros and Cons of Containerization Choices

To realize the promises of “productivity improvement” from smart mobile devices, enterprises need to enable their employees with enterprise mobile apps – beyond corporate email, calendar and contacts. To provide value, these enterprise mobile apps must allow users to securely access and work with corporate data when they need it. Further, many enterprises are making mobile apps available to their extended enterprise – i.e., business partners, distributors, etc., making app security and control even more desirable.


Good Customer Success Stories

See how companies from all industries are achieving success with Good Technology.

Secure Mobility Solution

Transform the way you do business with our secure mobility solution.

Unleash Your Mobile Potential

Good Technology is the secure mobility solution that unlocks your mobile potential.