Analyst Research

451 Research - BYOD Challenges, MDM Trends, Vendor Landscape

As the bring-your-own-device model continues to grow at twice the rate of corporate-owned devices, enterprises are facing an increasingly diversified mobility landscape. And though the productivity, cost and user-satisfaction benefits of BYOD abound, with them come complex management requirements and potential security challenges. This 451 Group report explains the BYOD challenges that can be addressed with an MDM solution, MDM investment changes and vendor implementation and adoption trends.

Gartner Research - Bring Your Own Device: The Facts and the Future

BYOD represents the most radical evolution in workplace computing in decades. Read this new Gartner report—Bring Your Own Device: The Facts and the Future—to learn the latest impacts and recommendations for BYOD in your organization. Find out how CIOs can use BYOD to reduce costs, see how BYOD skyrockets employee satisfaction, and learn why organizations should invest in technology to separate business and personal apps and data.

Gartner Research: Magic Quadrant for Enterprise Mobility Management Suites

Mobile device management (MDM) by itself is no longer a sufficient solution for enabling enterprise mobility. What’s needed is enterprise mobility management (EMM) that also provides integrated mobile content management (MCM), secure containers and mobile application management (MAM). We believe with Good’s secure mobility solutions, businesses are well positioned to a safely benefit from enterprise mobility even if the mobile OS doesn’t provide the required app management capabilities or if an MDM profile is not installed on the device. All while enabling a great end-user experience.

Gartner Research: The Impact of Mobility on the IT Service Desk

Mobile devices rule the enterprise. And while the upsides are clear, there’s a big problem that needs attention: adoption now happens so fast that IT teams often don’t have the capacity—or staff—to handle demand. Read this Gartner research now to see how I&O leaders can implement new support models to address the increasing mobility needs. Learn how you can address your most common support calls, use BYOD to transfer support to end users, and complement formal support with social support tools.

IDC: Managing and Securing Mobile Applications in Today's BYOD Enterprise Environments (IDC, January 2013)

With the consumerization of IT, technology innovation is centered on consumer devices that are more sophisticated and user friendly and that enable greater staff productivity than those provided by employers. In addition, new applications sourced from app stores are also empowering the employees who use these devices. Yet with the rush to rapidly leverage mobile apps, companies often fail to establish effective application life-cycle processes or secure data management guidelines. An effective enterprise mobile strategy must include an approach to creating secure end-to-end mobile applications and leveraging third-party applications appropriately. In this paper written by IDC, learn important considerations and best practices for securing mobile applications in BYOD environments.

Brochures

Good Collaboration Suite

The Good Collaboration Suite includes Good for Enterprise®, Good Share™ and Good Connect™ secure mobile apps that simplify access to email, calendar, contacts, tasks, instant messaging, browsing and document sharing.

Good Dynamics Secure Mobility Platform

Newly empowered users with their BYOD devices are now demanding more than just corporate email support on their smartphones and tablets. Wanting to be as productive on mobile devices as on legacy laptops and desktops, users are demanding consistent access to apps and data from any device at any time. However, they aren’t willing to sacrifice personal privacy in the name of security.

Good for Government

Good for Government brings the highest levels of security, visibility, and manageability to mobile deployments used for critical communications with constituents, vendors, and other agencies. Users benefit from enterprise-class messaging and secure access to behind-the-firewall data and applications, while IT can secure and manage its mobile deployment from a simple web-based console. S/MIME is available for agencies that require the highest level of end-to-end security.

Good for You

Good for You delivers an exceptional, integrated user experience for mobile email, social networking, and media sharing on the most popular mobile device platforms, including Android, Symbian S60 v3.0, Windows Mobile, BREW and Java. Good for You includes Good Mobile Email, Good Mobile Exchange Access, Good Mobile Portal and Good Mobile Social Networking to give mobile operators and device makers a flexible and extensible white-label solution that delivers a great mobile experience to end users.

Good Mobile Collaboration Solutions

Fuel mobile collaboration. Protect company data and employee privacy. Create mobile app workflows that include patent-pending app-to-app security.

Tip Sheet: Mobile Collaboration: 7 Pitfalls to Avoid

The right mobile collaboration solution provides complete flexibility without impacting personal use or exposing corporate data to loss or theft. Give your employees access to the apps they know and love. Give your IT team an unbeatable secure infrastructure. And give your bottom line a kick in the right direction.

Top Considerations for Defining a Successful BYOD Strategy

The Bring-Your-Own-Device (BYOD) ownership model is here to stay. However, with the plethora of mobile device choices available to your employees, this model introduces inconsistent user experiences, data security challenges and potential deployment complexity.

Data Sheets

BYOD Policy Construct

Create and implement a BYOD program as quickly and seamlessly as possible.

Good Access

Good Access is a secure mobile browser that enables business users to securely access their intranet and popular web based productivity applications using their mobile device of choice.

Good and HIPAA

Provides the firewall, transmission, and handheld device security required by HIPAA's Security Rule

Good Connect

Good Connect delivers a secure instant messaging platform that protects corporate data at the application level. It leverages FIPS-certified AES encryption libraries, providing an additional layer of defense against malware-infected applications.

Good for Enterprise

Good for Enterprise securely manages data and devices. It is part of the Good Collaboration Suite and accelerates day one productivity, offering the following benefits to enterprises.

Good for Salesforce1

Good® Mobile Device Management (MDM) supports the complete mobile device lifecycle, providing IT with a central location from which to view, configure and control any managed smart device over the air. Mobile users can work on the devices they choose and IT can ensure safe access to proprietary business information.

Good Share

Good Share provides a push/pull data exchange between app and document server. This means you can meet your employees’ needs without further investment in VPN, firewall re-configurations, or risky cloud or DMZ stores.

Good Transition Services

Corporate-liable is out. BYOD is in. Get Good and secure it all. Seamlessly transition from legacy services to a new mobile device platform with this valuable service set.

Good Vault

Now, IT can extend 2-factor authentication to Good for Enterprise—and provide S/MIME mail security—all without compromising the mobile form factor.

Mobile Device Management

Good® Mobile Device Management (MDM) supports the complete mobile device lifecycle, providing IT with a central location from which to view, configure and control any managed smart device over the air. Mobile users can work on the devices they choose and IT can ensure safe access to proprietary business information.

Mobile Operations Management

Mobile environments are inherently complex, consisting of multiple devices, apps, carriers, NOCs, firewalls, networks, proxies, load balancers, Microsoft Exchange, and other backend infrastructure. However, traditional monitoring fails to look across this entire infrastructure, end-to-end including components both inside and outside the firewall. Good Mobile Service Management provides proactive monitoring, alerting and troubleshooting, enabling operations teams to pinpoint issues before they cause service disruptions.

Mobile Service Management

Enterprise mobility users have little tolerance for service downtime and, as companies move to enterprise-wide mobility, IT will have to maintain SLAs similar to other enterprise platforms. With Good Mobile Service Management, IT can continually monitor the mobility infrastructure, enable mobility services to be restored before mobile users are aware of issues and allow existing helpdesk teams to provide users with actionable intelligence without having to be mobility experts.

Mobile Support Management

Good Mobile Service Management addresses the complex support challenge by providing the visibility support teams need. Included Service Desk capabilities empower level-one service desk staff to resolve most issues, reduce escalations and drive down the costs of wide-scale mobile deployments. User Self-Service ensures many common issues never require a support call in the first place.

MobileSputnik for Good

MobileSputnik for Good opens up easy and secure access to corporate information assets with on-premises deployment and smooth integration into an existing enterprise IT and information security landscape. MobileSputnik for Good provides a rich toolset for document access, viewing, sharing and management directly on tablets, giving users familiar PC capabilities and providing rich functionality, usability and security while working with corporate files at any time in any place.

Protecting The 3 C's of Secure Mobility

Containers Need to Protect The 3 C’s of Secure Mobility.
Not all mobile app containers are created equal. Containers need to protect documents, yet also ensure secure mobility beyond content to both credentials and configuration information.

White Papers

10 Best Practices for Implementing a Successful BYOD Program

The Bring-Your-Own-Device (BYOD) ownership model is no longer hype or a privilege of early adopters. According to Gartner, “By 2017, half of employers will require employees to supply their own device for work purposes”1. Businesses everywhere have acknowledged the benefits that a BYOD model delivers – including improved user productivity, engagement and satisfaction as well as potential cost savings.

10 Recommendations to Optimize Mobile Migration

Many organizations are planning or executing on migration projects to new mobile platforms. Frequently, these migration projects include movements from BlackBerry devices to new iOS and Android devices. As the leading secure mobility provider for new mobility platforms, many migrating organizations have turned to Good Technology for secure email and collaboration apps to maintain mobile user productivity and certified security of the mobile messaging infrastructure.

7 Must Haves for Mobile App Security

Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity.

A Business Case for Enterprise Mobility Management

Managing a diverse environment of devices, apps, and use cases in a manner that’s not just secure, but also cost efficient and scalable, can be challenging. The key to managing this diversity is to focus on data management, not device management. In our latest paper, “A Business Case for Enterprise Mobility Management,” we provide a framework for constructing a business case for enterprise mobility management.

A Business Case for Secure Mobile Collaboration

The new productivity is driven by a generation of secure, collaborative mobile apps that let employees do more with their devices. By keeping workflows integrated and safe, these apps promote greater levels of collaboration and convenience in the areas of document retrieval, storage, editing, and transmission. These benefits, as well as costs, risks, and solutions are provided in the framework of a business case in our latest paper, “A Business Case for Mobile Collaboration.” This paper examines the business benefits of enabling mobile app workflows and elaborates on the business drivers behind supporting a secure collaboration strategy. Examines use cases of leaders driving productivity via mobility. The paper reviews the costs and benefits of opening mobile access to fuel interactions between employees.

A Trusted Method for Mobile Platform Transitions

Good Technology’s Professional Services organization has deep experience advising and supporting Fortune 500 organizations on mobile platform migrations, and has developed a trusted, validated migration method. Below is a sample planning chart that depicts Good’s platform transition method.

All Containers are Not Created Equal – The 3 Cs of Secure Mobility

Many enterprises are looking for a migration path from BlackBerry and device management to a new app-centric mobility solution, and are inundated by vendors claiming to enable secure mobility with “containers.” But how do you sift through the hype? This whitepaper describes the Three C’s of Secure Mobility—content, credentials, and configurations – and how containers need to account for native vulnerabilities to protect them. Read how Good’s solution provides unique protection and learn the security risks of relying on MDM as your foundational security layer.

Are You App Able? Beyond the basics of email and calendar to LOB advantages: Mobile Apps

For once, high-tech industries are technology laggards. With service industries leading the adoption of mobile app software, traditional businesses are gaining productivity and revenue growth as they move beyond mobile email to line of business apps that enable workflows, collaboration, and communication. The mobile development talent pool continues to grow and security technology has become painless. With that, mobile app deployment has become fast, easy, and scalable. In this whitepaper, you’ll learn how to secure apps that allow enterprises to capture the most value from the exploding mobile opportunity – and what it means to your bottom line.

Balancing Mobile Healthcare Risk With Productivity

Healthcare IT are keenly aware of just how much their healthcare organizations benefit from mobile technologies. Doctors, nurses and other clinicians can interact with applications and each other more easily and efficiently—on-the-go within healthcare facilities as well as from home, on the road, or in the air. But when selecting mobile technology, healthcare organizations face a large roadblock: the missing or limited security features and controls that mobile devices and supporting mobile applications introduce. This whitepaper examines the various process efficiencies that healthcare organizations gain by adopting a business-enabling mobile platform and how to employ supporting technologies to protect patient information so lives can be saved and regulations can be adhered to.

Balancing Mobile Technology Risk With Productivity

IT administrators responsible for keeping the financial services industry up-and-running and productive are keenly aware just how much their firms benefit from mobile technologies. Brokers, agents, processors, managers and other client services personnel can interact with applications more easily and efficiently—on-the-go within corporate offices as well as from home, on the road, or in the air. Whether using smartphones, tablets or laptops, all personnel can share and process information in ways that not only improve client services, but also streamline administrative tasks such as trade execution and client billing as well as critical and timely data exchanges with business partners.

BYOD Policy Consideration (Security)

As more and more of your employees begin using their own iOS and Android devices for work purposes, you have a tremendous opportunity. Launching a "bring your own device" (BYOD) program can help you reduce mobile expenses. Drive employee satisfaction. And increase the productivity of your workforce. But first, you'll need to identify which employees are eligible to bring their own devices. And then know the mobile applications they require to be productive. This report will help you Build a reliable security strategy for employee mobile devices, Define financial reimbursement policies and Develop mobile support policies.

Effective Identity and Access Management in a Mobile World

Effective Identity and Access Management in a Mobile World. Few developments have created more IT disruption in the past five years than the explosion of mobile devices in the workplace. Organization after organization has reaped the benefits of mobile devices for employee productivity, collaboration, and customer communication and satisfaction. Hand in hand with the mobile explosion has been the trend of employees bringing their own devices to work, called Bring Your Own Device or BYOD, which has enhanced employee satisfaction, productivity, and competitive advantage in companies looking to hire the best of the younger generation or fulfill the needs of traveling executives.

Exchange ActiveSync Management Challenges

Exchange ActiveSync has become the de facto standard for synchronizing mobile device calendar, contact, and e-mail data. A successful mobile device deployment depends on giving users a reliable, stable synchronization experience, but there are many parts in the Exchange ActiveSync data path, and if any of these parts fail or degrades the overall experience for some or all of your users will be substandard. This paper describes the Exchange ActiveSync protocol, the data path used for provisioning and synchronizing devices, describes the major challenges inherent in providing reliable sync services particularly for bring-your-own-device (BYOD) users, and discusses how Good Technology’s solutions help meet those challenges by improving uptime and availability, reducing mean time to repair (MTTR) and increasing first-call problem resolution rates.

Give All the People What They Want (Safely)

Face it. Modern workers are addicted to mobile devices. Not just any vanilla corporate-issued devices, but our carefully selected and personalized expressions of ourselves: iPads®, iPhones®, Androids™, and whatever-comes-next. Many of us get to use our devices in the office: 6 out of 10 businesses have welcomed the savings, satisfaction, and simplicity of BYOD programs enabling corporate application and network access from employee-owned devices. Another 32% plan to move to BYOD soon.

Good Technology's Security and Architecture

This white paper provides a detailed description of Good Technology’s Security and Architecture. It provides an overview of the changing landscape of mobile technologies within the enterprise and enumerates the key mobile device challenges faced by enterprise and government organizations. It describes how the Good secure mobility solution helps administrators manage and control their mobile deployments while maintaining a high level of security that encapsulates enterprise data.

Good’s Quarterly Mobility Index Report Q1 2014

What are the latest trends in enterprise mobility—and how can you capitalize? Check out Good’s new Mobility Index Report to get the latest data on app, platform and device preferences. See which apps are the most popular, how the market feels about secure mobility solutions, and which app categories recorded the greatest growth. Get the facts to learn how a simple, affordable approach to secure mobility means you can say yes to BYOD.

MAM 10 Requirements from Real Customer Deployments

Mobile Device Management (MDM) has ushered in on-the-go access to enterprise data, but that convenience has only whetted the appetite of enterprise users. Today’s employees now want access to the whole universe of enterprise applications, network resources, and collaboration tools on demand, on their devices of choice. More apps, more data, more convenience, these expectations add up to a requirement for more creative enterprise enablement within the necessary boundaries of IT control.

Managing Exchange-Connected Mobile Devices in the BYOD Era

The popularity of BYOD and some of its attendant problems have brought about an increased focus on the need to understand what mobile devices are connecting to an infrastructure, to make sure that supported builds of the operating system and applications are used, provide end-to-end support for devices, and how to manage the load on the infrastructure generated by connections originating on mobile devices. And most importantly, how to accomplish all these goals in a cost-effective and efficient manner.

Managing Large-Scale Mobile Deployments

As enterprise mobility becomes pervasive, service interruption can severely and adversely impact the bottom line. However, unlike tier-one systems that were designed, architected and built for reliability and supportability, the rapid emergence of mobility has necessitated a series of compromises. Is IT ready for the growing mobility challenge?

Mobile App Security through Containerization: 10 Essential Questions

Mobile devices present a unique dilemma to the enterprise. On the one hand, workers empowered with tablets and smartphones can transform the way they do business; they’re more agile, closer to customers, and more productive. Bring Your Own Device (BYOD) programs give users the freedom to work on the devices of their own choosing, while still allowing an enterprise to reap the productivity benefits of these always connected, readily accessible mobile devices.

Mobilizing Enterprise Data

Developing a mobile strategy requires the delicate balance of usability, adoption and security in addition to device and platform diversity. Creating a beautiful interface with limited functionality may not impact productivity. Deploying an application with stringent security controls may appease IT but limit usability. This white paper, written by both Good and InnoviMobile, provides insight and a framework to identify the business objectives, people, processes, policies and technology required to optimize enterprise mobility.

When Mobile Device Management Isn't Enough

Organizations are turning to Mobile Device Management (MDM) solutions to better secure, monitor, manage and support the variety of mobile devices used by their employees. However, in many instances, MDM alone is not enough to prevent data loss. This paper presents Good for Enterprise and its unique approach to managing security on mobile devices, which does address some of the shortcomings of an MDM-only strategy.

Wrapping or Coding: Pros and Cons of Containerization Choices

To realize the promises of “productivity improvement” from smart mobile devices, enterprises need to enable their employees with enterprise mobile apps – beyond corporate email, calendar and contacts. To provide value, these enterprise mobile apps must allow users to securely access and work with corporate data when they need it. Further, many enterprises are making mobile apps available to their extended enterprise – i.e., business partners, distributors, etc., making app security and control even more desirable.

Videos

Good Customer Success Stories

See how companies from all industries are achieving success with Good Technology.

Good Customers Redefine their Mobile Experience

Good customers across multiple industries share the benefits of mobility to their business.

Mobile Data Vulnerability: App Snapshots

See how the Good secure mobility platform automatically prevents data loss through “App Snapshots,” protecting valuable corporate data.

Mobile Data Vulnerability: Open In

Learn how the Good secure mobility platform automatically prevents data loss through “Open In,” protecting valuable corporate data.

Secure Mobility Solution

Transform the way you do business with our secure mobility solution.

The Adventures of Maxine and Jeff

Join mobile guru Maxine as she demonstrates the capabilities of Good for Enterprise.

The Good World Tour

See what's next in enterprise mobility from the industry leaders who are paving the way.

Unleash Your Mobile Potential

Good Technology is the secure mobility solution that unlocks your mobile potential.