Analyst Research

2014 Aragon Research: Globe Report for Enterprise Mobile Management (EMM)

The 2014 Aragon Research Globe report for EMM rates vendors based on a rigorous analysis of strategy, performance and global reach. The results are in! Aragon Research lists Good Technology as the de facto leader in mobile security, a pioneer in providing a secure approach to managing both mobile devices and data. Access this report to see Aragon’s evaluation of EMM solutions and how they stack up in providing comprehensive EMM that goes beyond MDM to include mobile application management, mobile service management, mobile content management and much more.

451 Research - BYOD Challenges, MDM Trends, Vendor Landscape

As the bring-your-own-device model continues to grow at twice the rate of corporate-owned devices, enterprises are facing an increasingly diversified mobility landscape. And though the productivity, cost and user-satisfaction benefits of BYOD abound, with them come complex management requirements and potential security challenges. This 451 Group report explains the BYOD challenges that can be addressed with an MDM solution, MDM investment changes and vendor implementation and adoption trends.

Forrester: The State of Enterprise Mobile Security, Q1 2014

As more firms become comfortable with bring-your-own-device (BYOD) strategies, security and risk (S&R) pros must remain vigilant — particularly as firms seek to empower employees with more than just email, contacts, and calendaring. To be a business enabler, S&R pros must understand how mobile strategies for management and security are shifting from devices to apps and data. After reading this report, S&R pros will have a much better understanding of how other organizations are dealing with mobility risks and ultimately which considerations to take before planning future mobile initiatives.

Gartner Research: Magic Quadrant for Enterprise Mobility Management Suites

Mobile device management (MDM) by itself is no longer a sufficient solution for enabling enterprise mobility. What’s needed is enterprise mobility management (EMM) that also provides integrated mobile content management (MCM), secure containers and mobile application management (MAM). We believe with Good’s secure mobility solutions, businesses are well positioned to a safely benefit from enterprise mobility even if the mobile OS doesn’t provide the required app management capabilities or if an MDM profile is not installed on the device. All while enabling a great end-user experience.

Gartner Research: The Impact of Mobility on the IT Service Desk

Mobile devices rule the enterprise. And while the upsides are clear, there’s a big problem that needs attention: adoption now happens so fast that IT teams often don’t have the capacity—or staff—to handle demand. Read this Gartner research now to see how I&O leaders can implement new support models to address the increasing mobility needs. Learn how you can address your most common support calls, use BYOD to transfer support to end users, and complement formal support with social support tools.

IDC MarketScape on Enterprise Mobility ManagementSoftware

As organizations mobilize IT needs a solution that harnesses the power of mobility, without compromising user experience, corporate data security or personal privacy. In their most recent IDC MarketScape on Enterprise Mobile Management Software, IDC evaluated a wide set of vendors delivering EMM software and named Good Technology a leader. The IDC MarketScape found “Good's customers cite deep comfort with the company's security model, easy administration, and an excellent support function as strengths of the company.“

IDC: Managing and Securing Mobile Applications in Today's BYOD Enterprise Environments (IDC, January 2013)

With the consumerization of IT, technology innovation is centered on consumer devices that are more sophisticated and user friendly and that enable greater staff productivity than those provided by employers. In addition, new applications sourced from app stores are also empowering the employees who use these devices. Yet with the rush to rapidly leverage mobile apps, companies often fail to establish effective application life-cycle processes or secure data management guidelines. An effective enterprise mobile strategy must include an approach to creating secure end-to-end mobile applications and leveraging third-party applications appropriately. In this paper written by IDC, learn important considerations and best practices for securing mobile applications in BYOD environments.

The Forrester Wave™: Enterprise Mobile Management, Q3 2014

In their most recent Forrester Wave on Enterprise Mobile Management, Forrester Research found that “There’s a surge of innovation in mobile technology as part of broader business technology engagement platforms to ensure employees have access to the information they need to better serve customers during these critical moments.”
Good Technology was recently cited as a leader in The Forrester Wave™: Enterprise Mobile Management, Q3 2014. Good received top scores of 5 out of 5 in 16 of 27 categories. Get the detailed report to see how the most significant providers compared.

Brochures

Good for Government

Good for Government brings the highest levels of security, visibility, and manageability to mobile deployments used for critical communications with constituents, vendors, and other agencies. Users benefit from enterprise-class messaging and secure access to behind-the-firewall data and applications, while IT can secure and manage its mobile deployment from a simple web-based console. S/MIME is available for agencies that require the highest level of end-to-end security.

Good Mobile Collaboration Solutions

Fuel mobile collaboration. Protect company data and employee privacy. Create mobile app workflows that include patent-pending app-to-app security.

Tip Sheet: Mobile Collaboration: 7 Pitfalls to Avoid

The right mobile collaboration solution provides complete flexibility without impacting personal use or exposing corporate data to loss or theft. Give your employees access to the apps they know and love. Give your IT team an unbeatable secure infrastructure. And give your bottom line a kick in the right direction.

Tip Sheet: Moving Beyond MDM to Mobile Apps

As organizations move beyond Mobile Device Management (MDM), IT must ensure that the chosen apps can secure corporate data while enabling efficiency. Here are 10 things to consider as you move forward with mobile business apps.

Top Considerations for Defining a Successful BYOD Strategy

The Bring-Your-Own-Device (BYOD) ownership model is here to stay. However, with the plethora of mobile device choices available to your employees, this model introduces inconsistent user experiences, data security challenges and potential deployment complexity.

Data Sheets

1-Click BYOD with Good Enterprise Suite

How do you mobilize your workforce quickly while protecting company data and personal privacy on BYOD devices?

Accelerating Your Mobile Journey to Apps and Business Productivity

The Good Platform provides the foundation for enterprise mobility. It delivers industry-leading security at the device, app and data level while providing the flexibility to support an ever-changing set of business and technical requirements. Built for the most demanding businesses, the Good Platform is the enterprise-ready solution for meeting critical mobile needs.

BYOD Policy Construct

Create and implement a BYOD program as quickly and seamlessly as possible.

Deployment Consulting Services

Soon you may need to rapidly prepare for a company-wide enterprise mobility rollout. We can help.

Good Access

Good Access is a secure mobile browser that enables business users to securely access their intranet and popular web based productivity applications using their mobile device of choice.

Good and HIPAA

Provides the firewall, transmission, and handheld device security required by HIPAA's Security Rule

Good Collaboration Suite

The Good Collaboration Suite delivers everything you need to move beyond just business email and enable your key business processes with enhanced collaboration and a wide range of ISV apps.

Good Connect

Good Connect delivers a secure instant messaging platform that protects corporate data at the application level. It leverages FIPS-certified AES encryption libraries, providing an additional layer of defense against malware-infected applications.

Good Dynamics Secure Mobility Platform

The Good Platform provides the foundation for enterprise mobility. It delivers industry-leading security at the device, app and data level while providing the flexibility to support an ever-changing set of business and technical requirements. Built for the most demanding businesses, the Good Platform is the enterprise-ready solution for meeting critical mobile needs.

Good for Enterprise

Good for Enterprise securely manages data and devices. It is part of the Good Collaboration Suite and accelerates day one productivity, offering the following benefits to enterprises.

Good for Salesforce1

Good® Mobile Device Management (MDM) supports the complete mobile device lifecycle, providing IT with a central location from which to view, configure and control any managed smart device over the air. Mobile users can work on the devices they choose and IT can ensure safe access to proprietary business information.

Good Mobility Suite

Use mobility to stay ahead of the competition. Achieve competitive advantage and business transformation through building, managing, securing and supporting a wide array of custom business apps. The Good Mobility Suite gives you everything you need to align your business processes to new mobile opportunities.

Good Secure Mobile Productivity Suite

How do you empower users beyond email with the mobile office and CRM capabilities they need to be productive while on the go?

Good Share

Good Share provides a push/pull data exchange between app and document server. This means you can meet your employees’ needs without further investment in VPN, firewall re-configurations, or risky cloud or DMZ stores.

Good Transition Services

Corporate-liable is out. BYOD is in. Get Good and secure it all. Seamlessly transition from legacy services to a new mobile device platform with this valuable service set.

Good Vault

Now, IT can extend 2-factor authentication to Good for Enterprise—and provide S/MIME mail security—all without compromising the mobile form factor.

Good Work

More business is being done on mobile devices than ever before. IT wants to meet the demands of end users with solutions that deliver usability and protect corporate data. They are looking for trusted partners that offer affordable and future-proof technology. Employees want to use their mobile devices to get work done – quickly and easily. Businesses want to grow and stay competitive while managing costs. So how do you do it all?

Good Work Deployment Consulting Services

How do you make your mobile workforce more productive, while keeping your company’s data secure – no matter who owns the device? Good Technology’s professional services team has the answer and can help you get started quickly and efficiently. Our world-class team has a track record of over a thousand implementations and can help accelerate your deployment so you can deliver business-class collaboration with industry-leading security, and mobile-optimized performance.

Mobile Device Management

Good® Mobile Device Management (MDM) supports the complete mobile device lifecycle, providing IT with a central location from which to view, configure and control any managed smart device over the air. Mobile users can work on the devices they choose and IT can ensure safe access to proprietary business information.

Mobile Operations Management

Mobile environments are inherently complex, consisting of multiple devices, apps, carriers, NOCs, firewalls, networks, proxies, load balancers, Microsoft Exchange, and other backend infrastructure. However, traditional monitoring fails to look across this entire infrastructure, end-to-end including components both inside and outside the firewall. Good Mobile Service Management provides proactive monitoring, alerting and troubleshooting, enabling operations teams to pinpoint issues before they cause service disruptions.

Mobile Service Management

Enterprise mobility users have little tolerance for service downtime and, as companies move to enterprise-wide mobility, IT will have to maintain SLAs similar to other enterprise platforms. With Good Mobile Service Management, IT can continually monitor the mobility infrastructure, enable mobility services to be restored before mobile users are aware of issues and allow existing helpdesk teams to provide users with actionable intelligence without having to be mobility experts.

Mobile Support Management

Good Mobile Service Management addresses the complex support challenge by providing the visibility support teams need. Included Service Desk capabilities empower level-one service desk staff to resolve most issues, reduce escalations and drive down the costs of wide-scale mobile deployments. User Self-Service ensures many common issues never require a support call in the first place.

MobileSputnik for Good

MobileSputnik for Good opens up easy and secure access to corporate information assets with on-premises deployment and smooth integration into an existing enterprise IT and information security landscape. MobileSputnik for Good provides a rich toolset for document access, viewing, sharing and management directly on tablets, giving users familiar PC capabilities and providing rich functionality, usability and security while working with corporate files at any time in any place.

Protecting The 3 C's of Secure Mobility

Containers Need to Protect The 3 C’s of Secure Mobility.
Not all mobile app containers are created equal. Containers need to protect documents, yet also ensure secure mobility beyond content to both credentials and configuration information.

White Papers

10 Best Practices for Implementing a Successful BYOD Program

The Bring-Your-Own-Device (BYOD) ownership model is no longer hype or a privilege of early adopters. According to Gartner, “By 2017, half of employers will require employees to supply their own device for work purposes”1. Businesses everywhere have acknowledged the benefits that a BYOD model delivers – including improved user productivity, engagement and satisfaction as well as potential cost savings.

10 Recommendations to Optimize Mobile Migration

Many organizations are planning or executing on migration projects to new mobile platforms. Frequently, these migration projects include movements from BlackBerry devices to new iOS and Android devices. As the leading secure mobility provider for new mobility platforms, many migrating organizations have turned to Good Technology for secure email and collaboration apps to maintain mobile user productivity and certified security of the mobile messaging infrastructure.

7 Must Haves for Mobile App Security

Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity.

A Business Case for Enterprise Mobility Management

Managing a diverse environment of devices, apps, and use cases in a manner that’s not just secure, but also cost efficient and scalable, can be challenging. The key to managing this diversity is to focus on data management, not device management. In our latest paper, “A Business Case for Enterprise Mobility Management,” we provide a framework for constructing a business case for enterprise mobility management.

A Business Case for Secure Mobile Collaboration

The new productivity is driven by a generation of secure, collaborative mobile apps that let employees do more with their devices. By keeping workflows integrated and safe, these apps promote greater levels of collaboration and convenience in the areas of document retrieval, storage, editing, and transmission. These benefits, as well as costs, risks, and solutions are provided in the framework of a business case in our latest paper, “A Business Case for Mobile Collaboration.” This paper examines the business benefits of enabling mobile app workflows and elaborates on the business drivers behind supporting a secure collaboration strategy. Examines use cases of leaders driving productivity via mobility. The paper reviews the costs and benefits of opening mobile access to fuel interactions between employees.

A Trusted Method for Mobile Platform Transitions

Good Technology’s Professional Services organization has deep experience advising and supporting Fortune 500 organizations on mobile platform migrations, and has developed a trusted, validated migration method. Below is a sample planning chart that depicts Good’s platform transition method.

All Containers are Not Created Equal – The 3 Cs of Secure Mobility

Many enterprises are looking for a migration path from BlackBerry and device management to a new app-centric mobility solution, and are inundated by vendors claiming to enable secure mobility with “containers.” But how do you sift through the hype? This whitepaper describes the Three C’s of Secure Mobility—content, credentials, and configurations – and how containers need to account for native vulnerabilities to protect them. Read how Good’s solution provides unique protection and learn the security risks of relying on MDM as your foundational security layer.

Applying IT Service Management Best Practices To Mobile

IT Service Management is an effective, customer-focused approach to ensure that users get the IT services they require in the right priority, in a timely fashion and at the right price. As mobility becomes a critical business system, applying ITSM to mobility can improve mobile service and business results. Learn best practices on how to apply ITSM to a mobile world.

Are You App Able? Beyond the basics of email and calendar to LOB advantages: Mobile Apps

For once, high-tech industries are technology laggards. With service industries leading the adoption of mobile app software, traditional businesses are gaining productivity and revenue growth as they move beyond mobile email to line of business apps that enable workflows, collaboration, and communication. The mobile development talent pool continues to grow and security technology has become painless. With that, mobile app deployment has become fast, easy, and scalable. In this whitepaper, you’ll learn how to secure apps that allow enterprises to capture the most value from the exploding mobile opportunity – and what it means to your bottom line.

Balancing Mobile Healthcare Risk With Productivity

Healthcare IT are keenly aware of just how much their healthcare organizations benefit from mobile technologies. Doctors, nurses and other clinicians can interact with applications and each other more easily and efficiently—on-the-go within healthcare facilities as well as from home, on the road, or in the air. But when selecting mobile technology, healthcare organizations face a large roadblock: the missing or limited security features and controls that mobile devices and supporting mobile applications introduce. This whitepaper examines the various process efficiencies that healthcare organizations gain by adopting a business-enabling mobile platform and how to employ supporting technologies to protect patient information so lives can be saved and regulations can be adhered to.

Balancing Mobile Technology Risk With Productivity

IT administrators responsible for keeping the financial services industry up-and-running and productive are keenly aware just how much their firms benefit from mobile technologies. Brokers, agents, processors, managers and other client services personnel can interact with applications more easily and efficiently—on-the-go within corporate offices as well as from home, on the road, or in the air. Whether using smartphones, tablets or laptops, all personnel can share and process information in ways that not only improve client services, but also streamline administrative tasks such as trade execution and client billing as well as critical and timely data exchanges with business partners.

BYOD Policy Consideration (Security)

As more and more of your employees begin using their own iOS and Android devices for work purposes, you have a tremendous opportunity. Launching a "bring your own device" (BYOD) program can help you reduce mobile expenses. Drive employee satisfaction. And increase the productivity of your workforce. But first, you'll need to identify which employees are eligible to bring their own devices. And then know the mobile applications they require to be productive. This report will help you Build a reliable security strategy for employee mobile devices, Define financial reimbursement policies and Develop mobile support policies.

Effective Identity and Access Management in a Mobile World

Effective Identity and Access Management in a Mobile World. Few developments have created more IT disruption in the past five years than the explosion of mobile devices in the workplace. Organization after organization has reaped the benefits of mobile devices for employee productivity, collaboration, and customer communication and satisfaction. Hand in hand with the mobile explosion has been the trend of employees bringing their own devices to work, called Bring Your Own Device or BYOD, which has enhanced employee satisfaction, productivity, and competitive advantage in companies looking to hire the best of the younger generation or fulfill the needs of traveling executives.

Enhancing Business Productivity with Secure Mobile Workflows

Companies everywhere are moving beyond the basics of mobility to deliver sophisticated mobile workflows that connect employees with each other, their partners and their customers. Read this paper to see how you can join them. Learn how to increase productivity by mobilizing email, calendar, document editing, contract signing and more. See sample workflows that create efficiencies for sales teams, lawyers, financial advisors, healthcare professionals and first responders—to name just a few. Find out how bring mobile structure to the collaboration process and reduce the risk of data loss.

Exchange ActiveSync Management Challenges

Exchange ActiveSync has become the de facto standard for synchronizing mobile device calendar, contact, and e-mail data. A successful mobile device deployment depends on giving users a reliable, stable synchronization experience, but there are many parts in the Exchange ActiveSync data path, and if any of these parts fail or degrades the overall experience for some or all of your users will be substandard. This paper describes the Exchange ActiveSync protocol, the data path used for provisioning and synchronizing devices, describes the major challenges inherent in providing reliable sync services particularly for bring-your-own-device (BYOD) users, and discusses how Good Technology’s solutions help meet those challenges by improving uptime and availability, reducing mean time to repair (MTTR) and increasing first-call problem resolution rates.

Gartner Research: The Impact of Mobility on the IT Help Desk

Mobile devices rule the enterprise. And while the upsides are clear, there’s a big problem that needs attention: adoption now happens so fast that IT teams often don’t have the capacity—or staff—to handle demand. Read this Gartner research now to see how I&O leaders can implement new support models to address the increasing mobility needs. Learn how you can address your most common support calls, use BYOD to transfer support to end users, and complement formal support with social support tools.

Give All the People What They Want (Safely)

Face it. Modern workers are addicted to mobile devices. Not just any vanilla corporate-issued devices, but our carefully selected and personalized expressions of ourselves: iPads®, iPhones®, Androids™, and whatever-comes-next. Many of us get to use our devices in the office: 6 out of 10 businesses have welcomed the savings, satisfaction, and simplicity of BYOD programs enabling corporate application and network access from employee-owned devices. Another 32% plan to move to BYOD soon.

Good Technology's Security and Architecture

This white paper provides a detailed description of Good Technology’s Security and Architecture. It provides an overview of the changing landscape of mobile technologies within the enterprise and enumerates the key mobile device challenges faced by enterprise and government organizations. It describes how the Good secure mobility solution helps administrators manage and control their mobile deployments while maintaining a high level of security that encapsulates enterprise data.

Good’s Quarterly Mobility Index Report Q1 2014

What are the latest trends in enterprise mobility—and how can you capitalize? Check out Good’s new Mobility Index Report to get the latest data on app, platform and device preferences. See which apps are the most popular, how the market feels about secure mobility solutions, and which app categories recorded the greatest growth. Get the facts to learn how a simple, affordable approach to secure mobility means you can say yes to BYOD.

Good’s Quarterly Mobility Index Report Q2 2014

In this quarter’s Mobility Index Report, we continue to see organizations across industries progress along the mobile maturity curve and adopt a true ‘platform’ approach. Leveraging secure mobile enterprise applications, organizations are securely delivering critical but sensitive data to their employees, customers and partners and realizing the tremendous business benefits of doing so. From customer relationship management (CRM) to business intelligence to secure instant messaging, organizations are mobilizing business processes by moving away from legacy desktop apps and reinvesting those resources into building and deploying secure app-to-app workflows.

Grow Your Business with the Right Mobility Solution

Business professionals expect to utilize their mobile devices to complete vital transactions any time of day and night from wherever they are—whether in meetings, at customer sites, on the road, and even at home on the couch. This paper explores how to execute a mobility strategy through the use of a secure mobile platform that can make the “anytime-anywhere workforce” even more successful. We’ll also look at the benefits and risks of mobile collaboration, the evaluation criterion for end-to-end secure mobility solutions, and the most common mobile workforce tasks and use cases that drive business productivity and increased market competitiveness.

Maintaining Mobile Reliability and Uptime

As users become mobile and revenue increasingly depends on mobility ensuring reliable operation becomes paramount. Unfortunately, mobile architectures present an unavoidable set of unique challenges for IT operations. Traditional monitoring solutions fail to fully address these challenges. As a result, service interruptions can be commonplace and can severely and adversely impact the bottom line for many businesses. This white paper will present an overview of the unique attributes of mobility as well as best practices to effectively address accompanying challenges.

MAM 10 Requirements from Real Customer Deployments

Mobile Device Management (MDM) has ushered in on-the-go access to enterprise data, but that convenience has only whetted the appetite of enterprise users. Today’s employees now want access to the whole universe of enterprise applications, network resources, and collaboration tools on demand, on their devices of choice. More apps, more data, more convenience, these expectations add up to a requirement for more creative enterprise enablement within the necessary boundaries of IT control.

Managing Exchange-Connected Mobile Devices in the BYOD Era

The popularity of BYOD and some of its attendant problems have brought about an increased focus on the need to understand what mobile devices are connecting to an infrastructure, to make sure that supported builds of the operating system and applications are used, provide end-to-end support for devices, and how to manage the load on the infrastructure generated by connections originating on mobile devices. And most importantly, how to accomplish all these goals in a cost-effective and efficient manner.

Managing Large-Scale Mobile Deployments

As enterprise mobility becomes pervasive, service interruption can severely and adversely impact the bottom line. However, unlike tier-one systems that were designed, architected and built for reliability and supportability, the rapid emergence of mobility has necessitated a series of compromises. Is IT ready for the growing mobility challenge?

Mobile App Security through Containerization: 10 Essential Questions

Mobile devices present a unique dilemma to the enterprise. On the one hand, workers empowered with tablets and smartphones can transform the way they do business; they’re more agile, closer to customers, and more productive. Bring Your Own Device (BYOD) programs give users the freedom to work on the devices of their own choosing, while still allowing an enterprise to reap the productivity benefits of these always connected, readily accessible mobile devices.

Mobile Support Challenges

In recent years, mobility has taken the enterprise by storm. In a shockingly short time period smartphones have gone from consumer novelty to nearly biquitous, both outside and inside the workplace. Many users today use mobile devices as their primary interface to the business. Still more use it frequently during their off-hours. The productivity gains have been massive and the opportunity for additional business transformation makes mobility the most promising emerging technology of our time.

Mobility Report: Are You Keeping Pace with Your Peers?

Learn where you rank on mid-market mobility adoption
Mid-market companies are the growth engine of today’s economy; they’re growing—and hiring—much more quickly than their enterprise cousins. And this breakneck growth makes mobile productivity critical.

Mobilizing Enterprise Data

Developing a mobile strategy requires the delicate balance of usability, adoption and security in addition to device and platform diversity. Creating a beautiful interface with limited functionality may not impact productivity. Deploying an application with stringent security controls may appease IT but limit usability. This white paper, written by both Good and InnoviMobile, provides insight and a framework to identify the business objectives, people, processes, policies and technology required to optimize enterprise mobility.

When Mobile Device Management Isn't Enough

Organizations are turning to Mobile Device Management (MDM) solutions to better secure, monitor, manage and support the variety of mobile devices used by their employees. However, in many instances, MDM alone is not enough to prevent data loss. This paper presents Good for Enterprise and its unique approach to managing security on mobile devices, which does address some of the shortcomings of an MDM-only strategy.

Wrapping or Coding: Pros and Cons of Containerization Choices

To realize the promises of “productivity improvement” from smart mobile devices, enterprises need to enable their employees with enterprise mobile apps – beyond corporate email, calendar and contacts. To provide value, these enterprise mobile apps must allow users to securely access and work with corporate data when they need it. Further, many enterprises are making mobile apps available to their extended enterprise – i.e., business partners, distributors, etc., making app security and control even more desirable.

Videos

Good Customer Success Stories

See how companies from all industries are achieving success with Good Technology.

Good Customers Redefine their Mobile Experience

Good customers across multiple industries share the benefits of mobility to their business.

Good Exchange New York City 2014

Get ready to unleash the potential of secure mobility and build competitive advantage for your business. Learn what’s next in enterprise mobility from the industry leaders who are paving the way to the future.

Good Mobility Summit: D.C.

Is secure mobility an oxymoron? How are BAE Systems deploying a secure mobility strategy? Watch the Good Mobility Summit: D.C. to find out!

Good Mobility Summit: Sydney

How will BYOD, BYOA and COPE impact your organisation? What are leading analysts saying about the latest enterprise mobility trends? Which apps do your peers use to transform the way they do business? Watch the Good Mobility Summit: Sydney to find out!

Mobile Data Vulnerability: App Snapshots

See how the Good secure mobility platform automatically prevents data loss through “App Snapshots,” protecting valuable corporate data.

Mobile Data Vulnerability: Open In

Learn how the Good secure mobility platform automatically prevents data loss through “Open In,” protecting valuable corporate data.

Mobile Service Quality: Exchange ActiveSync

As users go mobile, Exchange ActiveSync (EAS) is widely used for synchronizing mobile device calendars, contacts and email, but its many moving parts create numerous problems. Better understand these challenges as explained by Paul Robichaux, Exchange Server MVP in this ongoing series of videos on mobile service management.

Secure Mobility Solution

Transform the way you do business with our secure mobility solution.

The Adventures of Maxine and Jeff

Join mobile guru Maxine as she demonstrates the capabilities of Good for Enterprise.

The Good World Tour

See what's next in enterprise mobility from the industry leaders who are paving the way.

Unleash Your Mobile Potential

Good Technology is the secure mobility solution that unlocks your mobile potential.