Patented Approach to Mobile Security
What is Good's unique approach to mobile security? How do we do it? Hear Dr. Nicko van Someren, CTO of Good Technology explain Good's trusted security architecture and talk through the key features of the Good security model.
Protect Corporate Data
We continuously innovate new approaches for mobility and security, most recently adding support for wearables. Good uniquely protects the 3 C’s of corporate data – content, credentials and configurations. Enterprise-grade AES encryption ensures data is protected —whether at rest, in motion or in use - even if the device pin code is compromised. Because Good does not have access to keys to decrypt this data, this means all data, such as corporate email and attachments, cannot be read by Good. Our solutions enable organizations to comply with stringent multi-national regulatory requirements. In fact, Good is the only cross-platform mobile collaboration solution to achieve Common Criteria EAL4+ for both iOS and Android.
Respect User Privacy
Many organizations support and encourage a bring your own device (BYOD) policy. Protecting personal content and ensuring user privacy is paramount to ensuring trust with users while complying with local regulatory and privacy laws. The Good Secure Container ensures the protection of corporate data while protecting personal privacy. As Good security does not require an MDM profile, corporate apps can be provided to contractors and business partners on non-managed devices while ensuring corporate data protection.