Welcome!

News Feed Item

Good Technology Unveils Good Trust - A New Mobile Identity & Access Management Platform

Platform allows developers and ISV's to integrate single sign-on capability with two-factor authentication to mobile apps built with Good Dynamics®

SUNNYVALE, Calif. and LAS VEGAS, Dec. 4,  2012 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today introduced Good Trust™, a security platform that extends critical identity and access management (IAM) capabilities— such as strong authentication, single sign-on and identity federation— to mobile devices and applications. Developers, ISVs and IT managers that have built mobile enterprise apps using the Good Dynamics® app security platform will be able to leverage the robust set of API's available through the Good Trust platform to customize each mobile application experience based on user identity.  In conjunction with today's announcement, Good also unveiled Good Vault™, the first product to be delivered through the Good Trust platform, which incorporates IAM capabilities and encryption to Good for Enterprise™ to enhance data protection. Both Good Trust and Good Vault were launched at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.

(Logo:  http://photos.prnewswire.com/prnh/20120125/AQ41496LOGO-b)

"The 'bring your own device' (BYOD) phenomenon has made mobile devices the dominant screen for use by today's workforce, causing them to become the target of increased malicious attacks and fraud," said Nicko van Someren, Chief Technology Officer, Good Technology. "Escalating security threats, coupled with the explosion of mobile applications, are necessitating the need for a second-layer of mobile security to ensure the protection of enterprise information and assets."

The critical IAM capabilities that will be delivered through the Good Trust platform include:

  • Strong two-factor authentication at the application level to assert identity
  • Access control that leverages existing infrastructure and can be centrally managed by IT
  • Single sign-on to easily switch between applications
  • Identity federation to create economies of scale;  and
  • Context-based policy enforcement to strengthen security.

According to a recent report by Ian Glazer, research vice president at Gartner, currently, there is a loose connection between MDM and IAM products. Today, IAM tools can assign Active Directory (AD) groups that can then be used by MDM solutions to enforce policy and even distribute certificates. However, Gartner expects a deepening and more meaningful relationship between MDM and IAM to arise in the next few years.[1]

The Good Trust platform will offer a versatile digital authentication framework that can support a wide array of mobile authentication technologies including microSD, smart cards, OTP, and biometrics. It will also offer the ability to create adaptive and context-based authentication that can automatically adjust to the user's environment and solutions.

Using Good Trust, enterprises will be able to architect mobile applications that:

  • Increase mobile worker productivity with authentication and seamless single sign-on from mobile apps to remote services and data stores
  • Meet compliance mandates by restricting access to sensitive resources only to authorized users
  • Improve IT efficiency and manageability of mobile apps with self-service provisioning and identity governance
  • Enable mobile devices to deliver secure access to buildings or conduct safe and private financial transactions.

"In today's rapidly expanding and diversified BYOD workplace, IT leaders must balance risks and benefits: the enterprise need for security, compliance and manageability of mobile applications, versus employee and customer demand for flexibility and accessibility," said Michael W. Mahan, senior vice president of special markets for Good Technology, who leads the Good Trust line of business.  "Good Trust will enable new ways to leverage personal identity to enhance mobile security so that companies no longer have to make tradeoffs. They will be able to allow employees, customers and consumers to securely access enterprise systems, physical buildings or even their bank account using their mobile device without jeopardizing sensitive personal or business data."

The Good Trust platform will also provide the essential workflows, developer tools, APIs and integrations that allow IT to centrally manage user provisioning, access permissions, and application life cycle management with full audit control to ensure compliance and complete data governance. Leveraging Good Trust, ISVs and enterprise or B2C app developers will be able to rapidly include IAM capabilities in mobile apps built with Good Dynamics®, which helps speed app development and deployment and drive user adoption and satisfaction.

To learn more the Good Trust platform visit http://www1.good.com/mobility-management-solutions/mobile-identity-and-access-management.  Those attending the Gartner Identity and Access Management summit at Caesar's Palace in Las Vegas can also visit booth #S29 for a demo and additional product information.

About Good Technology

Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100™ leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government.  Learn more at www.good.com.

©2012 Good Technology Corporation and its related entities. All use subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks are the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.

[1] "Decision Point for Identity and Access Management in Mobility Projects," Gartner Research, August 2012.

SOURCE Good Technology

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.