|By PR Newswire||
|December 4, 2012 03:05 AM EST||
SUNNYVALE, Calif. and LAS VEGAS, Dec. 4, 2012 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today introduced Good Trust™, a security platform that extends critical identity and access management (IAM) capabilities— such as strong authentication, single sign-on and identity federation— to mobile devices and applications. Developers, ISVs and IT managers that have built mobile enterprise apps using the Good Dynamics® app security platform will be able to leverage the robust set of API's available through the Good Trust platform to customize each mobile application experience based on user identity. In conjunction with today's announcement, Good also unveiled Good Vault™, the first product to be delivered through the Good Trust platform, which incorporates IAM capabilities and encryption to Good for Enterprise™ to enhance data protection. Both Good Trust and Good Vault were launched at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.
"The 'bring your own device' (BYOD) phenomenon has made mobile devices the dominant screen for use by today's workforce, causing them to become the target of increased malicious attacks and fraud," said Nicko van Someren, Chief Technology Officer, Good Technology. "Escalating security threats, coupled with the explosion of mobile applications, are necessitating the need for a second-layer of mobile security to ensure the protection of enterprise information and assets."
The critical IAM capabilities that will be delivered through the Good Trust platform include:
- Strong two-factor authentication at the application level to assert identity
- Access control that leverages existing infrastructure and can be centrally managed by IT
- Single sign-on to easily switch between applications
- Identity federation to create economies of scale; and
- Context-based policy enforcement to strengthen security.
According to a recent report by Ian Glazer, research vice president at Gartner, currently, there is a loose connection between MDM and IAM products. Today, IAM tools can assign Active Directory (AD) groups that can then be used by MDM solutions to enforce policy and even distribute certificates. However, Gartner expects a deepening and more meaningful relationship between MDM and IAM to arise in the next few years.
The Good Trust platform will offer a versatile digital authentication framework that can support a wide array of mobile authentication technologies including microSD, smart cards, OTP, and biometrics. It will also offer the ability to create adaptive and context-based authentication that can automatically adjust to the user's environment and solutions.
Using Good Trust, enterprises will be able to architect mobile applications that:
- Increase mobile worker productivity with authentication and seamless single sign-on from mobile apps to remote services and data stores
- Meet compliance mandates by restricting access to sensitive resources only to authorized users
- Improve IT efficiency and manageability of mobile apps with self-service provisioning and identity governance
- Enable mobile devices to deliver secure access to buildings or conduct safe and private financial transactions.
"In today's rapidly expanding and diversified BYOD workplace, IT leaders must balance risks and benefits: the enterprise need for security, compliance and manageability of mobile applications, versus employee and customer demand for flexibility and accessibility," said Michael W. Mahan, senior vice president of special markets for Good Technology, who leads the Good Trust line of business. "Good Trust will enable new ways to leverage personal identity to enhance mobile security so that companies no longer have to make tradeoffs. They will be able to allow employees, customers and consumers to securely access enterprise systems, physical buildings or even their bank account using their mobile device without jeopardizing sensitive personal or business data."
The Good Trust platform will also provide the essential workflows, developer tools, APIs and integrations that allow IT to centrally manage user provisioning, access permissions, and application life cycle management with full audit control to ensure compliance and complete data governance. Leveraging Good Trust, ISVs and enterprise or B2C app developers will be able to rapidly include IAM capabilities in mobile apps built with Good Dynamics®, which helps speed app development and deployment and drive user adoption and satisfaction.
To learn more the Good Trust platform visit http://www1.good.com/mobility-management-solutions/mobile-identity-and-access-management. Those attending the Gartner Identity and Access Management summit at Caesar's Palace in Las Vegas can also visit booth #S29 for a demo and additional product information.
About Good Technology
Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100™ leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government. Learn more at www.good.com.
©2012 Good Technology Corporation and its related entities. All use subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks are the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.
 "Decision Point for Identity and Access Management in Mobility Projects," Gartner Research, August 2012.
SOURCE Good Technology
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Sep. 2, 2015 05:00 AM EDT Reads: 797
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
Sep. 2, 2015 04:00 AM EDT Reads: 234
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Sep. 2, 2015 04:00 AM EDT Reads: 478
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Sep. 2, 2015 03:45 AM EDT Reads: 423
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Sep. 2, 2015 03:30 AM EDT Reads: 603
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
Sep. 2, 2015 03:00 AM EDT Reads: 520
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Sep. 2, 2015 02:30 AM EDT Reads: 445
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
Sep. 2, 2015 02:00 AM EDT Reads: 694
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
Sep. 2, 2015 01:45 AM EDT Reads: 480
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Sep. 1, 2015 11:45 PM EDT Reads: 396
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
Sep. 1, 2015 11:45 PM EDT Reads: 541
It’s been proven time and time again that in tech, diversity drives greater innovation, better team productivity and greater profits and market share. So what can we do in our DevOps teams to embrace diversity and help transform the culture of development and operations into a true “DevOps” team? In her session at DevOps Summit, Stefana Muller, Director, Product Management – Continuous Delivery at CA Technologies, answered that question citing examples, showing how to create opportunities for ...
Sep. 1, 2015 11:00 PM EDT Reads: 510
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Sep. 1, 2015 07:00 PM EDT Reads: 273
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Sep. 1, 2015 04:30 PM EDT Reads: 392
WSM International, the pioneer and leader in server migration services, has announced an agreement with WHOA.com, a leader in providing secure public, private and hybrid cloud computing services. Under terms of the agreement, WSM will provide migration services to WHOA.com customers to relocate some or all of their applications, digital assets, and other computing workloads to WHOA.com enterprise-class, secure cloud infrastructure. The migration services include detailed evaluation and planning...
Sep. 1, 2015 04:00 PM EDT Reads: 200