Welcome!

News Feed Item

Good Technology Introduces Good Vault - The First Identity & Access Management Solution for Secure Email on iOS Devices

Good Vault™ extends strong two-factor authentication and Secure/Multipurpose Internet Mail Extensions (S/MIME) email signing and encryption to Good for Enterprise™ to enhance data protection

SUNNYVALE, Calif. and LAS VEGAS, Dec. 4, 2012 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today introduced Good Vault™, the first product built on the newly introduced Good Trust™ mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and S/MIME security to Good's award-winning Good for Enterprise™ email application. Leveraging Good Vault, highly regulated organizations in the government, healthcare and financial services industries can more effectively battle escalating mobile security threats while meeting compliance regulations.  The new solution was unveiled at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.

(Photo:  http://photos.prnewswire.com/prnh/20121204/AQ23446)

(Logo:  http://photos.prnewswire.com/prnh/20120125/AQ41496LOGO-b)

"Mobility has been the ultimate disruptive technology. The number of bring your own device (BYOD) programs is increasing within enterprises and application authentication is not immune from this influence," said Michael W. Mahan, senior vice president of special markets for Good Technology, who leads the Good Trust product line. "BYOD impacts the controls and management options available to the enterprise—underscoring the need for more flexible and extendable secure access solutions. At Good, we believe that mobile two-factor authentication is on track to become the dominant force in the IAM market and we intend to lead the pack in its adoption with our Good Trust platform and the Good Vault solution."

According to recent research by Gartner, IAM processes and technologies make significant contributions to the business strategies and technologies that are among CIOs' higher priorities.[1] Good Vault allows IT, Security, and Information Assurance leaders to:

  • Ensure integrity and security of corporate email and data
  • Prevent data loss using S/MIME[2] encryption with credentials stored in a Secure Element
  • Drive employee adoption with convenience and portability
  • Meet stringent compliance regulations and security standards
  • Better comply with HSPD-12, FIPS, FFIEC, PCI-DSS, HITEC, HIPAA and other regulatory standards
  • Leverage current IAM investments to increase ROI and extend mobility
  • Lower overall costs for mobile IAM

Unlike other authentication solutions for mobile devices, Good Vault leverages a Secure Element on a microSD or smart card, enabling strong authentication without compromising the mobile form factor or the user experience. Access to Good for Enterprise is secured through card-based authentication, and mobile email messages are encrypted and signed to ensure privacy and integrity. Good Vault requires four components:

  • A hardware-based Secure Element to store user credentials and keys; this comes in two options:
    • Smart card
    • MicroSD card
  • A slim Sleeve/Reader that slides onto the phone and stores the smart card or microSD card
    • The Good Vault smart card reader—provided by Precise Biometrics—which is a casing that adds smart card readers to the iPhone 4 or 4S. The reader is designed so that the iPhone maintains its sleek design adding only ½ inch (16 mm) in length, 0.16 inches (4mm) in width, and 0.22 inches (5.7 mm) in thickness, and weighs only 1.5oz (41g).
    • The microSD reader, supplied by HID  Global®, which is a slim casing for the iPhone 4 or 4S that contains a slot for inserting the microSD card, and;
  • HID Global's ActivID Credential Management System to issue and manage the microSD cards for either primary or derived credentials.
  • Server side software that is a Web-based Admin console for configuring Good Vault.

The above components work together to provide enterprises the benefits of two-factor authentication without adding cumbersome standalone readers - reducing solution complexity and overall costs, while streamlining deployment and adoption.  

Good Technology and HID Global have been working together to mobilize smart cards and the underlying secure element technology for use within mobile devices for over a year now. Good Vault is the first product to integrate the authentication tools needed to enable secure access to organizational systems using highly popular mobile devices, such as smartphones and tablets.

"Supporting a mobile and wireless workforce is becoming an increasingly critical, yet somewhat daunting task for many corporations and governments today due to the increasing number of mobile attacks and security breaches," said Jerome Becquart, vice president and general manager of Identity Assurance with HID Global, Good's strategic IAM development partner.  "Now, as a result of our partnership with Good, companies with highly mobile workforces can provide digital keys over-the-air and to employees' phones and use them to access all of their enterprise resources from anywhere in the world—just like they had previously been doing with their photo ID cards, keyfobs or tags—without compromising security."

Good Vault is immediately available for download in the iTunes App Store. End users must first be licensed for Good for Enterprise and Good Vault to activate the application. To learn more the Good Vault platform visit http://www1.good.com/products/good-vault.  Those attending the Gartner Identity and Access Management summit at Caesar's Palace in Las Vegas can also visit booth #S29 for a demo and additional product information.

About Good Technology

Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100™ leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government.  Learn more at www.good.com.

©2012 Good Technology Corporation and its related entities. All use subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks are the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.

iPhone  is a trademark of Apple Inc., registered in the U.S. and other countries.

[1] "Best Practices for Justifying Identity and Access Management Initiatives: Aligning IAM With CIO Priorities," by Ant Allan, Perry Carpenter and Earl Perkins, Gartner Research, March 2012.

[2]  S/MIME is a standard for public key encryption and signing of multipurpose Internet mail data.

SOURCE Good Technology

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...