Welcome!

News Feed Item

Good Technology Introduces Good Vault - The First Identity & Access Management Solution for Secure Email on iOS Devices

Good Vault™ extends strong two-factor authentication and Secure/Multipurpose Internet Mail Extensions (S/MIME) email signing and encryption to Good for Enterprise™ to enhance data protection

SUNNYVALE, Calif. and LAS VEGAS, Dec. 4, 2012 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today introduced Good Vault™, the first product built on the newly introduced Good Trust™ mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and S/MIME security to Good's award-winning Good for Enterprise™ email application. Leveraging Good Vault, highly regulated organizations in the government, healthcare and financial services industries can more effectively battle escalating mobile security threats while meeting compliance regulations.  The new solution was unveiled at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.

(Photo:  http://photos.prnewswire.com/prnh/20121204/AQ23446)

(Logo:  http://photos.prnewswire.com/prnh/20120125/AQ41496LOGO-b)

"Mobility has been the ultimate disruptive technology. The number of bring your own device (BYOD) programs is increasing within enterprises and application authentication is not immune from this influence," said Michael W. Mahan, senior vice president of special markets for Good Technology, who leads the Good Trust product line. "BYOD impacts the controls and management options available to the enterprise—underscoring the need for more flexible and extendable secure access solutions. At Good, we believe that mobile two-factor authentication is on track to become the dominant force in the IAM market and we intend to lead the pack in its adoption with our Good Trust platform and the Good Vault solution."

According to recent research by Gartner, IAM processes and technologies make significant contributions to the business strategies and technologies that are among CIOs' higher priorities.[1] Good Vault allows IT, Security, and Information Assurance leaders to:

  • Ensure integrity and security of corporate email and data
  • Prevent data loss using S/MIME[2] encryption with credentials stored in a Secure Element
  • Drive employee adoption with convenience and portability
  • Meet stringent compliance regulations and security standards
  • Better comply with HSPD-12, FIPS, FFIEC, PCI-DSS, HITEC, HIPAA and other regulatory standards
  • Leverage current IAM investments to increase ROI and extend mobility
  • Lower overall costs for mobile IAM

Unlike other authentication solutions for mobile devices, Good Vault leverages a Secure Element on a microSD or smart card, enabling strong authentication without compromising the mobile form factor or the user experience. Access to Good for Enterprise is secured through card-based authentication, and mobile email messages are encrypted and signed to ensure privacy and integrity. Good Vault requires four components:

  • A hardware-based Secure Element to store user credentials and keys; this comes in two options:
    • Smart card
    • MicroSD card
  • A slim Sleeve/Reader that slides onto the phone and stores the smart card or microSD card
    • The Good Vault smart card reader—provided by Precise Biometrics—which is a casing that adds smart card readers to the iPhone 4 or 4S. The reader is designed so that the iPhone maintains its sleek design adding only ½ inch (16 mm) in length, 0.16 inches (4mm) in width, and 0.22 inches (5.7 mm) in thickness, and weighs only 1.5oz (41g).
    • The microSD reader, supplied by HID  Global®, which is a slim casing for the iPhone 4 or 4S that contains a slot for inserting the microSD card, and;
  • HID Global's ActivID Credential Management System to issue and manage the microSD cards for either primary or derived credentials.
  • Server side software that is a Web-based Admin console for configuring Good Vault.

The above components work together to provide enterprises the benefits of two-factor authentication without adding cumbersome standalone readers - reducing solution complexity and overall costs, while streamlining deployment and adoption.  

Good Technology and HID Global have been working together to mobilize smart cards and the underlying secure element technology for use within mobile devices for over a year now. Good Vault is the first product to integrate the authentication tools needed to enable secure access to organizational systems using highly popular mobile devices, such as smartphones and tablets.

"Supporting a mobile and wireless workforce is becoming an increasingly critical, yet somewhat daunting task for many corporations and governments today due to the increasing number of mobile attacks and security breaches," said Jerome Becquart, vice president and general manager of Identity Assurance with HID Global, Good's strategic IAM development partner.  "Now, as a result of our partnership with Good, companies with highly mobile workforces can provide digital keys over-the-air and to employees' phones and use them to access all of their enterprise resources from anywhere in the world—just like they had previously been doing with their photo ID cards, keyfobs or tags—without compromising security."

Good Vault is immediately available for download in the iTunes App Store. End users must first be licensed for Good for Enterprise and Good Vault to activate the application. To learn more the Good Vault platform visit http://www1.good.com/products/good-vault.  Those attending the Gartner Identity and Access Management summit at Caesar's Palace in Las Vegas can also visit booth #S29 for a demo and additional product information.

About Good Technology

Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100™ leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government.  Learn more at www.good.com.

©2012 Good Technology Corporation and its related entities. All use subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks are the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.

iPhone  is a trademark of Apple Inc., registered in the U.S. and other countries.

[1] "Best Practices for Justifying Identity and Access Management Initiatives: Aligning IAM With CIO Priorities," by Ant Allan, Perry Carpenter and Earl Perkins, Gartner Research, March 2012.

[2]  S/MIME is a standard for public key encryption and signing of multipurpose Internet mail data.

SOURCE Good Technology

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"ZeroStack is a startup in Silicon Valley. We're solving a very interesting problem around bringing public cloud convenience with private cloud control for enterprises and mid-size companies," explained Kamesh Pemmaraju, VP of Product Management at ZeroStack, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"Codigm is based on the cloud and we are here to explore marketing opportunities in America. Our mission is to make an ecosystem of the SW environment that anyone can understand, learn, teach, and develop the SW on the cloud," explained Sung Tae Ryu, CEO of Codigm, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketing and Strategy at CA Technologies, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
"Infoblox does DNS, DHCP and IP address management for not only enterprise networks but cloud networks as well. Customers are looking for a single platform that can extend not only in their private enterprise environment but private cloud, public cloud, tracking all the IP space and everything that is going on in that environment," explained Steve Salo, Principal Systems Engineer at Infoblox, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventio...
Data scientists must access high-performance computing resources across a wide-area network. To achieve cloud-based HPC visualization, researchers must transfer datasets and visualization results efficiently. HPC clusters now compute GPU-accelerated visualization in the cloud cluster. To efficiently display results remotely, a high-performance, low-latency protocol transfers the display from the cluster to a remote desktop. Further, tools to easily mount remote datasets and efficiently transfer...
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...