Good for Enterprise Good Dynamics



Similar documents
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Secure, Centralized, Simple

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Technical Whitepaper. Secure Docs

Systems Manager Cloud Based Mobile Device Management

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Systems Manager Cloud-Based Enterprise Mobility Management

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

Introduction to the Mobile Access Gateway

Mobile First Government

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Deploying iphone and ipad Mobile Device Management

Total Enterprise Mobility

ForeScout MDM Enterprise

CHOOSING AN MDM PLATFORM

The ForeScout Difference

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Kony Mobile Application Management (MAM)

BYOD Guidance: BlackBerry Secure Work Space

McAfee Enterprise Mobility Management

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

What We Do: Simplify Enterprise Mobility

Choosing an MDM Platform

Vodafone Secure Device Manager Administration User Guide

Mobile Application Security

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Feature List for Kaspersky Security for Mobile

Mobile Device Management for CFAES

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Secure Mobile Applications. A Technical White Paper

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Advanced Configuration Steps

AVG Business SSO Partner Getting Started Guide

Symantec Mobile Management Suite

Mobile Admin Security

Dell World Software User Forum 2013

Securing Office 365 with MobileIron

Cloud Services MDM. ios User Guide

RFI Template for Enterprise MDM Solutions

AirWatch Solution Overview

Sophos Mobile Control Technical guide

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

PMDP is simple to set up, start using, and maintain

1 Mobile Device Management

ios Enterprise Deployment Overview

Sophos Mobile Control Technical Guide. Product version: 3

Kaspersky Security for Mobile

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Mobile Device Management and Security Glossary

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

Deploying iphone and ipad Security Overview

Mobile Iron User Guide

Sophos Mobile Control Administrator guide. Product version: 3.6

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

MaaS360 Mobile Enterprise Gateway

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Mobile Device Management Solution Hexnode MDM

Sophos Mobile Control Administrator guide. Product version: 3

Kaspersky Lab Mobile Device Management Deployment Guide

How To Manage A Mobile Device Management (Mdm) Solution

Managing and Securing the Mobile Device Invasion IBM Corporation

ManageEngine Desktop Central. Mobile Device Management User Guide

Mobile Device Management ios Policies

MaaS360 Mobile Enterprise Gateway

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

End User Devices Security Guidance: Apple ios 8

Windows Phone 8.1 in the Enterprise

How To Protect Your Mobile Device From Attack

Copyright 2013, 3CX Ltd.

When enterprise mobility strategies are discussed, security is usually one of the first topics

BYOD Guidance: Good Technology

MDM Mobile Device Management

Apple Configurator MDM Site - Review

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Thanks for joining We ll start at 10am

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

How To Write A Mobile Device Policy

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Ensuring the security of your mobile business intelligence

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Mobile Device Management Version 8. Last updated:

Mobile Device Strategy

Addressing NIST and DOD Requirements for Mobile Device Management

GETS AIRWATCH MDM HANDBOOK

Server Software Installation Guide

ANY TIME ANY PLACE ANY WHERE. JOEL SWEENEY and SHAUN BENNETTS XPERTEX

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Transcription:

Good for Enterprise Good Dynamics

What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2

Good is far more than just MDM Good delivers greater value and productivity through application data security Device Mgmt. Integrated Secure Email, PIM Secure Intranet Apps & Portals Integrated Document Mgmt. Secure Mobile Business Applications Low Business Value Medium Business Value High Business Value Device security Good for Enterprise Application data security Secure, trusted encrypted transport layer and NOC Good Dynamics 2012 Good Technology, Inc. All Rights Reserved. 3

Good s Platform Good for Enterprise / Good for Government Mobile Security Suite Device Management Secure Email/PIM/Calendar Secure Browser Secure Documents Application Management Good Dynamics Enterprise Apps 3 rd Party Apps Good s Mobile Data Security Platform 2012 Good Technology, Inc. All Rights Reserved. 4

End-to-end comprehensive security Intranets Web-enabled Apps Enterprise Applications Good Servers Firewall Network Operations Center Wireless Network Devices with Good Internal Security Perimeter Security Transport Security Handheld Security Control traffic by: Access list Domain name Detect jailbroken/ rooted malware infected devices Outbound connection No firewall holes No VPN Role-based admin Policy groups Guaranteed delivery AES encryption FIPS 140-2 certificate Authorized device check Encrypted enterprise data Application password enforcement Data loss prevention policies Remote erase 2012 Good Technology, Inc. All Rights Reserved. 5

Provisioning a mobile device/user " IT provision or self-provision fully OTA " Fully integrated with Active Directory/LDAP " Users receive activation email " Download client app from app stores (Apple, Google, Amazon) " Run app and enter in credentials received in email " Synchronization begins immediately 2012 Good Technology, Inc. All Rights Reserved. 6

Self-Provisioning Portal 2012 Good Technology, Inc. All Rights Reserved. 7

Self-Provisioning Portal 2012 Good Technology, Inc. All Rights Reserved. 8

IT Provisioning Quickly add single users or bulk import users from file using first and last name 2012 Good Technology, Inc. All Rights Reserved. 9

On device setup 2012 Good Technology, Inc. All Rights Reserved. 10

Application Management and/or Deployment " Implement application level security in real-time to prevent data loss Secure Container " Separate personal from business " Apply policies consistently across multiple mobile platforms even when underlying platform doesn t provide security controls 2012 Good Technology, Inc. All Rights Reserved. 11

Enterprise App Store - Custom Software Distribution " Deploy Apps On: " Apple ios " Android " Windows Phone " Windows Mobile " Symbian " Palm OS " Integration with other App Stores " Recommended Apps 2012 Good Technology, Inc. All Rights Reserved. 12

Application Management and/or Deployment " Application Blacklist " Compliance based required apps " Third party apps recommended " Deploy in-house/ custom apps 2012 Good Technology, Inc. All Rights Reserved. 13

Good Dynamics - Services Secure Storage Encrypted file system (including file and directory names) Encrypted SQL storage Enterprise Secure Connectivity Transparent access to Enterprise App Servers TCP socket level connection Web services calls/rest calls Container Management & Policies Provisioning, de-provisioning, lock, wipe Compromised device detection, password policy Push Services Push data Service: any type of message, token-based Also used internally to push Policies to the client 2012 Good Technology, Inc. All Rights Reserved. 14

Enterprise Data/Document Storage " Fully encrypted document repository within the Good for Enterprise app " Allows files to be opened or edited in IT approved apps " Secure apps powered by Good Dynamics 2012 Good Technology, Inc. All Rights Reserved. 15

Commercial apps powered by Good Dynamics " Good Dynamics is a security SDK that allows app developer to take advantage of Good s security platform " GD powered apps can securely communicate with each other and Good for Enterprise " Apps are now fully managed by IT, features by policy, remote wipe of app and data 2012 Good Technology, Inc. All Rights Reserved. 16

End-to-end workflow with no data exposure! 2 Open, view, edit document in Quickoffice for Good 1 Receive work email with attachment via GFE 3a Send to GFE 3c Sync to Box 3b Save to GFE file repository 2012 Good Technology, Inc. All Rights Reserved. 17

Removal of data/wiping devices " Good for Enterprise is focused on protecting customer sensitive data not necessarily managing the device " App level wipe allows IT to have confidence when removing sensitive data and does not impact personal data or apps " Encrypted container to protect and separate corporate email/pim and other sensitive data from personal data " Rather than restrict, Good enables the personal use of icloud, itunes, social media and document sharing apps " Device level wipe is available through MDM features if desired 2012 Good Technology, Inc. All Rights Reserved. 18

Help Desk Console/Issues Management " Helpdesk staff is notified by end-user of difficulty or notified by Good Mobile Control reports of issues " Issues that are common " Users lose pin and require IT to resend " Users want to provision a new device " Users email is not being sent to device " View device s connectivity status (4 hours 24 hours) " View Exchange/Domino configuration states and run mailbox diagnostics " Work with Good support and can easily send logs directly 2012 Good Technology, Inc. All Rights Reserved. 19

Reporting/Auditing " Most enterprise organizations utilize the Good API s to access data directly and integrate with other consoles " Built-in reporting and live (filtered) views " Devices by Policy Sets " Devices by Server (Exchange/Domino server) " Devices by Compliance (in or out) " Devices with Roaming (enabled or disabled) " Devices by Platform " Devices by Carrier " Devices by Department " Exports of data (CSV) " Software installed, connection statistics, paused devices and compliance 2012 Good Technology, Inc. All Rights Reserved. 20

Device Deprovisioning Process " IT or end user can remove/delete a device from the Good Mobile Control console " Within seconds the user will be logged out of Good for Enterprise or any other app controlled app " User sees a message stating that they no longer have access to this data " Data is immediately wiped " User can then remove app from device 2012 Good Technology, Inc. All Rights Reserved. 21

Mobile Device Policy Enforcement and Compliance " Full Compliance Manager built-in to Good Mobile Control " Rule based mechanism " Checks to run " Client version verification keep GFE clients updated " Connectivity verification device connected at least once in period " Hardware model verification officially certified devices " Jailbreak/Rooted detection " OS version verification " Failure actions " Quit Good for Enterprise " Force application download " Wipe enterprise data " Send report only " Check Every 2012 Good Technology, Inc. All Rights Reserved. 22

Mobile Device Policy Enforcement and Compliance " Compliance checks are run when Good for Enterprise or Good powered app is accessed " No separate useless compliance app " No use of location/gps required saves battery!!! " No requirement of cell radio or Wi-Fi works when in airplane mode " Compliance rule values are updated by Good " New device, OS version, or jailbreak/rooted detection mechanisms " Example: ios 5.1 showed up as soon as Apple released the IPSW on March 7 th 2012 Good Technology, Inc. All Rights Reserved. 23

Not high priority for our customers " Device Remote Control " Utilize GPS location or keep track of GPS logs " Download phone call or SMS usage 2012 Good Technology, Inc. All Rights Reserved. 24

Anti-Virus/Malware Protection " Good does not provide device Anti-Virus/Malware " Good keeps sensitive data safe from malware " Encrypted container goes above and beyond the default security (if available) if device security compromised data is still secure " App to app security provides protection for data leaking malware or even poorly designed apps " Example: IT decides what fields are sent to device s contact list from corporate list name and number for caller-id to work " Secure behind-the-firewall architecture does not require VPN limits exposure to network if device is infected 2012 Good Technology, Inc. All Rights Reserved. 25

Integrated Email Delivery Agent " Good for Enterprise includes email/pim functionality " Has features that do not exist in native apps and is getting better! " Out of office " Free/busy scheduling " Integrated conference call dialing " Integrated meeting location mapping " Usability enhancements coming soon " MUCH faster email synchronization upon launch " Notification enhancements controlled by IT " Further integration with default apps send a photo to Good " Corporate instant messaging, tasks and notes " Proxy support for Secure Browser " Same user experience across platforms " Less training, fewer variations to support, lighter helpdesk load 2012 Good Technology, Inc. All Rights Reserved. 26

Regulatory Compliance/Security Testing " HIPAA " PCI " SOX " FIPS-140-2 certified compliant cryptography " Currently undergoing Common Criteria EAL 4 testing " Tested by DISA developed STIG for implementing " US Army granted Good Certificate of Networthiness and Authority to Operate " US Air Force Good is the only approved alternative to Blackberry " US Air Force Communications Agency listed on the itrm Approved Products List " Department of Homeland Security Technical Reference Model Approved Products List 2012 Good Technology, Inc. All Rights Reserved. 27

Good Provides More Value Than MDM: Security " Not limited by MDM controls at a device-level " Device password may require complex password " Selective wipe can only remove email or apps pushed full device wipe " Relies on default device/os security easily circumvented " Restricts/disables native features that could leak sensitive data (icloud/ itunes/box/dropbox etc.) " Provides security enhancements at both the device and app level " Encrypted container to protect and separate corporate email/pim and other sensitive data from personal data " App level password does not impact personal use of device " App level wipe allows IT to have confidence when removing sensitive data and does not impact personal data or apps " Rather than restrict, Good enables the personal use of icloud, itunes, social media and document sharing apps 2012 Good Technology, Inc. All Rights Reserved. 28

Good Provides More Value Than MDM " Higher Mobile Productivity " Fully protected end-to-end business workflow " Receive email attachment -> Open/Edit document in Quickoffice for Good -> Save in secure repository -> email reply/fwd new version " Lower Overall TCO " Provides a single, cross-platform user experience lower training/helpdesk or mobile device app costs " Allows for organization to disable EAS lowers risk and IT management costs " Secure Browser removes additional cost of VPN and IT management costs " Good Dynamics internal and commercial apps: more secure 2012 Good Technology, Inc. All Rights Reserved. 29

Questions? 2012 Good Technology, Inc. All Rights Reserved. 30

What s next? " Contact us: " http://www.good.com " Videos Beyond MDM " BYOD Whitepapers " Download your own 30-day free trial " LOW TOUCH!! EASY! 2012 Good Technology, Inc. All Rights Reserved. 31

Thank you! 2012 Good Technology, Inc. All Rights Reserved. 32