Click here to close now.

Welcome!

Microservices Expo Authors: John Wetherill, Liz McMillan, Elizabeth White, Rex Morrow, Datical, Michael Kanasoot

News Feed Item

Good Technology Introduces Good Vault - The First Identity & Access Management Solution for Secure Email on iOS Devices

Good Vault™ extends strong two-factor authentication and Secure/Multipurpose Internet Mail Extensions (S/MIME) email signing and encryption to Good for Enterprise™ to enhance data protection

SUNNYVALE, Calif. and LAS VEGAS, Dec. 4, 2012 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today introduced Good Vault™, the first product built on the newly introduced Good Trust™ mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and S/MIME security to Good's award-winning Good for Enterprise™ email application. Leveraging Good Vault, highly regulated organizations in the government, healthcare and financial services industries can more effectively battle escalating mobile security threats while meeting compliance regulations.  The new solution was unveiled at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.

(Photo:  http://photos.prnewswire.com/prnh/20121204/AQ23446)

(Logo:  http://photos.prnewswire.com/prnh/20120125/AQ41496LOGO-b)

"Mobility has been the ultimate disruptive technology. The number of bring your own device (BYOD) programs is increasing within enterprises and application authentication is not immune from this influence," said Michael W. Mahan, senior vice president of special markets for Good Technology, who leads the Good Trust product line. "BYOD impacts the controls and management options available to the enterprise—underscoring the need for more flexible and extendable secure access solutions. At Good, we believe that mobile two-factor authentication is on track to become the dominant force in the IAM market and we intend to lead the pack in its adoption with our Good Trust platform and the Good Vault solution."

According to recent research by Gartner, IAM processes and technologies make significant contributions to the business strategies and technologies that are among CIOs' higher priorities.[1] Good Vault allows IT, Security, and Information Assurance leaders to:

  • Ensure integrity and security of corporate email and data
  • Prevent data loss using S/MIME[2] encryption with credentials stored in a Secure Element
  • Drive employee adoption with convenience and portability
  • Meet stringent compliance regulations and security standards
  • Better comply with HSPD-12, FIPS, FFIEC, PCI-DSS, HITEC, HIPAA and other regulatory standards
  • Leverage current IAM investments to increase ROI and extend mobility
  • Lower overall costs for mobile IAM

Unlike other authentication solutions for mobile devices, Good Vault leverages a Secure Element on a microSD or smart card, enabling strong authentication without compromising the mobile form factor or the user experience. Access to Good for Enterprise is secured through card-based authentication, and mobile email messages are encrypted and signed to ensure privacy and integrity. Good Vault requires four components:

  • A hardware-based Secure Element to store user credentials and keys; this comes in two options:
    • Smart card
    • MicroSD card
  • A slim Sleeve/Reader that slides onto the phone and stores the smart card or microSD card
    • The Good Vault smart card reader—provided by Precise Biometrics—which is a casing that adds smart card readers to the iPhone 4 or 4S. The reader is designed so that the iPhone maintains its sleek design adding only ½ inch (16 mm) in length, 0.16 inches (4mm) in width, and 0.22 inches (5.7 mm) in thickness, and weighs only 1.5oz (41g).
    • The microSD reader, supplied by HID  Global®, which is a slim casing for the iPhone 4 or 4S that contains a slot for inserting the microSD card, and;
  • HID Global's ActivID Credential Management System to issue and manage the microSD cards for either primary or derived credentials.
  • Server side software that is a Web-based Admin console for configuring Good Vault.

The above components work together to provide enterprises the benefits of two-factor authentication without adding cumbersome standalone readers - reducing solution complexity and overall costs, while streamlining deployment and adoption.  

Good Technology and HID Global have been working together to mobilize smart cards and the underlying secure element technology for use within mobile devices for over a year now. Good Vault is the first product to integrate the authentication tools needed to enable secure access to organizational systems using highly popular mobile devices, such as smartphones and tablets.

"Supporting a mobile and wireless workforce is becoming an increasingly critical, yet somewhat daunting task for many corporations and governments today due to the increasing number of mobile attacks and security breaches," said Jerome Becquart, vice president and general manager of Identity Assurance with HID Global, Good's strategic IAM development partner.  "Now, as a result of our partnership with Good, companies with highly mobile workforces can provide digital keys over-the-air and to employees' phones and use them to access all of their enterprise resources from anywhere in the world—just like they had previously been doing with their photo ID cards, keyfobs or tags—without compromising security."

Good Vault is immediately available for download in the iTunes App Store. End users must first be licensed for Good for Enterprise and Good Vault to activate the application. To learn more the Good Vault platform visit http://www1.good.com/products/good-vault.  Those attending the Gartner Identity and Access Management summit at Caesar's Palace in Las Vegas can also visit booth #S29 for a demo and additional product information.

About Good Technology

Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100™ leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government.  Learn more at www.good.com.

©2012 Good Technology Corporation and its related entities. All use subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks are the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.

iPhone  is a trademark of Apple Inc., registered in the U.S. and other countries.

[1] "Best Practices for Justifying Identity and Access Management Initiatives: Aligning IAM With CIO Priorities," by Ant Allan, Perry Carpenter and Earl Perkins, Gartner Research, March 2012.

[2]  S/MIME is a standard for public key encryption and signing of multipurpose Internet mail data.

SOURCE Good Technology

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@MicroservicesExpo Stories
In the first four parts of this series I presented an introduction to microservices along with a handful of emerging microservices patterns, and a discussion of some of the downsides and challenges to using microservices. The most recent installment of this series looked at ten ways that PaaS facilitates microservices development and adoption. In this post I’ll cover some words of wisdom, advice intended for individuals, teams, and organizations considering a move to microservices. I've gleaned...
Virtualization is everywhere. Enormous and highly profitable companies have been built on nothing but virtualization. And nowhere has virtualization made more of an impact than in Cloud Computing, the rampant and unprecedented adoption of which has been the direct result of the wide availability of virtualization software and techniques that enabled it. But does the cloud actually require virtualization?
Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c...
I read an insightful article this morning from Bernard Golden on DZone discussing the DevOps conundrum facing many enterprises today – is it better to build your own DevOps tools or go commercial? For Golden, the question arose from his observations at a number of DevOps Days events he has attended, where typically the audience is composed of startup professionals: “I have to say, though, that a typical feature of most presentations is a recitation of the various open source products and compo...
Hardware will never be more valuable than on the day it hits your loading dock. Each day new servers are not deployed to production the business is losing money. While Moore's Law is typically cited to explain the exponential density growth of chips, a critical consequence of this is rapid depreciation of servers. The hardware for clustered systems (e.g., Hadoop, OpenStack) tends to be significant capital expenses. In his session at Big Data Expo, Mason Katz, CTO and co-founder of StackIQ, disc...
Many people recognize DevOps as an enormous benefit – faster application deployment, automated toolchains, support of more granular updates, better cooperation across groups. However, less appreciated is the journey enterprise IT groups need to make to achieve this outcome. The plain fact is that established IT processes reflect a very different set of goals: stability, infrequent change, hands-on administration, and alignment with ITIL. So how does an enterprise IT organization implement change...
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Containers Expo Blog covers the world of containers, as this lightweight alternative to virtual machines enables developers to work with identical dev environments and stacks. Containers Expo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Bookmark Containers Expo Blog ▸ Here Follow new article posts on Twitter at @ContainersExpo
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
Do you think development teams really update those BMC Remedy tickets with all the changes contained in a release? They don't. Most of them just "check the box" and move on. They rose a Risk Level that won't raise questions from the Change Control managers and they work around the checks and balances. The alternative is to stop and wait for a department that still thinks releases are rare events. When a release happens every day there's just not enough time for people to attend CAB meeting...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
Node.js and io.js are increasingly being used to run JavaScript on the server side for many types of applications, such as websites, real-time messaging and controllers for small devices with limited resources. For DevOps it is crucial to monitor the whole application stack and Node.js is rapidly becoming an important part of the stack in many organizations. Sematext has historically had a strong support for monitoring big data applications such as Elastic (aka Elasticsearch), Cassandra, Solr, S...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...
In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, IoT_Microservices Power PanelEvangelist for F5 Networks; and Troy Topnik, ActiveState’s Technical Product Manager; will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of ...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
This is the final installment of the six-part series Microservices and PaaS. It seems like forever since I attended Adrian Cockroft's meetup focusing on microservices. It's actually only been a couple of months, but much has happened since then: countless articles, meetups, and conference sessions focusing on microservices have been delivered, many meetings and design efforts at companies moving towards a microservices-based approach have been endured, and five installments of this blog series ...