Welcome!

Microservices Expo Authors: Pat Romanski, Elizabeth White, Kevin Jackson, Yeshim Deniz, Jason Bloomberg

News Feed Item

Good Technology Introduces Good Vault - The First Identity & Access Management Solution for Secure Email on iOS Devices

Good Vault™ extends strong two-factor authentication and Secure/Multipurpose Internet Mail Extensions (S/MIME) email signing and encryption to Good for Enterprise™ to enhance data protection

SUNNYVALE, Calif. and LAS VEGAS, Dec. 4, 2012 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today introduced Good Vault™, the first product built on the newly introduced Good Trust™ mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and S/MIME security to Good's award-winning Good for Enterprise™ email application. Leveraging Good Vault, highly regulated organizations in the government, healthcare and financial services industries can more effectively battle escalating mobile security threats while meeting compliance regulations.  The new solution was unveiled at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.

(Photo:  http://photos.prnewswire.com/prnh/20121204/AQ23446)

(Logo:  http://photos.prnewswire.com/prnh/20120125/AQ41496LOGO-b)

"Mobility has been the ultimate disruptive technology. The number of bring your own device (BYOD) programs is increasing within enterprises and application authentication is not immune from this influence," said Michael W. Mahan, senior vice president of special markets for Good Technology, who leads the Good Trust product line. "BYOD impacts the controls and management options available to the enterprise—underscoring the need for more flexible and extendable secure access solutions. At Good, we believe that mobile two-factor authentication is on track to become the dominant force in the IAM market and we intend to lead the pack in its adoption with our Good Trust platform and the Good Vault solution."

According to recent research by Gartner, IAM processes and technologies make significant contributions to the business strategies and technologies that are among CIOs' higher priorities.[1] Good Vault allows IT, Security, and Information Assurance leaders to:

  • Ensure integrity and security of corporate email and data
  • Prevent data loss using S/MIME[2] encryption with credentials stored in a Secure Element
  • Drive employee adoption with convenience and portability
  • Meet stringent compliance regulations and security standards
  • Better comply with HSPD-12, FIPS, FFIEC, PCI-DSS, HITEC, HIPAA and other regulatory standards
  • Leverage current IAM investments to increase ROI and extend mobility
  • Lower overall costs for mobile IAM

Unlike other authentication solutions for mobile devices, Good Vault leverages a Secure Element on a microSD or smart card, enabling strong authentication without compromising the mobile form factor or the user experience. Access to Good for Enterprise is secured through card-based authentication, and mobile email messages are encrypted and signed to ensure privacy and integrity. Good Vault requires four components:

  • A hardware-based Secure Element to store user credentials and keys; this comes in two options:
    • Smart card
    • MicroSD card
  • A slim Sleeve/Reader that slides onto the phone and stores the smart card or microSD card
    • The Good Vault smart card reader—provided by Precise Biometrics—which is a casing that adds smart card readers to the iPhone 4 or 4S. The reader is designed so that the iPhone maintains its sleek design adding only ½ inch (16 mm) in length, 0.16 inches (4mm) in width, and 0.22 inches (5.7 mm) in thickness, and weighs only 1.5oz (41g).
    • The microSD reader, supplied by HID  Global®, which is a slim casing for the iPhone 4 or 4S that contains a slot for inserting the microSD card, and;
  • HID Global's ActivID Credential Management System to issue and manage the microSD cards for either primary or derived credentials.
  • Server side software that is a Web-based Admin console for configuring Good Vault.

The above components work together to provide enterprises the benefits of two-factor authentication without adding cumbersome standalone readers - reducing solution complexity and overall costs, while streamlining deployment and adoption.  

Good Technology and HID Global have been working together to mobilize smart cards and the underlying secure element technology for use within mobile devices for over a year now. Good Vault is the first product to integrate the authentication tools needed to enable secure access to organizational systems using highly popular mobile devices, such as smartphones and tablets.

"Supporting a mobile and wireless workforce is becoming an increasingly critical, yet somewhat daunting task for many corporations and governments today due to the increasing number of mobile attacks and security breaches," said Jerome Becquart, vice president and general manager of Identity Assurance with HID Global, Good's strategic IAM development partner.  "Now, as a result of our partnership with Good, companies with highly mobile workforces can provide digital keys over-the-air and to employees' phones and use them to access all of their enterprise resources from anywhere in the world—just like they had previously been doing with their photo ID cards, keyfobs or tags—without compromising security."

Good Vault is immediately available for download in the iTunes App Store. End users must first be licensed for Good for Enterprise and Good Vault to activate the application. To learn more the Good Vault platform visit http://www1.good.com/products/good-vault.  Those attending the Gartner Identity and Access Management summit at Caesar's Palace in Las Vegas can also visit booth #S29 for a demo and additional product information.

About Good Technology

Good Technology, the leader in secure enterprise mobility solutions, creates a world where employees can securely connect, communicate, and collaborate using their personal iOS, Android, and Windows Phone devices. A world where IT can manage mobile apps, devices and enterprise data simply and safely to increase overall business productivity. A world where business information can travel wherever it needs to go, without putting sensitive enterprise or personal data at risk. Good Technology's customers include more than 4,000 organizations worldwide, including FORTUNE 100™ leaders in financial services, healthcare, retail, telecommunications, manufacturing, legal, and government.  Learn more at www.good.com.

©2012 Good Technology Corporation and its related entities. All use subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks are the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.

iPhone  is a trademark of Apple Inc., registered in the U.S. and other countries.

[1] "Best Practices for Justifying Identity and Access Management Initiatives: Aligning IAM With CIO Priorities," by Ant Allan, Perry Carpenter and Earl Perkins, Gartner Research, March 2012.

[2]  S/MIME is a standard for public key encryption and signing of multipurpose Internet mail data.

SOURCE Good Technology

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@MicroservicesExpo Stories
"Tintri focuses on the Ops side of the DevOps, which basically is pushing more and more of the accessibility of the infrastructure to the developers and trying to get behind the scenes," explained Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
The reality of data ubiquity is here—data is buried in operational statistics, machine logs, stacks of overflowing tickets and customer details, among other things. How can any user get valuable information amid this rapid influx of data? Imagine a situation where your firm’s revenue takes a hit owing to an unexpected failure in some business process. It would be a nightmare for IT admins to sift through the interminable piles of data to deduce exactly why and where the problem occurred. To sav...
What's the role of an IT self-service portal when you get to continuous delivery and Infrastructure as Code? This general session showed how to create the continuous delivery culture and eight accelerators for leading the change. Don Demcsak is a DevOps and Cloud Native Modernization Principal for Dell EMC based out of New Jersey. He is a former, long time, Microsoft Most Valuable Professional, specializing in building and architecting Application Delivery Pipelines for hybrid legacy, and cloud ...
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Me...
"We are a monitoring company. We work with Salesforce, BBC, and quite a few other big logos. We basically provide monitoring for them, structure for their cloud services and we fit into the DevOps world" explained David Gildeh, Co-founder and CEO of Outlyer, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo Silicon Valley which will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is at the intersection of technology and business-optimizing tools, organizations and processes to bring measurable improvements in productivity and profitability," said Aruna Ravichandran, vice president, DevOps product and solutions marketing...
There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to a shared drive. Cloud computing as a mission transformation activity, not a technological one. As an organization moves from local information hosting to the cloud, one of the most important challenges is addressi...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business - from apparel to energy - is being rewritten by software. From planning to development to management to security, CA creates software that fuels transformation for companies in the applic...
In the decade following his article, cloud computing further cemented Carr’s perspective. Compute, storage, and network resources have become simple utilities, available at the proverbial turn of the faucet. The value they provide is immense, but the cloud playing field is amazingly level. Carr’s quote above presaged the cloud to a T. Today, however, we’re in the digital era. Mark Andreesen’s ‘software is eating the world’ prognostication is coming to pass, as enterprises realize they must be...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
Hybrid IT is today’s reality, and while its implementation may seem daunting at times, more and more organizations are migrating to the cloud. In fact, according to SolarWinds 2017 IT Trends Index: Portrait of a Hybrid IT Organization 95 percent of organizations have migrated crucial applications to the cloud in the past year. As such, it’s in every IT professional’s best interest to know what to expect.
A common misconception about the cloud is that one size fits all. Companies expecting to run all of their operations using one cloud solution or service must realize that doing so is akin to forcing the totality of their business functionality into a straightjacket. Unlocking the full potential of the cloud means embracing the multi-cloud future where businesses use their own cloud, and/or clouds from different vendors, to support separate functions or product groups. There is no single cloud so...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
Companies have always been concerned that traditional enterprise software is slow and complex to install, often disrupting critical and time-sensitive operations during roll-out. With the growing need to integrate new digital technologies into the enterprise to transform business processes, this concern has become even more pressing. A 2016 Panorama Consulting Solutions study revealed that enterprise resource planning (ERP) projects took an average of 21 months to install, with 57 percent of th...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Colocation is a central pillar of modern enterprise infrastructure planning because it provides greater control, insight, and performance than managed platforms. In spite of the inexorable rise of the cloud, most businesses with extensive IT hardware requirements choose to host their infrastructure in colocation data centers. According to a recent IDC survey, more than half of the businesses questioned use colocation services, and the number is even higher among established businesses and busine...