Good Technology Good for Enterprise
July 02, 2012
Includes a one-time server access license of $1,500 plus a one-time client access license of $159 per device. Basic support costs $20/device/year plus $450/server/year. Advanced 24/7 support is $25/device/year plus $450/server/year.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Good for Enterprise is easy to use and chock full of features that provide an impressive array of capabilities which will ensure that data is protected.
- Weaknesses: A somewhat archaic interface may be a negative to those looking for flashy reporting tools and visual representations of what is happening in the enterprise.
- Verdict: Good for Enterprise remains the poster child for what a mobile device management product should offer.
Mobile device security vendor Good Technology, which Gartner Research placed in its Leaders Quadrant in its annual "MDM Magic Quadrant," enables consumers and enterprise users to say good riddance to the security problems surrounding today's multitude of mobile devices, a problem that only seems to be growing as more and more end-users bring iPhones, Andriod devices, iPads and countless other handhelds into the enterprise.
The company takes a multi-pronged approach to handling the security problem introduced by the typical mobile device. It has developed a browser-accessible management platform that integrates several must-have capabilities into a unified solution.
We were able to test the aptly named Good for Enterprise with several mobile devices, including an iPad, a Windows phone and an Android smartphone. The product works based on a browser console that offers a single-pain-of-glass view of Good's capabilities.
From the outset, we really liked the simplicity of the management console, which starts by offering a home screen with tabs to access devices, policies, reports and so forth. The easy-to-navigate console offers a view that quickly gives counts on the types of devices, the OS in use, and most importantly, a problem count, which, at a glance, gives one a good indication of any issues that need immediate attention.
However, if you like fancy graphs, alerts and a more visual approach to relaying information, you may find its mobile control console a bit of a throwback to pre-Web 2.0 times. The product uses a client/server approach - in that the mobile device acts like a client that accesses or creates data - while Good for Enterprise works as the server, controlling policies, access and roles.
That brings up an important point - how Good for Enterprise actually works. The product installs a small piece of client software on the mobile device, which gives management capabilities to the administrator. The client application can be pushed down to the device in a number of ways, dependent on the platform - where an iOS device would use Apple's app store for installation, a Windows 7.5 mobile device could download the app via an email. It all comes down to the device being used.
We were impressed with its level of control and management options, which can do most anything with a member mobile device. Those functions include the ability to encrypt data, validate applications, track device use, require extensive authentication, remotely lock or wipe the device and so on.
However, the best part about Good for Enterprise is how easy it makes all these functions, while still offering auditable controls that can meet compliance and data governance needs. It all comes down to being able to control mobile devices, who uses them and what data can be accessed by them. With that level of control, deployment of BYOD and mobile applications becomes a reality for the enterprise.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!