Good Technology Good for Enterprise
July 02, 2012
Includes a one-time server access license of $1,500 plus a one-time client access license of $159 per device. Basic support costs $20/device/year plus $450/server/year. Advanced 24/7 support is $25/device/year plus $450/server/year.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Good for Enterprise is easy to use and chock full of features that provide an impressive array of capabilities which will ensure that data is protected.
- Weaknesses: A somewhat archaic interface may be a negative to those looking for flashy reporting tools and visual representations of what is happening in the enterprise.
- Verdict: Good for Enterprise remains the poster child for what a mobile device management product should offer.
Mobile device security vendor Good Technology, which Gartner Research placed in its Leaders Quadrant in its annual "MDM Magic Quadrant," enables consumers and enterprise users to say good riddance to the security problems surrounding today's multitude of mobile devices, a problem that only seems to be growing as more and more end-users bring iPhones, Andriod devices, iPads and countless other handhelds into the enterprise.
The company takes a multi-pronged approach to handling the security problem introduced by the typical mobile device. It has developed a browser-accessible management platform that integrates several must-have capabilities into a unified solution.
We were able to test the aptly named Good for Enterprise with several mobile devices, including an iPad, a Windows phone and an Android smartphone. The product works based on a browser console that offers a single-pain-of-glass view of Good's capabilities.
From the outset, we really liked the simplicity of the management console, which starts by offering a home screen with tabs to access devices, policies, reports and so forth. The easy-to-navigate console offers a view that quickly gives counts on the types of devices, the OS in use, and most importantly, a problem count, which, at a glance, gives one a good indication of any issues that need immediate attention.
However, if you like fancy graphs, alerts and a more visual approach to relaying information, you may find its mobile control console a bit of a throwback to pre-Web 2.0 times. The product uses a client/server approach - in that the mobile device acts like a client that accesses or creates data - while Good for Enterprise works as the server, controlling policies, access and roles.
That brings up an important point - how Good for Enterprise actually works. The product installs a small piece of client software on the mobile device, which gives management capabilities to the administrator. The client application can be pushed down to the device in a number of ways, dependent on the platform - where an iOS device would use Apple's app store for installation, a Windows 7.5 mobile device could download the app via an email. It all comes down to the device being used.
We were impressed with its level of control and management options, which can do most anything with a member mobile device. Those functions include the ability to encrypt data, validate applications, track device use, require extensive authentication, remotely lock or wipe the device and so on.
However, the best part about Good for Enterprise is how easy it makes all these functions, while still offering auditable controls that can meet compliance and data governance needs. It all comes down to being able to control mobile devices, who uses them and what data can be accessed by them. With that level of control, deployment of BYOD and mobile applications becomes a reality for the enterprise.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Government 'Cybersecurity Sprint' spurs agency authentication measures
- Report: News, entertainment websites serve majority of malvertisements
- UConn School of Engineering cyberintrusion originated in China
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries