Good Technology Good for Enterprise
July 01, 2013
$1,500 server license, $159 per device.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Full mobile device management; centrally managed; clusterable for high availability/disaster recovery.
- Weaknesses: Multiple components can make for a complicated infrastructure; administrators will want to spend careful time with the product documentation or make use of support.
- Verdict: An excellent product for which it is easy to advocate.
Combining full mobile device management (MDM) with end-to-end encryption, Good for Enterprise from Good Technology offers an expansive suite of products, which allow administrators to embrace BYOD policies while remaining confident in their ability to maintain a data security posture.
The product infrastructure was provided to us pre-installed, so we can't speak to specifics of that setup process. To provide database services, it requires Windows Server 2003 or 2008, Active Directory, and either Microsoft SQL or Oracle. Virtualization is explicitly supported, and the company offers specific advice on those type of deployments in the documentation. On the mobile device side, the application is available on the App Store for iOS and Android devices, or as a download from Good Technology for older devices. Once a user account is added to the admin panel, admins can generate a PIN, which can be emailed to the end-user. The end-user then inputs their corporate email address and the PIN, and the device is automatically provisioned and policies applied.
The product is administered entirely via its web interface. Administrators are able to craft MDM policies that allow for full device control, including disabling/enabling the device camera and native device browser, pre-configuring Wi-Fi credentials, mandating device PINs, or black/whitelisting of other applications. Jailbreak/rooting detection is included, allowing devices to be automatically locked or wiped if jailbreaking is detected. Administrators can also force-install applications they view as required - in fact, the built in compliance manager allows administrators to set a list of applications that must be present on the device for the Good Mobile Messaging application to run. With the secure browser plugin, administrators can maintain lists of URLS that must be viewed via the secure browser, and those that should not be permitted to load. Those URLs can be blocked or redirected to the device's native browser if it is enabled. Devices can be remotely locked or wiped.
Documentation is voluminous. In addition to a quick installation guide, more in-depth manuals for installation, administration and day-to-day use are all available on the company website, along with a device-compatibility matrix, guides on using the product on different mobile device operating systems, and even custom guides on some specific devices. Each document is extremely thorough, with bookmarks, hyperlinks and screenshots where appropriate.
Two tiers of support, basic and advanced, are offered. Basic provides eight-hours-a-day/five-days-a-week phone and email assistance, while the Advanced tier expands that to 24/7. Web-based support, along with an online knowledge base, FAQ and user support forums, are also available.
Good for Enterprise offers a perpetual licensing model. Each server license is $1,500, and each device license is $159. Basic support can be purchased for $20 per device per year and $450 per server per year. The Advanced 24/7 option is priced at $25 per device per year, with the same server support cost as the basic plan.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- Three zero-days found in iOS, Apple suggests users update their iPhone
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!