Good Technology Good for Enterprise
July 01, 2013
$1,500 server license, $159 per device.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Full mobile device management; centrally managed; clusterable for high availability/disaster recovery.
- Weaknesses: Multiple components can make for a complicated infrastructure; administrators will want to spend careful time with the product documentation or make use of support.
- Verdict: An excellent product for which it is easy to advocate.
Combining full mobile device management (MDM) with end-to-end encryption, Good for Enterprise from Good Technology offers an expansive suite of products, which allow administrators to embrace BYOD policies while remaining confident in their ability to maintain a data security posture.
The product infrastructure was provided to us pre-installed, so we can't speak to specifics of that setup process. To provide database services, it requires Windows Server 2003 or 2008, Active Directory, and either Microsoft SQL or Oracle. Virtualization is explicitly supported, and the company offers specific advice on those type of deployments in the documentation. On the mobile device side, the application is available on the App Store for iOS and Android devices, or as a download from Good Technology for older devices. Once a user account is added to the admin panel, admins can generate a PIN, which can be emailed to the end-user. The end-user then inputs their corporate email address and the PIN, and the device is automatically provisioned and policies applied.
The product is administered entirely via its web interface. Administrators are able to craft MDM policies that allow for full device control, including disabling/enabling the device camera and native device browser, pre-configuring Wi-Fi credentials, mandating device PINs, or black/whitelisting of other applications. Jailbreak/rooting detection is included, allowing devices to be automatically locked or wiped if jailbreaking is detected. Administrators can also force-install applications they view as required - in fact, the built in compliance manager allows administrators to set a list of applications that must be present on the device for the Good Mobile Messaging application to run. With the secure browser plugin, administrators can maintain lists of URLS that must be viewed via the secure browser, and those that should not be permitted to load. Those URLs can be blocked or redirected to the device's native browser if it is enabled. Devices can be remotely locked or wiped.
Documentation is voluminous. In addition to a quick installation guide, more in-depth manuals for installation, administration and day-to-day use are all available on the company website, along with a device-compatibility matrix, guides on using the product on different mobile device operating systems, and even custom guides on some specific devices. Each document is extremely thorough, with bookmarks, hyperlinks and screenshots where appropriate.
Two tiers of support, basic and advanced, are offered. Basic provides eight-hours-a-day/five-days-a-week phone and email assistance, while the Advanced tier expands that to 24/7. Web-based support, along with an online knowledge base, FAQ and user support forums, are also available.
Good for Enterprise offers a perpetual licensing model. Each server license is $1,500, and each device license is $159. Basic support can be purchased for $20 per device per year and $450 per server per year. The Advanced 24/7 option is priced at $25 per device per year, with the same server support cost as the basic plan.
Sign up to our newsletters
SC Magazine Articles
- Malware on Lime Crime website, payment cards compromised
- Florida law enforcement docs show widespread stingray use, secrecy
- After Superfish-Lenovo incident, Facebook probes larger issue of SSL-sniffing adware
- Gemalto investigates claims that gov't spies hacked SIM card encryption keys
- Disconnect yawns between CISOs, exec leadership, study says
- Carbanak APT campaign made off with $1B from banks globally
- BMW issues security patch for bug allowing attackers physical access into vehicles
- NIST requests final comments on ICS security guide
- New attack uses ransomware to drop trojans and keyloggers
- Microsoft phishing emails target corporate users, deliver malware that evades sandboxes
- State breakdowns: Anthem breach by the numbers
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- Study: SMBs lack thorough understanding of state data breach notification laws
- Bug in popular WordPress plugin opens up websites to SQL injection attacks