Beyond PSN Compliance
 Good Technology
 Milton Stephenson (Azlan SDG)
January 2014
Agenda
 Setting the scene
 What do our customers need ?
 Example Workflows with Good
 Example Good customer case studies
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
2
Setting the Scene
Mobile Maturity Stages
Compliance
(and most MDM vendors)
Business
Transformation
Off the shelf Apps:
Email
Intranet
Doc Reader
“Run”
•
•
•
•
•
‘Office’
Instant Messaging
SharePoint or Cloud
eBusiness (Siebel,
Oracle, etc.)
/…
“Grow”
Ta c t i c a l
Line of Business Custom Apps
Specialized multi-app
Workflows
 Data safely moving
between apps on-device
“Transform”
Strategic
Very short timeframe
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
4
The Near Term Future is
Secure Multi-App Workflows
Take secure
photo of car,
save to Good
Repository
1
Open inspection
form in
iAnnotate, paste
photos
2
Fill out form,
inspector signs
doc on iPad
3
Send PDF
to GFE, email
to Processing
4
Document and data transfer ENCRYPTED between apps
Encrypted on disk,
in memory, in use
Encrypted
in motion
©2012 Good Technology, Inc. All Rights Reserved.
Open In with second app,
data remains encrypted
Agree to annotations,
securely sign document
Company Confidential
Securely send PDF
5
Device Management, Data Management, …
or now both?
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
6
Beyond MDM: Enterprises Need a Comprehensive
Secure Mobility Solution
Good Collaboration Suite
Good Dynamics Platform
ISV Ecosystem and
Custom Apps
Enterprise
WorldCorp App Store
MAM, App Distribution
Email,
Contacts,
Calendar,
MDM
File
Sync
IM
App Dev’t,
Services
Framework
ISV Horizontal &
Vertical Apps
Browser
Custom Apps
MDM, App Analytics
Benefits
 Productivity that users
want
 Security that IT needs
 Flexibility and speed
the business demands
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
7
World’s Most Experienced Mobility Provider
800+
5,000+
5,000
Good Dynamics
custom-developed
apps in 12 months
Good customers
operating
in 130 countries
Good devices
activated every
work day
1,000,
000,000
Good messages sent
securely per week
280,000,
000,000,
000 bytes
Good data securely
processed every year
9 of 10
8 of 10
6 of 10
5 of 10
Largest aerospace
& defense firms
Largest
commercial
banks
Largest
insurance
companies
Largest WW
healthcare
providers
Source: Good Technology, April 2013
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
8
Unique Recognition from International
Accreditation Bodies
Guidance for Good for Enterprise &
Good Dynamics to Official Level
Common Criteria EAL4+
DCE certification to communicate and store
classified information up to ‘Protected’
Multiple US Department of Defense STIG
approvals across various platforms
The Dutch General Intelligence Security Services
has tested and produced Guidance for Good.
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
9
CESG Guidance
www.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
10
CESG Guidance
www.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2
•
•
•
•
Description of GfE & GD
Summary of Key Risks
Recommended Deployment Architecture
Technical Assessment
•
•
©2013 Good Technology, Inc. All Rights Reserved.
Direct Connect
Good Vault Smartcard Authentication
Company Confidential
11
Good Technology: Example Local
Government Customers (~120 in total)
©2012 Good Technology, Inc. All Rights Reserved.
Company Confidential
12
What do our customers need ?
Overview
According to Gartner the standalone MDM solution is dead-ended and
application/data information security is now needed. In Good’s view
serious Mobile projects – Users doing business on Devices - now require:
a)
Information Assurance is delivered by a powerful “Containerised”
encrypted solution for the apps & data - not just the device.
b)
Enterprise-class Mobile ‘Outlook’. Without the essential professional
features in Good such as free/busy, legacy PC users will simply rebel.
c)
Platform independence. Avoid platform lock-in (following crises like
Nokia & Blackberry), meet or exceed the standard set by Blackberry
and provide better choice based on use case.
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
14
a) A Powerful “Containerised” Approach
A powerful “Containerised” encrypted solution that delivers AES Encryption for the data not just
device, capability to use “Basic” apps for corporate data and app-to-app secure workflows:
I.
Security for the data rather than just the device. For example, Banks are well aware of the
need to specifically encrypt users’ mobile banking app data. Sensitive business data must
be afforded the same care.
II.
Capability to now use what Platform Guidance terms “Basic” [off the shelf] apps through
“Good Dynamics” and seriously reduce app development costs and accelerate mobility
programme deliverables.
III.
App-to-App secure Workflows – Users being able to complete business processes on the
device is the logical requirement of any serious mobility programme, so Good uniquely
offers multiple capabilities like Jailbreak detection/mitigation, App-to-App Crypto, Copy &
Paste prevention and Android Screen Capture prevention
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
15
a) MDM Players: Secure Apps via Wrapping
 A method for rapid app conversion
 Not favoured by CESG: ‘can’t make a bad app good’
©2012 Good Technology, Inc. All Rights Reserved.
Company Confidential
16
a) Good: Build Enterprise-Ready Containerized Apps
Good Dynamics supports all three app types, freeing developers from
enterprise security complexities
Web Apps
Hybrid Apps
Native Apps
Xcode
Good Secure Browser
Eclipse
Benefits
 Developers use their
chosen environments,
architectures
 First to support native iOS
and Android, as well as
hybrid & web
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
17
a) Looks Familiar - Good Architecture
Intranets
Web-enabled
Apps
Enterprise
Applications
Good
Servers
Firewall
©2013 Good Technology, Inc. All Rights Reserved.




Outbound connection
No firewall holes
Role-based admin
Policy groups
Wireless
Network
Transport
Security
Perimeter
Security
Internal
Security
Control traffic by:
 Access list
 Domain name
 Detect
jailbroken/rooted
malware infected
devices
Network
Operations
Center




Guaranteed delivery
AES encryption
FIPS 140-2 certificate
CESG Guidance – to
OFFICIAL
 Authorized device check
Company Confidential
Devices with
Good
Handheld
Security
 Encrypted enterprise
data
 Application password
enforcement
 Data loss prevention
policies
 Remote erase
18
b) Avoid User Rebellion
Comparison between Native and GFE
Native Blackberry
BES-7
Email
Component
GFE key differentiator from native email
Email
Ability for a user to increase productivity by Sort and Filter in List View
[By Date, Sender, Subject, Priority-Only, Unread-Only and Flagged Only]
No
Yes
Categorize emails by types with Advanced Message Icons
(e.g. ’Flag for follow-up’ Indicators etc.) *
No
Yes
Navigate highly organized folder structures by with Expand/Collapse Folder
capability with easy to use folder icon.
No
Yes
Meeting forward
(from within received meeting request)
No
Yes
Meeting reply-all from within meeting request
(e.g. "I am running late")
No
Yes
Ability for a user to initiate conference Call ‘on the road’ from Subject field + PIN
(pulled from meeting request)
No
Yes
Facilitate Meetings by including Corporate Resources including Conference Rooms
No
Not sure
Control meeting attendees by Marking as Private
No
Yes
Calendar
Control Contact Fields to be synced via IT policy
No
Contacts
* On Native: Only Importance and Attachment indicator. On GFE, Importance, Attachments, Meeting and ‘Flag for follow up’.
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
Yes
19
c) Enterprises need standardised security control for
multiple mobile platforms
 Mobile marketplace is moving very fast – avoid lock-in
 Lessons of Nokia, Blackberry and patent-wars like Samsung
 Good supports iOS, Android, Windows
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
20
Example Workflows for
Regional Public Sector
Worker Productivity Use Case: Accessing
data and account information
1
Open Good Secure
browser – access
legislative tracking system
2
Copy content from
browser session
3
Generate reply to in
Good for Enterprise
email
4
Paste content into
“reply to” email
5
Send “reply to” email
to colleague in
response to question
Open new
reply email
 Real time information and data is
accessed and easily shared
 Accuracy, efficiency, and productivity
increases and costs reduced
 Secure access to data and account
information
 Agency IT controls the workflow,
network, and IP
 Simplify complex workflows
 Increase citizen satisfaction with
efficiency and quality of services
22
(C) 2013 Good Technology Corporation. All rights reserved. Not for distribution except as authorized in writing by Good.
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
22
Merge mapping data into docs
1
Open Accellion
for Good
2
Open Word doc
in Office2 Pro
for Good
3
Open Good-enabled
mapping app and find
mapping
data needed
4
Copy mapping data I
nto word document
and save as PDF using
Office2 Pro for Good
5
Send PDF to
GFE for emailing
to co-worker
 Integrated secure workflows keep everyone
informed and productive
 Accuracy, efficiency and productivity
increases
 App selection and deployment is simple and
secure
 Secure and real time access to data and
account information
 Agency IT controls the workflow and
network
 Save time and money with integrated and
secure workflows
24
(C) 2013 Good Technology Corporation. All rights reserved. Not for distribution except as authorized in writing by Good.
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
24
Example Case Studies
Case Study: Cheshire Council
Key Drivers:
• Desire to make workforce more efficient through
use of smart devices (BYOD & Company Liable)
• Deliver more operational efficiencies for frontline
staff e.g. Social care & highways
• Make workers more mobile – support office
rationalisation strategy
• Cost savings - reduce BB and laptop estate for
certain user groups
Future Requirements:
• Want to enable secure collaboration
(e.g. integration with SharePoint / network drives)
on smart devices through Good Dynamics
• Desire to expand BYOD to 1000+ and ensure
significant take-up
©2012 Good Technology, Inc. All Rights Reserved.
Company Confidential
26
Examples: UK Civil Aviation Authority
The UK’s aviation regulator, the UK CIVIL AVIATION AUTHORITY (CAA) selected
Good Technology to help increase staff productivity and collaboration by securely
enabling mobile workers to access emails, contacts, calendars, files and internal web
apps (Intranet) securely on the go.
Good was chosen following a long review of its strategy for its growing mobile
workforce.
“At the start of this process, our aim was to satisfy employees demand for use of
newer devices by moving away from Blackberry, reduce our overall cost of
ownership and increase functionality while not compromising security,” according to
Darryl Sampson, CAA’s Head of Infrastructure.
“The feedback on the Good Solution ... has been very positive, particularly around how
Good … works seamlessly across different operating systems and devices.”
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
27
Case Study: Cardiff City Council
Key Requirements:
• Paperless initiative
• Secure access to e-mail and file shares on
internal network for ‘Members’
• Ability to access ‘meeting notes’ / briefing
papers securely on iPads
• Edit and share docs securely
Key Objectives:
• Reduce Printing costs by £97k over 3 years
• Save Courier costs by £23k a year
©2012 Good Technology, Inc. All Rights Reserved.
Company Confidential
28
Examples: UK Solihull Council
Steve Halliday, CIO and President of SOCITM said: "Our Transformation
Director described the deployment of Good Technology as probably
one of the most innovative ICT developments he's seen in 30 years ...“
Whilst the original intent of the project was to reduce the financial burden in
paying for BlackBerry by introducing a Bring Your Own Device (BYOD)
policy for their staff, SOLIHULL METROPOLITAN BOROUGH COUNCIL has
delivered many other unexpected, concrete benefits.
Whilst Good Technology empowered secure BYOD, the solution has also
enabled staff to be far more efficient (saving some Social Care workers 2
hours per day), improving decision-making around the Council and
improving the service delivered by IT to its users.
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
29
In Summary
In Summary
a) Information Assurance

All Enterprise data is secure within an AES encrypted container
b) Enterprise-class Mobile ‘Outlook’

Users must be delighted and have extra facilities above that of native Apps
c) Platform independence

Don’t Lock your users into a mobile platform that might reach a dead-end in
the future
©2013 Good Technology, Inc. All Rights Reserved.
Company Confidential
31
Thankyou