Beyond PSN Compliance Good Technology Milton Stephenson (Azlan SDG) January 2014 Agenda Setting the scene What do our customers need ? Example Workflows with Good Example Good customer case studies ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 2 Setting the Scene Mobile Maturity Stages Compliance (and most MDM vendors) Business Transformation Off the shelf Apps: Email Intranet Doc Reader “Run” • • • • • ‘Office’ Instant Messaging SharePoint or Cloud eBusiness (Siebel, Oracle, etc.) /… “Grow” Ta c t i c a l Line of Business Custom Apps Specialized multi-app Workflows Data safely moving between apps on-device “Transform” Strategic Very short timeframe ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 4 The Near Term Future is Secure Multi-App Workflows Take secure photo of car, save to Good Repository 1 Open inspection form in iAnnotate, paste photos 2 Fill out form, inspector signs doc on iPad 3 Send PDF to GFE, email to Processing 4 Document and data transfer ENCRYPTED between apps Encrypted on disk, in memory, in use Encrypted in motion ©2012 Good Technology, Inc. All Rights Reserved. Open In with second app, data remains encrypted Agree to annotations, securely sign document Company Confidential Securely send PDF 5 Device Management, Data Management, … or now both? ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 6 Beyond MDM: Enterprises Need a Comprehensive Secure Mobility Solution Good Collaboration Suite Good Dynamics Platform ISV Ecosystem and Custom Apps Enterprise WorldCorp App Store MAM, App Distribution Email, Contacts, Calendar, MDM File Sync IM App Dev’t, Services Framework ISV Horizontal & Vertical Apps Browser Custom Apps MDM, App Analytics Benefits Productivity that users want Security that IT needs Flexibility and speed the business demands ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 7 World’s Most Experienced Mobility Provider 800+ 5,000+ 5,000 Good Dynamics custom-developed apps in 12 months Good customers operating in 130 countries Good devices activated every work day 1,000, 000,000 Good messages sent securely per week 280,000, 000,000, 000 bytes Good data securely processed every year 9 of 10 8 of 10 6 of 10 5 of 10 Largest aerospace & defense firms Largest commercial banks Largest insurance companies Largest WW healthcare providers Source: Good Technology, April 2013 ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 8 Unique Recognition from International Accreditation Bodies Guidance for Good for Enterprise & Good Dynamics to Official Level Common Criteria EAL4+ DCE certification to communicate and store classified information up to ‘Protected’ Multiple US Department of Defense STIG approvals across various platforms The Dutch General Intelligence Security Services has tested and produced Guidance for Good. ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 9 CESG Guidance www.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2 ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 10 CESG Guidance www.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2 • • • • Description of GfE & GD Summary of Key Risks Recommended Deployment Architecture Technical Assessment • • ©2013 Good Technology, Inc. All Rights Reserved. Direct Connect Good Vault Smartcard Authentication Company Confidential 11 Good Technology: Example Local Government Customers (~120 in total) ©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 12 What do our customers need ? Overview According to Gartner the standalone MDM solution is dead-ended and application/data information security is now needed. In Good’s view serious Mobile projects – Users doing business on Devices - now require: a) Information Assurance is delivered by a powerful “Containerised” encrypted solution for the apps & data - not just the device. b) Enterprise-class Mobile ‘Outlook’. Without the essential professional features in Good such as free/busy, legacy PC users will simply rebel. c) Platform independence. Avoid platform lock-in (following crises like Nokia & Blackberry), meet or exceed the standard set by Blackberry and provide better choice based on use case. ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 14 a) A Powerful “Containerised” Approach A powerful “Containerised” encrypted solution that delivers AES Encryption for the data not just device, capability to use “Basic” apps for corporate data and app-to-app secure workflows: I. Security for the data rather than just the device. For example, Banks are well aware of the need to specifically encrypt users’ mobile banking app data. Sensitive business data must be afforded the same care. II. Capability to now use what Platform Guidance terms “Basic” [off the shelf] apps through “Good Dynamics” and seriously reduce app development costs and accelerate mobility programme deliverables. III. App-to-App secure Workflows – Users being able to complete business processes on the device is the logical requirement of any serious mobility programme, so Good uniquely offers multiple capabilities like Jailbreak detection/mitigation, App-to-App Crypto, Copy & Paste prevention and Android Screen Capture prevention ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 15 a) MDM Players: Secure Apps via Wrapping A method for rapid app conversion Not favoured by CESG: ‘can’t make a bad app good’ ©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 16 a) Good: Build Enterprise-Ready Containerized Apps Good Dynamics supports all three app types, freeing developers from enterprise security complexities Web Apps Hybrid Apps Native Apps Xcode Good Secure Browser Eclipse Benefits Developers use their chosen environments, architectures First to support native iOS and Android, as well as hybrid & web ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 17 a) Looks Familiar - Good Architecture Intranets Web-enabled Apps Enterprise Applications Good Servers Firewall ©2013 Good Technology, Inc. All Rights Reserved. Outbound connection No firewall holes Role-based admin Policy groups Wireless Network Transport Security Perimeter Security Internal Security Control traffic by: Access list Domain name Detect jailbroken/rooted malware infected devices Network Operations Center Guaranteed delivery AES encryption FIPS 140-2 certificate CESG Guidance – to OFFICIAL Authorized device check Company Confidential Devices with Good Handheld Security Encrypted enterprise data Application password enforcement Data loss prevention policies Remote erase 18 b) Avoid User Rebellion Comparison between Native and GFE Native Blackberry BES-7 Email Component GFE key differentiator from native email Email Ability for a user to increase productivity by Sort and Filter in List View [By Date, Sender, Subject, Priority-Only, Unread-Only and Flagged Only] No Yes Categorize emails by types with Advanced Message Icons (e.g. ’Flag for follow-up’ Indicators etc.) * No Yes Navigate highly organized folder structures by with Expand/Collapse Folder capability with easy to use folder icon. No Yes Meeting forward (from within received meeting request) No Yes Meeting reply-all from within meeting request (e.g. "I am running late") No Yes Ability for a user to initiate conference Call ‘on the road’ from Subject field + PIN (pulled from meeting request) No Yes Facilitate Meetings by including Corporate Resources including Conference Rooms No Not sure Control meeting attendees by Marking as Private No Yes Calendar Control Contact Fields to be synced via IT policy No Contacts * On Native: Only Importance and Attachment indicator. On GFE, Importance, Attachments, Meeting and ‘Flag for follow up’. ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential Yes 19 c) Enterprises need standardised security control for multiple mobile platforms Mobile marketplace is moving very fast – avoid lock-in Lessons of Nokia, Blackberry and patent-wars like Samsung Good supports iOS, Android, Windows ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 20 Example Workflows for Regional Public Sector Worker Productivity Use Case: Accessing data and account information 1 Open Good Secure browser – access legislative tracking system 2 Copy content from browser session 3 Generate reply to in Good for Enterprise email 4 Paste content into “reply to” email 5 Send “reply to” email to colleague in response to question Open new reply email Real time information and data is accessed and easily shared Accuracy, efficiency, and productivity increases and costs reduced Secure access to data and account information Agency IT controls the workflow, network, and IP Simplify complex workflows Increase citizen satisfaction with efficiency and quality of services 22 (C) 2013 Good Technology Corporation. All rights reserved. Not for distribution except as authorized in writing by Good. ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 22 Merge mapping data into docs 1 Open Accellion for Good 2 Open Word doc in Office2 Pro for Good 3 Open Good-enabled mapping app and find mapping data needed 4 Copy mapping data I nto word document and save as PDF using Office2 Pro for Good 5 Send PDF to GFE for emailing to co-worker Integrated secure workflows keep everyone informed and productive Accuracy, efficiency and productivity increases App selection and deployment is simple and secure Secure and real time access to data and account information Agency IT controls the workflow and network Save time and money with integrated and secure workflows 24 (C) 2013 Good Technology Corporation. All rights reserved. Not for distribution except as authorized in writing by Good. ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 24 Example Case Studies Case Study: Cheshire Council Key Drivers: • Desire to make workforce more efficient through use of smart devices (BYOD & Company Liable) • Deliver more operational efficiencies for frontline staff e.g. Social care & highways • Make workers more mobile – support office rationalisation strategy • Cost savings - reduce BB and laptop estate for certain user groups Future Requirements: • Want to enable secure collaboration (e.g. integration with SharePoint / network drives) on smart devices through Good Dynamics • Desire to expand BYOD to 1000+ and ensure significant take-up ©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 26 Examples: UK Civil Aviation Authority The UK’s aviation regulator, the UK CIVIL AVIATION AUTHORITY (CAA) selected Good Technology to help increase staff productivity and collaboration by securely enabling mobile workers to access emails, contacts, calendars, files and internal web apps (Intranet) securely on the go. Good was chosen following a long review of its strategy for its growing mobile workforce. “At the start of this process, our aim was to satisfy employees demand for use of newer devices by moving away from Blackberry, reduce our overall cost of ownership and increase functionality while not compromising security,” according to Darryl Sampson, CAA’s Head of Infrastructure. “The feedback on the Good Solution ... has been very positive, particularly around how Good … works seamlessly across different operating systems and devices.” ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 27 Case Study: Cardiff City Council Key Requirements: • Paperless initiative • Secure access to e-mail and file shares on internal network for ‘Members’ • Ability to access ‘meeting notes’ / briefing papers securely on iPads • Edit and share docs securely Key Objectives: • Reduce Printing costs by £97k over 3 years • Save Courier costs by £23k a year ©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 28 Examples: UK Solihull Council Steve Halliday, CIO and President of SOCITM said: "Our Transformation Director described the deployment of Good Technology as probably one of the most innovative ICT developments he's seen in 30 years ...“ Whilst the original intent of the project was to reduce the financial burden in paying for BlackBerry by introducing a Bring Your Own Device (BYOD) policy for their staff, SOLIHULL METROPOLITAN BOROUGH COUNCIL has delivered many other unexpected, concrete benefits. Whilst Good Technology empowered secure BYOD, the solution has also enabled staff to be far more efficient (saving some Social Care workers 2 hours per day), improving decision-making around the Council and improving the service delivered by IT to its users. ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 29 In Summary In Summary a) Information Assurance All Enterprise data is secure within an AES encrypted container b) Enterprise-class Mobile ‘Outlook’ Users must be delighted and have extra facilities above that of native Apps c) Platform independence Don’t Lock your users into a mobile platform that might reach a dead-end in the future ©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 31 Thankyou