This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Good Technology adds app-to-app file sharing in new mobility solution

Share this article:

Good Technology has added secure file sharing and ‘app wrapping' capabilities to its latest mobility solution.

Speaking to SC Magazine, Peter Barker, senior vice president of engineering at Good Technology, explained the company has launched the Good Secure Mobility Solution to deliver the productivity that mobile workers want, with the security and protection of corporate data that IT needs, without compromising user experience or privacy.

This comprises the Good Dynamics Secure Mobility Platform, the Good Collaboration Suite and an ecosystem of ISV and custom-developed enterprise apps.

Barker said: “This enables moving data so you get more end-user and enterprises with visibility on what they are trying to accomplish. This also offers the ability to create secure multiple application workflows and with the secure containers, it enables you to move data in a secure way.

“Good Dynamics allows apps to share data between them and companies can exchange a piece of data securely.”

Barker explained that following the launch of Good Dynamics two years ago, the new functions include app wrapping to containerise custom applications, as well as an app store for managed and unmanaged devices. “You cannot expect to manage all devices and businesses are working on the impact,” he said.

Christy Wyatt, chief executive officer of Good Technology, said: “Mobile productivity applications can transform business by speeding processes and improving communication with the extended enterprise when deployed and managed properly.

“Good offers a comprehensive solution to secure and manage enterprise-built applications, and extends its innovative technology to a large ecosystem of industry-leading third-party apps. This is the first secure mobility platform to provide such broad developer support, no matter whether native or hybrid development is used.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.