This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Good Technology adds app-to-app file sharing in new mobility solution

Share this article:

Good Technology has added secure file sharing and ‘app wrapping' capabilities to its latest mobility solution.

Speaking to SC Magazine, Peter Barker, senior vice president of engineering at Good Technology, explained the company has launched the Good Secure Mobility Solution to deliver the productivity that mobile workers want, with the security and protection of corporate data that IT needs, without compromising user experience or privacy.

This comprises the Good Dynamics Secure Mobility Platform, the Good Collaboration Suite and an ecosystem of ISV and custom-developed enterprise apps.

Barker said: “This enables moving data so you get more end-user and enterprises with visibility on what they are trying to accomplish. This also offers the ability to create secure multiple application workflows and with the secure containers, it enables you to move data in a secure way.

“Good Dynamics allows apps to share data between them and companies can exchange a piece of data securely.”

Barker explained that following the launch of Good Dynamics two years ago, the new functions include app wrapping to containerise custom applications, as well as an app store for managed and unmanaged devices. “You cannot expect to manage all devices and businesses are working on the impact,” he said.

Christy Wyatt, chief executive officer of Good Technology, said: “Mobile productivity applications can transform business by speeding processes and improving communication with the extended enterprise when deployed and managed properly.

“Good offers a comprehensive solution to secure and manage enterprise-built applications, and extends its innovative technology to a large ecosystem of industry-leading third-party apps. This is the first secure mobility platform to provide such broad developer support, no matter whether native or hybrid development is used.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

State-sponsored attacks expected to get worse

State-sponsored attacks expected to get worse

A loss of confidence in perimeter defence has led many infosec professionals to question the ability of their organisation to withstand Advanced Persistent Threats (APTs).

Xen hypervisor found wanting on security

Xen hypervisor found wanting on security

The Xen hypervisor - an open source project that forms the basis of a wide range of virtualised servers - has been found to be vulnerable to a new attack ...

Shellshock vulnerabilities exploited in the wild

Shellshock vulnerabilities exploited in the wild

Linux: open source software is highly pervasive making the Shellshock vulnerability potentially more serious than Heartbleed.