This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

US Air Force beefs up mobile security with Good Technology

Share this article:

The US Air Force has signed a deal with Good Technology to secure its mobile fleet and ensure that personal and official data are kept separate on the device.

Using an initial rollout based on Good for Enterprise, which offers access to email, documents, contacts, calendar, tasks and the organisation's intranet, the US Air Force is handing out around 10,000 smartphones and tablets to its personnel. This is part of the organisations efforts to improve its mobile capabilities, where it wants to offer workers as much choice as possible without compromising security.

The capabilities offered by Good Technology provide a “containerised” approach, which means all the Air Force data and applications are protected and kept separate from all personal data and applications. All official data is encrypted at all times, meaning Air Force personnel are free to use non-work related apps such as Twitter and Facebook without any danger to the sensitive Air Force data.

Using this technology means all Air Force personnel will comply with US Department of Defense (DOD) guidelines for mobile device security, which is essential if the organisation is to push on with its mobile strategy.

It works on Apple and Android devices, giving Air Force personnel the option to use either popular mobile system. The Air Force IT department will be able to track and remotely wipe any device that is lost or stolen.

“Security must come first,” said William E. Marion II, chief technology officer, US Air Force Space Command. “We want to deliver the tools needed to enhance mission productivity and operational capabilities through our IT infrastructure. Empowering airmen with the right mission tools, regardless of location, is critical.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

WorldPay hacker sentenced to 11 years for role in £6 million scheme

WorldPay hacker sentenced to 11 years for role ...

An Estonian man, who helped hack payment processor RBS WorldPay in 2008, has now been sentenced to 11 years in prison for his involvement in the £5.9 (US$ 9.4 million) ...

'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems

'Sophisticated' Chinese hackers launched attacks against 43,000 computer ...

A new report reveals that a Chinese cyber-espionage group is closely affiliated with government and carried out attacks against the likes of Fortune 500 companies and government agencies.

Hackers smuggle out stolen data disguised as videos

Hackers smuggle out stolen data disguised as videos

Around a dozen organisations, including at least one financial sector company, have been hit by a new form of hacking where attackers hide stolen corporate data inside video files that ...