This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

US Air Force beefs up mobile security with Good Technology

Share this article:

The US Air Force has signed a deal with Good Technology to secure its mobile fleet and ensure that personal and official data are kept separate on the device.

Using an initial rollout based on Good for Enterprise, which offers access to email, documents, contacts, calendar, tasks and the organisation's intranet, the US Air Force is handing out around 10,000 smartphones and tablets to its personnel. This is part of the organisations efforts to improve its mobile capabilities, where it wants to offer workers as much choice as possible without compromising security.

The capabilities offered by Good Technology provide a “containerised” approach, which means all the Air Force data and applications are protected and kept separate from all personal data and applications. All official data is encrypted at all times, meaning Air Force personnel are free to use non-work related apps such as Twitter and Facebook without any danger to the sensitive Air Force data.

Using this technology means all Air Force personnel will comply with US Department of Defense (DOD) guidelines for mobile device security, which is essential if the organisation is to push on with its mobile strategy.

It works on Apple and Android devices, giving Air Force personnel the option to use either popular mobile system. The Air Force IT department will be able to track and remotely wipe any device that is lost or stolen.

“Security must come first,” said William E. Marion II, chief technology officer, US Air Force Space Command. “We want to deliver the tools needed to enhance mission productivity and operational capabilities through our IT infrastructure. Empowering airmen with the right mission tools, regardless of location, is critical.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

MH17 spammers direct Twitter users to Zeus-ridden websites

MH17 spammers direct Twitter users to Zeus-ridden websites

In the aftermath of the MH17 tragedy which saw almost 300 people lose their lives in an airplane crash over Ukraine, cyber-criminals are taking advantage by leading social media users ...

EU's new cybercrime taskforce set to launch

EU's new cybercrime taskforce set to launch

Andy Archibald, deputy head of the UK's National Cyber Crime Unit (NCCU), is to chair a new cyber-crime taskforce based out of the European Cybercrime Centre (EC3) in The Hague ...

The 5 most read articles this week: July 11-17

The 5 most read articles this week: July ...

Here are the five most popular SC articles, as seen by you the reader, in the week for July 11 to 17.