Good Technology Unveils Good Trust – A New Mobile Identity & Access Management Platform

Good Technology™, the leader in secure enterprise mobility, today introduced Good Trust™, a security platform that extends critical identity and access management (IAM) capabilities— such as strong authentication, single sign-on and identity federation— to mobile devices and applications. Developers, ISVs and IT managers that have built mobile enterprise apps using the Good Dynamics® app security platform will be able to leverage the robust set of API’s available through the Good Trust platform to customize each mobile application experience based on user identity. In conjunction with today’s announcement, Good also unveiled Good Vault™, the first product to be delivered through the Good Trust platform, which incorporates IAM capabilities and encryption to Good for Enterprise™ to enhance data protection. Both Good Trust and Good Vault were launched at the Gartner Identity and Access Management Summit taking place December 3-5th in Las Vegas, Nevada.
“The ‘bring your own device’ (BYOD) phenomenon has made mobile devices the dominant screen for use by today’s workforce, causing them to become the target of increased malicious attacks and fraud,” said Nicko van Someren, Chief Technology Officer, Good Technology. “Escalating security threats, coupled with the explosion of mobile applications, are necessitating the need for a second-layer of mobile security to ensure the protection of enterprise information and assets.”

The critical IAM capabilities that will be delivered through the Good Trust platform include:

  • Strong two-factor authentication at the application level to assert identity
  • Access control that leverages existing infrastructure and can be centrally managed by IT
  • Single sign-on to easily switch between applications
  • Identity federation to create economies of scale; and
  • Context-based policy enforcement to strengthen security.

Using Good Trust, enterprises will be able to architect mobile applications that:

  • Increase mobile worker productivity with authentication and seamless single sign-on from mobile apps to remote services and data stores
  • Meet compliance mandates by restricting access to sensitive resources only to authorized users
  • Improve IT efficiency and manageability of mobile apps with self-service provisioning and identity governance
  • Enable mobile devices to deliver secure access to buildings or conduct safe and private financial transactions.

Source Good Technology