Beyond PSN Compliance
Good Technology
January 2014
Milton Stephenson (Azlan SDG)
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 2
Agenda
Setting the scene What do our customers need ? Example Workflows with Good Example Good customer case studies
Setting the Scene
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 4
Mobile Maturity Stages
EmailIntranet
Doc Reader
“Run”
Off the shelf Apps:
•‘Office’•Instant Messaging•SharePoint or Cloud•eBusiness (Siebel, Oracle, etc.)•/…
“Grow”
BusinessTransformation
Line of Business Custom Apps
Specialized multi-app Workflows
Data safely moving between apps on-device
“Transform”
Tactical
Strategic
Very short timeframe
Tactical Strategic
Compliance(and most MDM vendors)
©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 5
4Send PDF to GFE, email to Processing
3Fill out form, inspector signs doc on iPad
2Open inspection form in iAnnotate, paste photos
1Take secure photo of car, save to Good Repository
The Near Term Future is Secure Multi-App Workflows
Document and data transfer ENCRYPTED between apps
Open In with second app, data remains encrypted
Encrypted on disk, in memory, in use
Agree to annotations, securely sign document
Securely send PDFEncrypted in motion
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 6
Device Management, Data Management, … or now both?
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 7
Beyond MDM: Enterprises Need a Comprehensive Secure Mobility Solution
Email, Contacts, Calendar, MDM Browser
File Sync
IM
Good Collaboration Suite
MDM, App Analytics
WorldCorpEnterpriseApp Store
MAM, App Distribution
App Dev’t, Services
Framework
Good Dynamics Platform
ISV Horizontal &Vertical Apps
Custom Apps
ISV Ecosystem and Custom Apps
BenefitsProductivity that users want
Security that IT needs
Flexibility and speed the business demands
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 8
World’s Most Experienced Mobility Provider
Good customers operating
in 130 countries
5,000+Good devices
activated every work day
5,000
Good messages sent securely per week
1,000,000,000
Good data securely processed every year
280,000,000,000,
000 bytes
Source: Good Technology, April 2013
800+Good Dynamics
custom-developed apps in 12 months
9 of 10Largest aerospace & defense firms
6 of 10Largest insurance companies
5 of 10Largest WWhealthcareproviders
8 of 10Largest commercial banks
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 9
Unique Recognition from International Accreditation Bodies
Guidance for Good for Enterprise & Good Dynamics to Official Level
Common Criteria EAL4+
DCE certification to communicate and store classified information up to ‘Protected’
Multiple US Department of Defense STIG approvals across various platforms
The Dutch General Intelligence Security Services has tested and produced Guidance for Good.
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 10
CESG Guidancewww.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 11
CESG Guidancewww.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2
• Description of GfE & GD• Summary of Key Risks• Recommended Deployment Architecture• Technical Assessment
• Direct Connect• Good Vault Smartcard Authentication
©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 12
Good Technology: Example Local Government Customers (~120 in total)
What do our customers need ?
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 14
Overview
According to Gartner the standalone MDM solution is dead-ended and application/data information security is now needed. In Good’s view serious Mobile projects – Users doing business on Devices - now require:
a)Information Assurance is delivered by a powerful “Containerised” encrypted solution for the apps & data - not just the device.
b)Enterprise-class Mobile ‘Outlook’. Without the essential professional features in Good such as free/busy, legacy PC users will simply rebel.
c)Platform independence. Avoid platform lock-in (following crises like Nokia & Blackberry), meet or exceed the standard set by Blackberry and provide better choice based on use case.
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 15
a) A Powerful “Containerised” Approach
A powerful “Containerised” encrypted solution that delivers AES Encryption for the data not just device, capability to use “Basic” apps for corporate data and app-to-app secure workflows:
I.Security for the data rather than just the device. For example, Banks are well aware of the need to specifically encrypt users’ mobile banking app data. Sensitive business data must be afforded the same care.
II.Capability to now use what Platform Guidance terms “Basic” [off the shelf] apps through “Good Dynamics” and seriously reduce app development costs and accelerate mobility programme deliverables.
III.App-to-App secure Workflows – Users being able to complete business processes on the device is the logical requirement of any serious mobility programme, so Good uniquely offers multiple capabilities like Jailbreak detection/mitigation, App-to-App Crypto, Copy & Paste prevention and Android Screen Capture prevention
©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 16
a) MDM Players: Secure Apps via Wrapping
A method for rapid app conversion Not favoured by CESG: ‘can’t make a bad app good’
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 17
a) Good: Build Enterprise-Ready Containerized AppsGood Dynamics supports all three app types, freeing developers from enterprise security complexities
Native AppsWeb Apps Hybrid Apps
Good Secure Browser Xcode
Eclipse
BenefitsDevelopers use their chosen environments, architectures
First to support native iOS and Android, as well as hybrid & web
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 18
a) Looks Familiar - Good Architecture
Handheld Security
Encrypted enterprise data
Application password enforcement
Data loss prevention policies
Remote erase
Devices with Good
NetworkOperations
CenterWirelessNetwork
Transport Security
Guaranteed delivery AES encryption FIPS 140-2 certificate CESG Guidance – to
OFFICIAL Authorized device check
Perimeter Security
Outbound connection No firewall holes Role-based admin Policy groups
FirewallGood
ServersEnterprise
Applications
Intranets
Web-enabled Apps
Internal Security
Control traffic by: Access list Domain name Detect
jailbroken/rooted malware infected devices
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 19
b) Avoid User Rebellion Comparison between Native and GFE
* On Native: Only Importance and Attachment indicator. On GFE, Importance, Attachments, Meeting and ‘Flag for follow up’.
Component GFE key differentiator from native email Native Email
Blackberry BES-7
Email Ability for a user to increase productivity by Sort and Filter in List View [By Date, Sender, Subject, Priority-Only, Unread-Only and Flagged Only]
No Yes
Categorize emails by types with Advanced Message Icons (e.g. ’Flag for follow-up’ Indicators etc.) *
No Yes
Navigate highly organized folder structures by with Expand/Collapse Folder capability with easy to use folder icon.
No Yes
Calendar Meeting forward (from within received meeting request)
No Yes
Meeting reply-all from within meeting request (e.g. "I am running late")
No Yes
Ability for a user to initiate conference Call ‘on the road’ from Subject field + PIN (pulled from meeting request)
No Yes
Facilitate Meetings by including Corporate Resources including Conference Rooms No Not sure
Control meeting attendees by Marking as Private No Yes
Contacts Control Contact Fields to be synced via IT policy No Yes
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 20
c) Enterprises need standardised security control for multiple mobile platforms
Mobile marketplace is moving very fast – avoid lock-in Lessons of Nokia, Blackberry and patent-wars like Samsung Good supports iOS, Android, Windows
Example Workflows for Regional Public Sector
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 22(C) 2013 Good Technology Corporation. All rights reserved. Not for distribution except as authorized in writing by Good.
Worker Productivity Use Case: Accessing data and account information
Open Good Secure browser – access legislative tracking system 1 Copy content from
browser session2Generate reply to in Good for Enterprise email 3
Open new reply email
Paste content into “reply to” email4
Send “reply to” email to colleague in response to question5
Real time information and data is accessed and easily shared
Secure access to data and account information
Simplify complex workflows
Accuracy, efficiency, and productivity increases and costs reduced
Agency IT controls the workflow, network, and IP
Increase citizen satisfaction with efficiency and quality of services
22
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 24(C) 2013 Good Technology Corporation. All rights reserved. Not for distribution except as authorized in writing by Good.
Merge mapping data into docs
Open Accellion for Good1
Open Good-enabled mapping app and find mapping data needed
3Open Word doc in Office2 Pro for Good2
Copy mapping data Into word document and save as PDF using Office2 Pro for Good
4Send PDF to GFE for emailing to co-worker 5
Integrated secure workflows keep everyone informed and productive
App selection and deployment is simple and secure
Agency IT controls the workflow and network
Accuracy, efficiency and productivity increases
Secure and real time access to data and account information
Save time and money with integrated and secure workflows
24
Example Case Studies
©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 26
Case Study: Cheshire Council
Key Drivers:
•Desire to make workforce more efficient through use of smart devices (BYOD & Company Liable)•Deliver more operational efficiencies for frontline staff e.g. Social care & highways•Make workers more mobile – support office rationalisation strategy•Cost savings - reduce BB and laptop estate for certain user groups
Future Requirements:
•Want to enable secure collaboration (e.g. integration with SharePoint / network drives) on smart devices through Good Dynamics•Desire to expand BYOD to 1000+ and ensure significant take-up
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 27
Examples: UK Civil Aviation Authority
The UK’s aviation regulator, the UK CIVIL AVIATION AUTHORITY (CAA) selected Good Technology to help increase staff productivity and collaboration by securely enabling mobile workers to access emails, contacts, calendars, files and internal web apps (Intranet) securely on the go.
Good was chosen following a long review of its strategy for its growing mobile workforce.
“At the start of this process, our aim was to satisfy employees demand for use of newer devices by moving away from Blackberry, reduce our overall cost of ownership and increase functionality while not compromising security,” according to Darryl Sampson, CAA’s Head of Infrastructure.
“The feedback on the Good Solution ... has been very positive, particularly around how Good … works seamlessly across different operating systems and devices.”
©2012 Good Technology, Inc. All Rights Reserved. Company Confidential 28
Case Study: Cardiff City Council
Key Requirements:
•Paperless initiative•Secure access to e-mail and file shares on internal network for ‘Members’•Ability to access ‘meeting notes’ / briefing papers securely on iPads •Edit and share docs securely
Key Objectives:
•Reduce Printing costs by £97k over 3 years •Save Courier costs by £23k a year
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 29
Examples: UK Solihull Council
Steve Halliday, CIO and President of SOCITM said: "Our Transformation Director described the deployment of Good Technology as probably one of the most innovative ICT developments he's seen in 30 years ...“
Whilst the original intent of the project was to reduce the financial burden in paying for BlackBerry by introducing a Bring Your Own Device (BYOD) policy for their staff, SOLIHULL METROPOLITAN BOROUGH COUNCIL has delivered many other unexpected, concrete benefits.
Whilst Good Technology empowered secure BYOD, the solution has also enabled staff to be far more efficient (saving some Social Care workers 2 hours per day), improving decision-making around the Council and improving the service delivered by IT to its users.
In Summary
©2013 Good Technology, Inc. All Rights Reserved. Company Confidential 31
In Summary
a) Information Assurance
All Enterprise data is secure within an AES encrypted container
b) Enterprise-class Mobile ‘Outlook’
Users must be delighted and have extra facilities above that of native Apps
c) Platform independence
Don’t Lock your users into a mobile platform that might reach a dead-end in the future
Thankyou