1 / 31

Beyond PSN Compliance

Good Technology. Milton Stephenson (Azlan SDG). Beyond PSN Compliance. January 2014. Agenda. Setting the scene What do our customers need ? Example Workflows with Good Example Good customer case studies. Setting the Scene. Mobile Maturity Stages. Strategic. Compliance

simone
Télécharger la présentation

Beyond PSN Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Good Technology Milton Stephenson (Azlan SDG) Beyond PSN Compliance January 2014

  2. Agenda • Setting the scene • What do our customers need ? • Example Workflows with Good • Example Good customer case studies

  3. Setting the Scene

  4. Mobile Maturity Stages Strategic Compliance (and most MDM vendors) BusinessTransformation Line of Business Custom Apps Specialized multi-app Workflows  Data safely moving between apps on-device • Off the shelf Apps: • ‘Office’ • Instant Messaging • SharePoint or Cloud • eBusiness (Siebel, Oracle, etc.) • /… Tactical Email Intranet Doc Reader “Grow” “Transform” “Run” Very short timeframe Tactical Strategic

  5. The Near Term Future is Secure Multi-App Workflows Open inspection form in iAnnotate, paste photos Take secure photo of car, save to Good Repository Send PDF to GFE, email to Processing Fill out form, inspector signs doc on iPad 1 2 3 4 Document and data transfer ENCRYPTED between apps Encrypted on disk, in memory, in use Open In with second app, data remains encrypted Agree to annotations, securely sign document Securely send PDF Encrypted in motion

  6. Device Management, Data Management, … or now both?

  7. Beyond MDM: Enterprises Need a ComprehensiveSecure Mobility Solution ISV Ecosystem and Custom Apps Good Dynamics Platform Good Collaboration Suite WorldCorp Enterprise App Store App Dev’t, Services Framework Email, Contacts, Calendar, MDM File Sync MAM, App Distribution IM Browser Custom Apps ISV Horizontal &Vertical Apps MDM, App Analytics Benefits • Productivity that users want • Security that IT needs • Flexibility and speed the business demands

  8. World’s Most Experienced Mobility Provider 9 of 10 6 of 10 5 of 10 8 of 10 Largest aerospace & defense firms Largest insurance companies Largest WWhealthcare providers Largest commercial banks 1,000,000,000 280,000,000,000,000 bytes 5,000 5,000+ 800+ Good devices activated every work day Good customers operating in 130 countries Good messages sent securely per week Good Dynamics custom-developed apps in 12 months Good data securely processed every year Source: Good Technology, April 2013

  9. Unique Recognition from International Accreditation Bodies Guidance for Good for Enterprise & Good Dynamics to Official Level Common Criteria EAL4+ DCE certification to communicate and store classified information up to ‘Protected’ Multiple US Department of Defense STIG approvals across various platforms The Dutch General Intelligence Security Services has tested and produced Guidance for Good.

  10. CESG Guidance www.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2

  11. CESG Guidance www.gov.uk/government/organisations/cesg/series/end-user-devices-security-guidance--2 • Description of GfE & GD • Summary of Key Risks • Recommended Deployment Architecture • Technical Assessment • Direct Connect • Good Vault Smartcard Authentication

  12. Good Technology: Example Local Government Customers (~120 in total)

  13. What do our customers need ?

  14. Overview According to Gartner the standalone MDM solution is dead-ended and application/data information security is now needed. In Good’s view serious Mobile projects – Users doing business on Devices - now require: • Information Assuranceis delivered by a powerful “Containerised” encrypted solution for the apps & data - not just thedevice. • Enterprise-class Mobile ‘Outlook’. Without the essential professional features in Good such as free/busy, legacy PC users will simply rebel. • Platform independence. Avoid platform lock-in (following crises like Nokia& Blackberry), meet or exceed the standard set by Blackberry and provide better choice based on use case.

  15. a) A Powerful “Containerised” Approach A powerful “Containerised” encrypted solution that delivers AES Encryption for the data not just device, capability to use “Basic” apps for corporate data and app-to-app secure workflows: • Security for the data rather than just the device. For example, Banks are well aware of the need to specifically encrypt users’ mobile banking app data. Sensitive business data must be afforded the same care. • Capability to now use what Platform Guidance terms “Basic” [off the shelf] apps through “Good Dynamics” and seriously reduce app development costs and accelerate mobility programme deliverables. • App-to-App secure Workflows – Users being able to complete business processes on the device is the logical requirement of any serious mobility programme, so Good uniquely offers multiple capabilities like Jailbreak detection/mitigation, App-to-App Crypto, Copy & Paste preventionand Android Screen Capture prevention

  16. a) MDM Players: Secure Apps via Wrapping • A method for rapid app conversion • Not favoured by CESG: ‘can’t make a bad app good’

  17. a) Good: Build Enterprise-Ready Containerized Apps Good Dynamics supports all three app types, freeing developers from enterprise security complexities Hybrid Apps Web Apps Native Apps Eclipse Good Secure Browser Xcode Benefits • Developers use their chosen environments, architectures • First to support native iOS and Android, as well as hybrid & web

  18. a) Looks Familiar - Good Architecture Intranets Web-enabled Apps Network Operations Center Enterprise Applications Good Servers Wireless Network Devices with Good Firewall Handheld Security Transport Security Perimeter Security Internal Security • Control traffic by: • Access list • Domain name • Detect jailbroken/rooted malware infected devices • Outbound connection • No firewall holes • Role-based admin • Policy groups • Guaranteed delivery • AES encryption • FIPS 140-2 certificate • CESG Guidance – to OFFICIAL • Authorized device check • Encrypted enterprise data • Application password enforcement • Data loss prevention policies • Remote erase

  19. b) Avoid User Rebellion Comparison between Native and GFE * On Native: Only Importance and Attachment indicator. On GFE, Importance, Attachments, Meeting and ‘Flag for follow up’.

  20. c) Enterprises need standardised security control for multiple mobile platforms • Mobile marketplace is moving very fast – avoid lock-in • Lessons of Nokia, Blackberry and patent-wars like Samsung • Good supports iOS, Android, Windows

  21. Example Workflows for Regional Public Sector

  22. Worker Productivity Use Case: Accessing data and account information Open Good Secure browser – access legislative tracking system Generate reply to in Good for Enterprise email Send “reply to” email to colleague in response to question 2 5 3 4 1 Paste content into “reply to” email Copy content from browser session • Real time information and data is accessed and easily shared • Secure access to data and account information • Simplify complex workflows • Accuracy, efficiency, and productivity increases and costs reduced • Agency IT controls the workflow, network, and IP • Increase citizen satisfaction with efficiency and quality of services Open new reply email

  23. Merge mapping data into docs Open Good-enabled mapping app and find mapping data needed Copy mapping data Into word document and save as PDF using Office2 Pro for Good Open Word doc in Office2 Pro for Good Send PDF to GFE for emailing to co-worker 2 5 3 4 1 Open Accellion for Good • Integrated secure workflows keep everyone informed and productive • App selection and deployment is simple and secure • Agency IT controls the workflow and network • Accuracy, efficiency and productivity increases • Secure and real time access to data and account information • Save time and money with integrated and secure workflows

  24. Example Case Studies

  25. Case Study: Cheshire Council • Key Drivers: • Desire to make workforce more efficient through use of smart devices (BYOD & Company Liable) • Deliver more operational efficiencies for frontline staff e.g. Social care & highways • Make workers more mobile – support office rationalisation strategy • Cost savings - reduce BB and laptop estate for certain user groups • Future Requirements: • Want to enable secure collaboration (e.g. integration with SharePoint / network drives) on smart devices through Good Dynamics • Desire to expand BYOD to 1000+ and ensure significant take-up

  26. Examples: UK Civil Aviation Authority The UK’s aviation regulator, the UK CIVIL AVIATION AUTHORITY (CAA) selected Good Technology to help increase staff productivity and collaboration by securely enabling mobile workers to access emails, contacts, calendars, files and internal web apps (Intranet) securely on the go. Good was chosen following a long review of its strategy for its growing mobile workforce. “At the start of this process, our aim was to satisfy employees demand for use of newer devices by moving away from Blackberry, reduce our overall cost of ownership and increase functionality while not compromising security,” according to Darryl Sampson, CAA’s Head of Infrastructure. “The feedback on the Good Solution ... has been very positive, particularly around how Good … works seamlessly across different operating systems and devices.”

  27. Case Study: Cardiff City Council • Key Requirements: • Paperless initiative • Secure access to e-mail and file shares on internal network for ‘Members’ • Ability to access ‘meeting notes’ / briefing papers securely on iPads • Edit and share docs securely • Key Objectives: • Reduce Printing costs by £97k over 3 years • Save Courier costs by £23k a year

  28. Examples: UK Solihull Council Steve Halliday, CIO and President of SOCITM said: "Our Transformation Director described the deployment of Good Technology as probably one of the most innovative ICT developments he's seen in 30 years ...“ Whilst the original intent of the project was to reduce the financial burden in paying for BlackBerry by introducing a Bring Your Own Device (BYOD) policy for their staff, SOLIHULL METROPOLITAN BOROUGH COUNCIL has delivered many other unexpected, concrete benefits. Whilst Good Technology empowered secure BYOD, the solution has also enabled staff to be far more efficient (saving some Social Care workers 2 hours per day), improving decision-making around the Council and improving the service delivered by IT to its users.

  29. In Summary

  30. In Summary • Information Assurance • All Enterprise data is secure within an AES encrypted container • Enterprise-class Mobile ‘Outlook’ • Users must be delighted and have extra facilities above that of native Apps • Platform independence • Don’t Lock your users into a mobile platform that might reach a dead-end in the future

  31. Thankyou

More Related