Your employees want access to corporate information and market updates through a spectrum of personal mobile devices. At the same time, you need locked-down assurance that mobile business data won’t be lost—or worse, leaked. Heightened security threats and use of personal mobile devices in the workforce have caught the attention of regulators—those who need to ensure that consumer and investor information is protected, no matter where the information resides.
Protect Sensitive Information
Data Loss Prevention
With mobility solutions from Good Technology, you can expect an increase in employee productivity, no matter when or where your people are working. Good securely supports your employees' devices of choice so your mobile workforce can safely access email, calendar functions, contact lists, the corporate intranet, and Web-enabled enterprise applications.
|YOUR GOAL||HOW GOOD CAN HELP|
|Improve customer relationships||Fund managers gain secure access to customer portfolio information on corporate intranet.|
|Enhance sales productivity||Insurance sales reps can check email and calendar to stay on top of latest opportunities.|
|Accelerate decision making||Bank officers can access company Web 2.0 application to approve loans while on the road.|
Ease Mobile Administration
Good solutions offer an array of management tools, including a Web-based management console and OTA security policy management, providing you with the flexibility to manage personal and corporate-issued mobile devices from a single solution.
Good helps you address regulatory compliance.
Here are a few examples.
|NYSE & NASD SEC 17-A "Joint Guidance" require brokerage firms to capture broker/dealer communications with customers.||Good Mobile Messaging integrates with your company's email servers, allowing broker/dealer email to be captured and retained according to company policy and regulatory guidelines.|
|Gramm-Leach-Bliley Act (GLBA) requires that financial institutions protect information collected about individuals, including names, addresses, and phone numbers; bank and credit card account numbers; income and credit histories; and Social Security numbers.||Good's Personal Information Management enables encryption of customer contact information on mobile devices, OTA and on Good servers operated by your IT team.|
|Health Insurance Portability Act (HIPAA) requires that email communication related to patient health information be encrypted.||Good Mobile Messaging leverages a FIPS 140-2 certified cryptographic module for data-at-rest and data-in-transit.|
|The American Recovery and Reinvestment Act (ARRA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act, prohibit the storage of unencrypted personally identifiable information (PII) and protected health information (PHI) on computing devices, including smartphones.||Good's secure enterprise container encrypts documents containing customer information on mobile devices.|