good secure collaboration suite

DATA SHEET
GOOD SECURE COLL ABORATION SUITE
The Challenge
How do you securely mobilize a wide range
of business apps on all your users’ devices at
low cost? How do you productively mobilize
your workforce across iOS, Android, Windows,
BlackBerry 10 and other technologies?
The Solution
Organizations need to mobilize their core business apps. While many focus on email, leading organizations are rapidly going beyond
mobile email to gain competitive advantage. According to Forrester Research, top mobile business tasks include document editing,
access to SharePoint, web apps, and intranets. However, as organizations mobilize, IT must ensure these critical apps are as reliable as
mission critical services on PCs so key business processes are not disrupted. Meet these imperatives and more with the Good Secure
Collaboration Suite.
Secure and Manage the Mobile Experience
As organizations mobilize they cannot compromise corporate security. A mobility solution with layered security that protects at
every level - apps, data, and devices – is needed. This includes going beyond traditional Mobile Device Management (MDM) with
app containerization to protect all business data on corporate owned or BYOD devices. And this must be done easily and scalable
as users, devices, and apps all increase. The Good Secure Collaboration Suite provides the ease of use IT needs with the gold
standard for mobile security and end user privacy:
•
Protect corporate data from leaking outside of IT control, with policy-based app controls
•
Secure enterprise data in use, at rest and in motion between apps
•
Preserve end user privacy without need for intrusive geo-location or whole device wipe techniques
•
Deploy and manage simply through a web based console with the option of a cloud-hosted service
Enable Your Business Processes
Leading organizations use mobility as a competitive edge. They mobilize those key business processes that increase revenue,
improve customer service and lower costs. This includes both existing business apps and workflows, as well as collaborative apps
like email, file sharing, and instant messaging. In both cases, the data created and utilized by these apps must be secured to avoid
putting critical business information at risk. The Good Secure Collaboration Suite includes the widest range of secure collaboration
apps and supports unlimited deployment of any of the leading 3rd-party ISV apps secured by Good. This empowers IT to:
•
Improve collaboration with mobile email, One Drive and SharePoint access, instant messaging and secure browsing
•
Securely mobilize your critical Microsoft applications, including Office
•
Enable core business apps from Salesforce, Oracle, IBM, HP, MicroStrategy, DocuSign and more
Improve Time to Decision
Time is money and real-time communication can dramatically improve business performance. Empower your workforce to get
business done faster with secure mobile messaging and document sharing. With the Collaboration Suite organizations can:
•
Enable real-time communication on mobile devices without compromising security, leading to faster time to decision making
•
Securely access and share documents and collaborate with coworkers
•
Get more out of Microsoft Lync, Cisco Jabber or other enterprise IM investments by securely extending to mobile
GOOD SECURE
MANAGEMENT
SUITE
GOOD SECURE
ENTERPRISE
SUITE
GOOD SECURE
COLLABORATION
SUITE
GOOD SECURE
MOBILITY
SUITE
GOOD SECURE
CONTENT
SUITE
Mobile device management
(MDM)
√
√
√
√
√
Jailbreak/root detection
√
√
√
√
√
Unlimited devices per user
√
√
√
√
√
Mobile application management
(MAM)
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
Instant messaging
√
√
√
Office document editing
√
√
√
SharePoint/OneDrive/File Share
access
√
√
√
√
√
√
√
√
√
√
√
FEATURE
Enterprise Mobility Management
Mobile content management
(MCM)
Secure Business Productivity
Email, calendar and contacts
Corporate intranet access and
web browsing
√
Apps and App Distribution
Unified launcher to access all
apps
√
√
Good-secured ISV app ecosystem
Good-secured custom app
development
Security and Deployment
FIPS 140-2 validated
cryptography
√
Common Criteria EAL+4, UK
CESG, ASD EPL, DoD STIG
√
√
√
√
√
√
√
√
IAM and 2-Factor authentication
√
√
√
√
√
Active Directory integration
√
√
√
√
√
√
√
√
√
√
√
Secure connectivity for any or all
apps
Cloud-hosted and on premise
deployment
1
√
√
Secure Documents
Enterprise File Sync and Share
(EFSS)
√
Integrated Rights Management
(DRM)
√
Document Tracking for Audit,
Compliance and Business
Intelligence
√
1
Not all capabilities are available in cloud deployment.
About BlackBerry
BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure
the world’s most sensitive data across all end points – from cars to smartphones – making the mobile-first enterprise vision a reality.
Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia
Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the
NASDAQ. For more information, visit us.blackberry.com.
©2015 BlackBerry. All rights reserved. BlackBerry®, BBM™ and related trademarks, names and logos are the property of BlackBerry Limited (“BlackBerry”) and are registered and/or used in the U.S.
and countries around the world. All other trademarks are property of their respective owners. Content: 12/15 | Rev. 22JAN2016