DATA SHEET GOOD SECURE COLL ABORATION SUITE The Challenge How do you securely mobilize a wide range of business apps on all your users’ devices at low cost? How do you productively mobilize your workforce across iOS, Android, Windows, BlackBerry 10 and other technologies? The Solution Organizations need to mobilize their core business apps. While many focus on email, leading organizations are rapidly going beyond mobile email to gain competitive advantage. According to Forrester Research, top mobile business tasks include document editing, access to SharePoint, web apps, and intranets. However, as organizations mobilize, IT must ensure these critical apps are as reliable as mission critical services on PCs so key business processes are not disrupted. Meet these imperatives and more with the Good Secure Collaboration Suite. Secure and Manage the Mobile Experience As organizations mobilize they cannot compromise corporate security. A mobility solution with layered security that protects at every level - apps, data, and devices – is needed. This includes going beyond traditional Mobile Device Management (MDM) with app containerization to protect all business data on corporate owned or BYOD devices. And this must be done easily and scalable as users, devices, and apps all increase. The Good Secure Collaboration Suite provides the ease of use IT needs with the gold standard for mobile security and end user privacy: • Protect corporate data from leaking outside of IT control, with policy-based app controls • Secure enterprise data in use, at rest and in motion between apps • Preserve end user privacy without need for intrusive geo-location or whole device wipe techniques • Deploy and manage simply through a web based console with the option of a cloud-hosted service Enable Your Business Processes Leading organizations use mobility as a competitive edge. They mobilize those key business processes that increase revenue, improve customer service and lower costs. This includes both existing business apps and workflows, as well as collaborative apps like email, file sharing, and instant messaging. In both cases, the data created and utilized by these apps must be secured to avoid putting critical business information at risk. The Good Secure Collaboration Suite includes the widest range of secure collaboration apps and supports unlimited deployment of any of the leading 3rd-party ISV apps secured by Good. This empowers IT to: • Improve collaboration with mobile email, One Drive and SharePoint access, instant messaging and secure browsing • Securely mobilize your critical Microsoft applications, including Office • Enable core business apps from Salesforce, Oracle, IBM, HP, MicroStrategy, DocuSign and more Improve Time to Decision Time is money and real-time communication can dramatically improve business performance. Empower your workforce to get business done faster with secure mobile messaging and document sharing. With the Collaboration Suite organizations can: • Enable real-time communication on mobile devices without compromising security, leading to faster time to decision making • Securely access and share documents and collaborate with coworkers • Get more out of Microsoft Lync, Cisco Jabber or other enterprise IM investments by securely extending to mobile GOOD SECURE MANAGEMENT SUITE GOOD SECURE ENTERPRISE SUITE GOOD SECURE COLLABORATION SUITE GOOD SECURE MOBILITY SUITE GOOD SECURE CONTENT SUITE Mobile device management (MDM) √ √ √ √ √ Jailbreak/root detection √ √ √ √ √ Unlimited devices per user √ √ √ √ √ Mobile application management (MAM) √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ Instant messaging √ √ √ Office document editing √ √ √ SharePoint/OneDrive/File Share access √ √ √ √ √ √ √ √ √ √ √ FEATURE Enterprise Mobility Management Mobile content management (MCM) Secure Business Productivity Email, calendar and contacts Corporate intranet access and web browsing √ Apps and App Distribution Unified launcher to access all apps √ √ Good-secured ISV app ecosystem Good-secured custom app development Security and Deployment FIPS 140-2 validated cryptography √ Common Criteria EAL+4, UK CESG, ASD EPL, DoD STIG √ √ √ √ √ √ √ √ IAM and 2-Factor authentication √ √ √ √ √ Active Directory integration √ √ √ √ √ √ √ √ √ √ √ Secure connectivity for any or all apps Cloud-hosted and on premise deployment 1 √ √ Secure Documents Enterprise File Sync and Share (EFSS) √ Integrated Rights Management (DRM) √ Document Tracking for Audit, Compliance and Business Intelligence √ 1 Not all capabilities are available in cloud deployment. About BlackBerry BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world’s most sensitive data across all end points – from cars to smartphones – making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information, visit us.blackberry.com. ©2015 BlackBerry. All rights reserved. BlackBerry®, BBM™ and related trademarks, names and logos are the property of BlackBerry Limited (“BlackBerry”) and are registered and/or used in the U.S. and countries around the world. All other trademarks are property of their respective owners. Content: 12/15 | Rev. 22JAN2016
© Copyright 2024 ExpyDoc