Home
BYTE Newsletter
Keep up with all the BYTE News and Reviews

Subscribe
Larry Seltzer

Larry Seltzer

Editorial Director, Byte

Good Claims Sovereignty Over Mobile Security

Comments | Larry Seltzer, BYTE | November 16, 2012 10:04 AM

Category: Tablets, Smartphones

Good Technology's bombshell announcement Wednesday that it is suing competitors MobileIron and AirWatch for patent infringement probably has everyone in the mobile security and management business calling their lawyers. If nothing else, the move is "good" for intellectual property attorneys.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

I've been talking to people in the business and the consensus is that Good could really cause a great deal of disorder, depending on what it's up to. Of course it is seeking injunctions against the sale of the allegedly infringing products, but it's basically just a shakedown for licensing fees. A rich ecosystem of mobile security competitors is probably just fine with Good as long as all those competitors are paying Good's cut.

A little bit of history might be in order here: Many might think that the mobile industry sprang from Steve Jobs' mind in 2007 with the release of the iPhone, but much of the basic technology was in use long before and Good's antecedents were there. Visto Corporation, the main corporate ancestor of Good Technology, was writing software for corporate mobile users back in the mid-90's. Back then "mobile" meant using a notebook computer on the road, and Visto's software was browser-based.

Both Good Technology and Visto, which combined to form Good Technology in 2009, might have been around a long time. But the MDM industry was created by Apple when it cloned RIM's BlackBerry Enterprise Server APIs to form the iOS MDM APIs. These are the APIs that companies like AirWatch and MobileIron and probably 100 others around the world implement. They try to add their own features, but those APIs are the core because that's what Apple supports, and other companies generally have to take what Apple gives. For this reason, incidentally, there's no real difference between MDM software packages, at least where iOS is concerned.

Then there's Apple. I bet you all almost forgot about it and what would seem to be its central role in this litigation. In its press releases Good notes that it has intellectual property licensing agreements with RIM, Microsoft and others, but no mention of Apple. I asked Good and a rep said "... this lawsuit in no way impacts our relationship with Apple or any agreements we have with them. It's only about [MobileIron] and [AirWatch]."

So either Good has secret IP agreements with Apple, or it is negotiating with Apple, or there's some other good reason not to sue Apple. At least not yet. Because surely if these other companies infringe, so does Apple. Even worse, Apple has been the main facilitator of the infringers against whom Good is now making its move.

Surely next on Good's list are Samsung and the others implementing similar functionality on Android devices. Samsung's SAFE initiative is an attempt to standardize MDM and other security access to Android devices because Google has declined to do so after all these years.

And suddenly we are presented with a possible reason why Google has declined to get involved with standardizing device security in Android. Maybe it was spooked by Good's 75 patents.

This is, in many ways, a classic story in the software patent genre. Good's patents, as the company brags, cover basic methods of mobile security management. It might be impossible to operate in the market without using these techniques. I believe in intellectual property rights and I like the idea of the patent system in general, but these days, and especially with software, the way the system works ends up seeming unreasonable.

Larry Seltzer is the editorial director for BYTE.

Follow Larry Seltzer and BYTE on Twitter, Facebook, LinkedIn, and Google+:



Related Reading




Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

BYTE encourages readers to engage in spirited, healthy debate, including taking us to task. However, BYTE moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. BYTE further reserves the right to disable the profile of any commenter participating in said activities.

COMMENTS

Tune In to BYTE
Facebook Twitter LinkedIn Newsletter RSS
Whitepapers
whitepaper
In this paper you will learn the five trends shaping the future of enterprise mobility. Learn how the rise of social media as a business application, the lurring between work and home, the emergence of new mobile devices, the demand for tech savvy employees and changing expectations of corporate IT will fundamentally change the workplace.
whitepaper
In a survey of more than 1,700 information workers (iWorkers) in North America, notebooks, desktops, and smartphones were found to be “must-have” devices, while tablets, slates, and netbooks were relegated to “nice-to-have” status, according to a commissioned study conducted by Forrester Consulting on behalf of Dell and Intel.
Sponsored by: Dell
Upcoming Events


Oct 20: Becoming a Security Detective - Gathering and Analyzing Security Intelligence in the Enterprise

In this all-day virtual event, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats. Register today!

Platinum Sponsors: ArcSight, NetIQ, Proofpoint, Thawte
Gold Sponsor: Q1 Labs



October 6: InformationWeek 500 Virtual Event: The Need for Speed

At the 2011 InformationWeek 500 Virtual Conference, C-level executives from leading global companies will gather to discuss how their organizations are turbo-charging business execution and growth.

Platinum Sponsor: ArcSight, Workday
Gold Sponsor: IBM


Aug 25: InformationWeek & Dark Reading present: How Security Breaches Happen and What Your Organization Can Do About Them

Attendees will get insights on how to prevent breaches from happening, how to research and identify the source of a breach, and how to remediate a compromise as quickly and efficiently as possible.

Platinum Sponsor: ArcSight, NetIQ, Thawte
Gold Sponsors: Lumension, NetGear, GFI
Silver Sponsor: Motorola


July 28: InformationWeek & Symantec present: Infrastructure at Risk -- Taking Decisive Action to Secure Your Critical Data Assets

Join the editors of InformationWeek and leading security experts from Symantec for an in-depth look at the current threats faced by large and small organizations, and the implications for your business, your customers, and even your country. You'll hear how today's threat landscape is changing drastically, and learn the latest countermeasures and best practices to keep your company's precious data assets out of the hands of determined cybercriminals.


July 27: Electronic Health Records -- Moving from Concept to Reality

At this InformationWeek Healthcare Virtual Event, we will talk with healthcare practitioners, IT professionals and other industry experts about issues surrounding EHR selection, deployment and use.

Platinum Sponsor: HP, Intel, GBS, Geotrust, NextGen
Silver Sponsor: Proofpoint


On-Demand: InformationWeek & Interop present: Business Mobility Unleashed

In this virtual event, the leaders behind InformationWeek Business Technology Network and Interop zero in on the top mobile technologies and techniques you'll need to understand and master to ensure your organization thrives in the wireless world.
Platinum Sponsors: Alcatel-Lucent, APC
Gold Sponsor: HP
Silver Sponsor: Emerson Network Power
Bronze Sponsor: Skybot


On-Demand: Cybersecurity Best Practices

In this half-day virtual event, experts assess the state of cybersecurity in government and present the latest strategies for creating a more secure, attack-proof IT infrastructure. This event will help CISOs and other information assurance professionals in federal, state, and local government stay on top of the latest developments in the field.
Platinum Sponsor: GeoTrust
Gold Sponsor: Bit9


On-Demand: Data Center Transformation

Data centers are undergoing incredible transformations that create both opportunities and challenges for IT professionals. Server virtualization enables rapid provisioning, more efficient use of resources, and improved disaster recovery. That trend will continue with storage and network virtualization, allowing IT pros to further abstract -- and optimize -- data center resources.In this virtual event, you will learn how prepare your organization for a data center transformation.
Platinum Sponsors: AMD, APC, Cisco, Eaton, SunGard
Gold Sponsor: Emerson Network Power


On-Demand: Cloud Computing Roadmap: Controlling the Cloud - Managing, Optimizing and Integrating Cloud Services with Your Existing IT Infrastructure

In this virtual event, you'll learn how to craft your own strategy for successfully embracing and integrating new cloud computing capabilities without derailing or destroying your current IT roadmap.
Platinum Sponsors: ArcSight, GoToAssist, SunGard, thawte
Gold Sponsor: Symform
Silver Sponsor: Skybot


On-Demand: Plugging the Leaks -- Finding and Fixing the IT Security Holes in your Enterprise

In this virtual event presented by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.
Platinum Sponsors: NetIQ, Novell, thawte, Webroot
Gold Sponsors: ArcSight, Bit9, OpenText
Silver Sponsor: Application Security, Core Security, Lumension

 



The 2011 Informationweek 500 Conference will be held at the beautiful St. Regis Monarch Beach Resort, Dana Point, CA. Mark your calendars for September 11-13, 2011.



InformationWeek Healthcare IT Leadership Forum




Bank Systems & Technology Executive Summit 2011