Good Technology Moves To Lock Down Smartphones - InformationWeek
IoT
IoT
News
News
11/10/2005
03:21 PM
50%
50%
RELATED EVENTS
Using Threat Data to Improve Your Cyber Defense
Aug 10, 2017
Attend this webinar to learn how you can determine which threats pose the greatest danger to your ...Read More>>

Good Technology Moves To Lock Down Smartphones

The company's Mobile Defense software lets IT staff remotely manage security on handheld devices; it works with the Windows Mobile Pocket PC, Smartphone, Palm OS, and Symbian platforms.

Good Technology plans to bolster its mobile security product line with new software for wireless security and an agreement to distribute McAfee antivirus software over the air to handheld devices.

Designed for use with Windows Mobile Pocket PC and Smartphone, Palm OS and Symbian platforms, the new Good Mobile Defense software lets IT staff remotely manage security on handheld devices using Good's Secure OTA (over the air) technology. The new software offers advanced encryption, and allows administrators to disable a device after repeated login failures as well as remotely erase data from stolen or lost handhelds. The software also makes it possible to restrict access to certain applications and data ports such as Bluetooth and Wi-Fi, said Dan Rudolph, Good's director of Industry Solutions.

Rudolph said the McAfee partnership resulted from customer and reseller feedback regarding stronger smartphone security. "We've been getting a lot of requests over the past year for the kind of out-of-the-box solution that McAfee provides," he said.

Good Technology's channel partners will be able to distribute McAfee's VirusScan Mobile solution beginning in early 2006, said Rudolph. The software will be pushed out over-the-air from the Goodlink Management Server to smartphones and handheld devices.

Alex Zaltsman, managing director at Exigent, a solution provider in Morristown, N.J., said the combination of Good Mobile Defense and the McAfee anti-virus downloads will make it easier to secure enterprise handhelds. "This gives us the ability to really lock down smartphones, as well as to perform host integrity checks on device," he said. "It also gives us a chance to sell a total security solution to our customers."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll