Mobile
Commentary
6/25/2007
05:18 PM
Stephen Wellman
Stephen Wellman
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Good Gets A Little Web 2.0 With Latest Upgrade

Mobile e-mail solution maker Good Technology today announced the latest version of its mobile business solution, Good Messaging 5. I was able to get a sneak peek of Good 5 a few weeks ago, and it looks like Good is ready for Web 2.0. Or at least moving in that direction.

Mobile e-mail solution maker Good Technology today announced the latest version of its mobile business solution, Good Messaging 5. I was able to get a sneak peek of Good 5 a few weeks ago, and it looks like Good is ready for Web 2.0. Or at least moving in that direction.The first thing that struck me about Good 5 is that it offers a lot more personalization than most push e-mail clients. The latest upgrade gives more than a nod to Web 2.0 (or is that Enterprise 2.0?) with new tools such as an RSS reader and prioritized contacts.

On the messaging front, users can now sort and find e-mail threads by conversation (similar to the way Gmail works) or by sender. This looked cool when I saw it, but I couldn't tell if this newest feature also works with text messages.

You can now edit and send Microsoft Word, Excel, and PowerPoint and Adobe PDF documents through Good Mobile Intranet. This upgrade allows users to also e-mail these edited documents back out.

The latest version of Good also beefs up the calendar, letting users invite attendees to meetings and even book conference rooms.

From the IT point of view, Good's biggest improvement is with device management -- an area that has quickly emerged as the new battleground for mobile business vendors. Here is a look at Good's enhanced device management system:

Mandatory applications: helps set and enforce the installation of mandatory applications like anti-virus checkers to ensure that users have what they need-both to do their jobs and to comply with corporate security policies Application lockdown: blacklists and prevents the launch of unapproved applications Device lockdown: locks down the camera, infra-red (IR), WiFi and/or Bluetooth wireless technology ports; enforces SD card encryption Advanced password management: enables administrators to set granular criteria for password characteristics, restrictions, and expirations Advanced encryption management: provides rules-based enforcement of SD card and database encryption policies Simplified load balancing: enables IT to move users across servers to facilitate load balancing-without the need to re-provision.

This all looked really impressive when the Good guys showed it to me. But I have yet to actually use Good 5 so I cannot say how well it all works. If I get my hands on a review copy, I'll let you what I think.

Comment  | 
Print  | 
More Insights
InformationWeek Elite 100
InformationWeek Elite 100
Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek - July 21, 2014
Our new survey shows fed agencies focusing more on security, as they should, but they're still behind the times with cloud and overall innovation.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.