Good Technology Moves To Lock Down Smartphones - InformationWeek
03:21 PM

Good Technology Moves To Lock Down Smartphones

The company's Mobile Defense software lets IT staff remotely manage security on handheld devices; it works with the Windows Mobile Pocket PC, Smartphone, Palm OS, and Symbian platforms.

Good Technology plans to bolster its mobile security product line with new software for wireless security and an agreement to distribute McAfee antivirus software over the air to handheld devices.

Designed for use with Windows Mobile Pocket PC and Smartphone, Palm OS and Symbian platforms, the new Good Mobile Defense software lets IT staff remotely manage security on handheld devices using Good's Secure OTA (over the air) technology. The new software offers advanced encryption, and allows administrators to disable a device after repeated login failures as well as remotely erase data from stolen or lost handhelds. The software also makes it possible to restrict access to certain applications and data ports such as Bluetooth and Wi-Fi, said Dan Rudolph, Good's director of Industry Solutions.

Rudolph said the McAfee partnership resulted from customer and reseller feedback regarding stronger smartphone security. "We've been getting a lot of requests over the past year for the kind of out-of-the-box solution that McAfee provides," he said.

Good Technology's channel partners will be able to distribute McAfee's VirusScan Mobile solution beginning in early 2006, said Rudolph. The software will be pushed out over-the-air from the Goodlink Management Server to smartphones and handheld devices.

Alex Zaltsman, managing director at Exigent, a solution provider in Morristown, N.J., said the combination of Good Mobile Defense and the McAfee anti-virus downloads will make it easier to secure enterprise handhelds. "This gives us the ability to really lock down smartphones, as well as to perform host integrity checks on device," he said. "It also gives us a chance to sell a total security solution to our customers."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll