Mobile e-mail solution maker Good Technology today announced the latest version of its mobile business solution, Good Messaging 5. I was able to get a sneak peek of Good 5 a few weeks ago, and it looks like Good is ready for Web 2.0. Or at least moving in that direction.
Mobile e-mail solution maker Good Technology today announced the latest version of its mobile business solution, Good Messaging 5. I was able to get a sneak peek of Good 5 a few weeks ago, and it looks like Good is ready for Web 2.0. Or at least moving in that direction.The first thing that struck me about Good 5 is that it offers a lot more personalization than most push e-mail clients. The latest upgrade gives more than a nod to Web 2.0 (or is that Enterprise 2.0?) with new tools such as an RSS reader and prioritized contacts.
On the messaging front, users can now sort and find e-mail threads by conversation (similar to the way Gmail works) or by sender. This looked cool when I saw it, but I couldn't tell if this newest feature also works with text messages.
You can now edit and send Microsoft Word, Excel, and PowerPoint and Adobe PDF documents through Good Mobile Intranet. This upgrade allows users to also e-mail these edited documents back out.
The latest version of Good also beefs up the calendar, letting users invite attendees to meetings and even book conference rooms.
Mandatory applications: helps set and enforce the installation of mandatory applications like anti-virus checkers to ensure that users have what they need-both to do their jobs and to comply with corporate security policies Application lockdown: blacklists and prevents the launch of unapproved applications Device lockdown: locks down the camera, infra-red (IR), WiFi and/or Bluetooth wireless technology ports; enforces SD card encryption Advanced password management: enables administrators to set granular criteria for password characteristics, restrictions, and expirations Advanced encryption management: provides rules-based enforcement of SD card and database encryption policies Simplified load balancing: enables IT to move users across servers to facilitate load balancing-without the need to re-provision.
This all looked really impressive when the Good guys showed it to me. But I have yet to actually use Good 5 so I cannot say how well it all works. If I get my hands on a review copy, I'll let you what I think.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.