Good Gets A Little Web 2.0 With Latest Upgrade - InformationWeek
IoT
IoT
Mobile
Commentary
6/25/2007
05:18 PM
Stephen Wellman
Stephen Wellman
Commentary
50%
50%

Good Gets A Little Web 2.0 With Latest Upgrade

Mobile e-mail solution maker Good Technology today announced the latest version of its mobile business solution, Good Messaging 5. I was able to get a sneak peek of Good 5 a few weeks ago, and it looks like Good is ready for Web 2.0. Or at least moving in that direction.

Mobile e-mail solution maker Good Technology today announced the latest version of its mobile business solution, Good Messaging 5. I was able to get a sneak peek of Good 5 a few weeks ago, and it looks like Good is ready for Web 2.0. Or at least moving in that direction.The first thing that struck me about Good 5 is that it offers a lot more personalization than most push e-mail clients. The latest upgrade gives more than a nod to Web 2.0 (or is that Enterprise 2.0?) with new tools such as an RSS reader and prioritized contacts.

On the messaging front, users can now sort and find e-mail threads by conversation (similar to the way Gmail works) or by sender. This looked cool when I saw it, but I couldn't tell if this newest feature also works with text messages.

You can now edit and send Microsoft Word, Excel, and PowerPoint and Adobe PDF documents through Good Mobile Intranet. This upgrade allows users to also e-mail these edited documents back out.

The latest version of Good also beefs up the calendar, letting users invite attendees to meetings and even book conference rooms.

From the IT point of view, Good's biggest improvement is with device management -- an area that has quickly emerged as the new battleground for mobile business vendors. Here is a look at Good's enhanced device management system:

Mandatory applications: helps set and enforce the installation of mandatory applications like anti-virus checkers to ensure that users have what they need-both to do their jobs and to comply with corporate security policies Application lockdown: blacklists and prevents the launch of unapproved applications Device lockdown: locks down the camera, infra-red (IR), WiFi and/or Bluetooth wireless technology ports; enforces SD card encryption Advanced password management: enables administrators to set granular criteria for password characteristics, restrictions, and expirations Advanced encryption management: provides rules-based enforcement of SD card and database encryption policies Simplified load balancing: enables IT to move users across servers to facilitate load balancing-without the need to re-provision.

This all looked really impressive when the Good guys showed it to me. But I have yet to actually use Good 5 so I cannot say how well it all works. If I get my hands on a review copy, I'll let you what I think.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll