Good Technology Whitepapers


Sort by: Date | Company | Title


7 must haves for mobile app security
By Good Technology | 20/8/2014

Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity.

Enterprises can begin to realize this potential by allowing use of corporate data in both custom-built and commercially available mobile apps. Mobile workflows resulting from interactions between these apps can be faster and more intuitive than those on a PC. However, the need to always retain control over corporate data should give an enterprise pause before sanctioning the widespread use of sensitive business information on mobile devices.

Download this now


Give all the people what they want (safely)
By Good Technology | 20/8/2014

Face it. Modern workers are addicted to mobile devices. Not just any vanilla corporate-issued devices, but our carefully selected and personalized expressions of ourselves: iPads®, iPhones®, Androids™ and whatever-comes-next. Many of us get to use our devices in the office. According to Gartner, “IT leaders have a positive view of BYOD”1, implying that this is now a mainstream model.

In supporting employee devices, companies tend to exert either very little control, or a stifling amount of control. The approach taken depends on which community has the upper hand: the employees or IT.

Download this now


When mobile device management isn't enough
By Good Technology | 20/8/2014

The explosion of smartphones and tablets in the workplace means that confidential information is now not only spread throughout your organization on servers and desktops, it is also being stored on mobile devices – which are prone to loss or theft – and being transmitted from these mobile devices beyond the control of your organization. It is easy for employees to disseminate – whether accidentally or intentionally – sensitive business data outside the organization with a simple action – e.g., upload employee healthcare records to the public cloud via a cloud storage app.

Download this now


10 Tips for Successful BYOD
By Good Technology | 6/5/2014

No longer is BYOD a disconnected project with a handful of users… In fact, it’s becoming an industry standard. BYOD can deliver improved user productivity, engagement and satisfaction, not to mention cost savings. Get the top 10 best practices for the successful implementation of a BYOD program.

Download this now


eBook: Five Mobile Collaboration Threats Facing All Enterprises
By Good Technology | 13/2/2014

Security and convenience should not be a zero-sum game. Security must not block progress to transform businesses. Likewise, mobile collaboration presents a tremendous opportunity for businesses. Read this paper to understand the five primary threats and how to both address risks and gain process efficiencies through secure mobility.

Download this now


451 Group Research Report MDM Trends
By Good Technology | 13/2/2014

As the BYOD model continues to grow at twice the rate of corporate-owned devices, enterprises are facing an increasingly diversified mobility landscape. And though BYOD brings many benefits, complex management and security challenges are also ushered in. Read this report to understand what MDM can and cannot do for you and which solutions are being chosen today - and tomorrow.

Download this now
[]