, April 3, 2013 /PRNewswire/ -- Good Technology™, the leader in secure enterprise mobility, today announced support for the Air Force mobile device rollout, deploying an initial operational capability based on Good for Enterprise™, which allows airmen to access their personal applications, while keeping official Air Force data separate and secure using a container approach.
"Security must come first," notes
William E. Marion II
, Chief Technology Officer, U.S. Air Force Space Command. "We want to deliver the tools needed to enhance mission productivity and operational capabilities through our IT infrastructure. Empowering Airmen with the right mission tools, regardless of location, is critical."
With this approach, Air Force personnel can comply with all Department of Defense (DOD) guidelines for mobile device security, while using the Apple™ operating system and Android™ tools to access email, calendar, contacts, documents, and certain applications.
"Users want choices, and IT needs control," says
, Vice President, Worldwide Public Sector, Good Technology. "Our mission is to deliver both, supporting real transformation and new, critical efficiencies while providing savings to the tax payer.
This step is part of a multi-phased program to ramp up Air Force mobile capabilities, and is focused on delivering approximately 10,000 devices, including smartphones and tablets. During the initial phase, which took place over the past year, Good Technology supported the Air Force Space Command's mobile solutions for smartphone and tablet program.
Official data is encrypted and secured at all times, even when the device is used for personal applications (e.g., Facebook and Twitter, in compliance with DOD's social media policies). This solution maintains the separation of an airman's personal and official data.
Good for Enterprise is a secure mobile email and collaboration suite that enables access to email, documents, contacts, calendar, tasks, and the Intranet, securely, from any device. Good for Enterprise includes integrated device and application management, arming administrators with the ability to enforce security policies (including password requirements and jailbreak/rooted device detection) and manage secure third-party and internally-developed applications. The Air Force can also track devices or wipe data remotely from the device at the application level, quickly and comprehensively.