Good Vault launches two-factor authentication for iPhones
iPhones would use sleeves to read smart cards and microSD cards
Computerworld - Good Technology announced Good Vault, a system for adding two-factor authentication to the iPhone 4 and 4S for access to Good for Enterprise email.
The system will be especially valuable for government agencies and companies in highly regulated industries, such as healthcare and financial services, where it's critical to ensure that data is protected from unauthorized users if an employee's smartphone is lost or stolen, said Good Technology CTO Nicko van Someren.
With the Vault system, one of two sleeves is attached to the iPhone: One that can read a smart card or one that can read a microSD card, he said. Once either of the sleeves is in place, inserting the microSD or smart card becomes one component of the two-factor identification process, while typing in a PIN is the second. Once authenticated, users would have access to Good for Enterprise email.
If a phone is lost or stolen while the microSD or smart card is inserted in the sleeve, the PIN would still be needed for access to Good for Enterprise email. Good's management software supports remote wipes of data from smartphones.
The Good Vault iPhone application will be available for download in Apple's App Store (pricing has not been announced), but end users cannot use it unless they are licensed for Good for Enterprise and Good Vault.
Precise Biometrics developed Vault's smart-card reader, a sleeve for the iPhone that weighs just 1.5 oz. The microSD reader was developed by HID Identity Assurance. A user's identity credentials and encryption keys would be embedded in the Secure Element chip in the smart card or microSD.
While smart-card readers and microSD readers are already on the market, they are generally stand-alone offerings and are considered cumbersome to use, Good officials said.
Good Vault is the first offering in Good's new line of Good Trust security products for identity and access management.
Good has more than 4,000 enterprise customers; Gartner and other analyst firms consider it to be one of the leading vendors of mobile device management systems.
Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen, or subscribe to Matt's RSS feed. His email address is firstname.lastname@example.org.
Read more about Mobile Device Management in Computerworld's Mobile Device Management Topic Center.
- Assessing ROI for Mobile Acceleration Clients This EMA® paper examines the business case for deploying mobile WAN optimization client software and builds a ROI model based on the experiences...
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!