Good Vault launches two-factor authentication for iPhones
iPhones would use sleeves to read smart cards and microSD cards
Computerworld - Good Technology announced Good Vault, a system for adding two-factor authentication to the iPhone 4 and 4S for access to Good for Enterprise email.
The system will be especially valuable for government agencies and companies in highly regulated industries, such as healthcare and financial services, where it's critical to ensure that data is protected from unauthorized users if an employee's smartphone is lost or stolen, said Good Technology CTO Nicko van Someren.
With the Vault system, one of two sleeves is attached to the iPhone: One that can read a smart card or one that can read a microSD card, he said. Once either of the sleeves is in place, inserting the microSD or smart card becomes one component of the two-factor identification process, while typing in a PIN is the second. Once authenticated, users would have access to Good for Enterprise email.
If a phone is lost or stolen while the microSD or smart card is inserted in the sleeve, the PIN would still be needed for access to Good for Enterprise email. Good's management software supports remote wipes of data from smartphones.
The Good Vault iPhone application will be available for download in Apple's App Store (pricing has not been announced), but end users cannot use it unless they are licensed for Good for Enterprise and Good Vault.
Precise Biometrics developed Vault's smart-card reader, a sleeve for the iPhone that weighs just 1.5 oz. The microSD reader was developed by HID Identity Assurance. A user's identity credentials and encryption keys would be embedded in the Secure Element chip in the smart card or microSD.
While smart-card readers and microSD readers are already on the market, they are generally stand-alone offerings and are considered cumbersome to use, Good officials said.
Good Vault is the first offering in Good's new line of Good Trust security products for identity and access management.
Good has more than 4,000 enterprise customers; Gartner and other analyst firms consider it to be one of the leading vendors of mobile device management systems.
Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen, or subscribe to Matt's RSS feed. His email address is email@example.com.
Read more about Mobile Device Management in Computerworld's Mobile Device Management Topic Center.
- Three Best Practices to Help Enterprises Overcome BYOD Challenges The new Bring-Your-Own-Device (BYOD) environment presents challenges for IT managers and business leaders. This paper discusses how IT managers can address those challenges,...
- 3 Keys to Secure BYOD Deployment The new Bring-Your-Own-Device (BYOD) environment presents challenges for IT managers and business leaders. This paper discusses how IT managers can address those challenges,...
- Developing a Winning Mobile Strategy: Playing Offense vs Defense Don't lose time and money with a "throw an app against a wall to see if sticks" approach to mobile. You need a...
- BYOP: How Mobile and Social Are Creating New User Personas The digital world of mobile + social creates new customer segments and behaviors. Companies need to reorient their customer interactions around these segments...
- Client Management: Simplifying Life for System Admins Watch this brief webinar to hear how implementing a client management strategy not only overcomes common Apple-ization challenges related to data protection &...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Mobile Device Management White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!