Good Technology focuses on secure Android devices
Good Technology has announced that its Android OS-based platform has been certified by the Defense Information Systems Agency (DISA), clearing the way for the use of Good for Government mobile device management and data loss prevention capabilities on the Global Information Grid (GIG).
The new Secure Android solution will enable US Department of Defense (DOD) personnel to sign, encrypt/decrypt e-mail, utilise a secure partition on the Android device for business applications, and securely access Intranet-based content anytime, from anywhere.
According to the company, the secure Android platform leverages Good for Government technology to provide secure access to information stored within a command's enclave and usually only accessed with desktops/laptops, such as command and control programs, as well as access to a number of powerful business applications on Dell devices that allows members of the military to operate with desktop-like capabilities in a protected mobile environment. Employees can also access critical agency resources behind the firewall, such as intranets or other web-enabled applications, through an integrated secure browser.
The work was spurred by the recognition that there was a gap between the things DOD personnel were able to achieve using current approved mobility platforms, and what they wanted to be able to achieve.
According to the company, using Good for Government's mobility suite, the new solution will pass and manage sensitive data from Microsoft Exchange servers located in DoD data centers via Good's email application to end-point Android devices wirelessly, using a FIPS 140-2 validated cryptographic module with AES encryption to ensure data protection for data-at-rest as well as data-in-transit. Good's patented container-based technology prevents data leakage to non-secure applications. The DoD can use Good's Web-based management console to manage Dell Android devices and all other device platforms on the network simultaneously. The management console also allows administrators to block access from potentially compromised devices that may have been rooted by either the end user or a malicious attacker as well as to remotely wipe lost, stolen or retired smartphones to mitigate potential data leakage.
More from Digital Battlespace
-
Australia looks towards space with force restructure, investment and training
Australia is looking to improve its presence in space with a focus on communications and creating a dedicated segment of its defence forces committed to the domain.
-
EID to unveil new vehicle communication system at DSEI
The Portuguese company’s naval communications system is in service across more than a dozen countries. It has turned to its home nation for support in developing a new vehicle based C2 system.
-
Chess Dynamics successfully demonstrates Vision4ce AI-driven tracker
The Vision4ce Deep Embedded Feature Tracking (DEFT) technology software is designed to process video and images by blending traditional computer vision with artificial intelligence (AI) algorithms to present actionable information from complex environments.
-
Wave Relay devices cleared for security use on commercial systems in industry trend
Persistent Systems has been cleared by National Security Agency (NSA) to transmit sensitive data on commercial networks. The devices are added to the NSA’s Commercial Solutions for Classified (CSfC) component list which also includes other companies’ products providing the same security.
-
UK teases cyber spending boost in Strategic Defence Review ahead of “imminent” release
The release of the UK’s Strategic Defence Review (SDR) has been long promised as mid-year. It is possible it could be as early as 2 June although the UK Ministry of Defence (MoD) continues to play its cards close to its chest.
-
Intelsat emphasises SATCOM resilience for SOF in contested domains (video)
Intelsat outlines how its multi-orbit SATCOM architecture is enhancing connectivity and resilience for special operations forces operating in degraded and contested environments.