Welcome!

API Journal Authors: Liz McMillan, Ed Featherston, Scott Allen, ManageEngine IT Matters, Akhil Sahai

News Feed Item

Good Technology Mobility Index Report Highlights Enterprise Mobility Shift from Devices to Applications

Significant growth in Q2 across secure instant messaging, customer relationship management and business intelligence apps signals organizations mobilizing business processes and investing in more mature mobile strategies

SUNNYVALE, Calif., Aug. 12, 2014 /PRNewswire/ -- In its eighth quarterly report, Good Technology™, the leader in secure mobility, today announced key findings from the company's Q2 2014 Good™ Mobility Index Report. This quarter, in addition to continued double digit growth in the number of customer-built applications, there was significant growth in the number of activations in secure instant messaging (IM), customer relationship management (CRM) and business intelligence (BI) apps.

Good Technology logo

A recent Forrester report notes, "In the very near future, technology management professionals must provide access to a host of corporate applications such as CRM, BPM, and HR. This is already evident, as we see more spending shift to software for mobile applications and middleware as well as the necessary management solutions to provision and manage mobile applications. At the end of the day, we may talk about mobile devices, but in reality it's all about the apps."[1]

The data reported in this quarter's Mobility Index Report shows that organizations across Good's diverse customer base are adapting a 'going mobile' approach and leveraging the power of secure enterprise apps to mobilize business processes that have typically lived on the desktop. By deploying secure app-to-app workflows built on the Good Dynamics® Secure Mobility Platform, organizations use Good's connected container technology to help protect their sensitive corporate data within the apps they've chosen, and traveling between them.

"It's more apparent than ever that cross platform enterprise mobility is disrupting legacy desktop and mobile environments," said Christy Wyatt, Chairman and CEO of Good Technology. "We continue to see companies deploying a breadth of devices and a diverse set of applications to drive higher value for their business, across all vertical markets. Most exciting to us is the rapidly-growing segment of customers creating and deploying their own secure enterprise apps, across platforms, to fuel their business needs."

The Good Mobility Index Report was the first of its kind and has been established as the benchmark for transparency in understanding the operating system (OS) and application landscape across the enterprise. The OS breakdown of enterprise app activations shifted this quarter, with Android apps claiming 12 percent of total activations and taking four percentage points of share from iOS. In addition, from a device perspective, Android device activations grew this past quarter, increasing five percentage points to claim 32 percent of total activations.   

[1] Forrester Research, Inc., The State Of Enterprise Mobile Security, Q1 2014: Strategies Shift From Devices To Apps, February 3, 2014.

Additional report findings include:

  • The total number of enterprise app activations continued to see significant double digit growth, increasing 20 percent quarter over quarter.
  • The gap seen in previous quarters in the number of tablet app activations versus smartphone activations significantly closed in Q2, coming in at 58 percent and 42 percent respectively.
  • Government and public sector recorded an increase of five percentage points in total iPad activations.

The quarterly Good Mobility Index Report provides data that identifies the adoption of enterprise applications and device activations from the previous calendar quarter, leveraging insights from the company's vast and diverse customer base using the Good Dynamics® Secure Mobility Platform. The report is an ongoing initiative to track activations across the breadth of mobile platforms and devices and leverages findings from the more than 5,000 Good customers worldwide to highlight global mobility trends and usage patterns. The full report is available to view in PDF.

About the Good Mobility Index Report
The more than 5,000 customers represented in this report include bellwether companies– from Financial Services, Healthcare, Manufacturing, Energy & Utilities, Legal, Government, and High Tech–making this data report a benchmark for mobility adoption. The metrics cited in this report are generated directly from Good's internal data, as aggregated from all devices activated across Good's worldwide customer base.

About Good Technology
Good Technology is the leader in secure mobility, providing the leading secure mobility solution for enterprises and governments worldwide, across all stages of the mobility lifecycle. Good's comprehensive, end-to-end secure mobility solutions portfolio consists of a suite of collaboration applications, a secure mobility platform, mobile device management, unified monitoring, management and analytics and a third-party application and partner ecosystem. Good has more than 5,000 customers in 184 countries, including more than 50 of the FORTUNE 100™ companies. Learn more at www.good.com.

Statements concerning future prospects, business outlook, and product availability and plans are forward looking statements that involve a number of uncertainties and risks. This information is intended to outline our general product direction and it should not be relied upon in making purchasing decisions. It is not a commitment, promise or legal obligation to deliver any material, code or functionality and the development, release and timing of any features or functionality described for our products remains at Good's sole discretion.

© 2014 Good Technology Corporation and its related entities. All use is subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD APPCENTRAL, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD CONNECTED CONTAINER, GOOD SHARE, GOOD TRUST, GOOD VAULT, and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks may be claimed as the property of their respective owners. Good's technology and products are protected by issued and pending U.S. and foreign patents.

iOS and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. Android is a trademark of Google Inc.

Media Contact:
Becki Leonard
Good Technology
Phone: +1 858 524 9443
Email: [email protected]

Karen Reynolds
Good Technology
Phone: + 1 408 400 3202
Email: [email protected]

Logo - http://photos.prnewswire.com/prnh/20120125/AQ41496LOGO-b

SOURCE Good Technology

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
What are the successful IoT innovations from emerging markets? What are the unique challenges and opportunities from these markets? How did the constraints in connectivity among others lead to groundbreaking insights? In her session at @ThingsExpo, Carmen Feliciano, a Principal at AMDG, will answer all these questions and share how you can apply IoT best practices and frameworks from the emerging markets to your own business.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, outlined ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and sto...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Much of IT terminology is often misused and misapplied. Modernization and transformation are two such terms. They are often used interchangeably even though they mean different things and have very different connotations. Indeed, it is somewhat safe to assume that in IT any transformative effort is likely to also have a modernizing effect, and thus, we can see these as levels of improvement efforts. However, many businesses are being led to believe if they don’t transform now they risk becoming ...
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.