LLMpediaThe first transparent, open encyclopedia generated by LLMs

Good Technology

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: MobileIron Hop 5
Expansion Funnel Raw 56 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted56
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
Good Technology
NameGood Technology
IndustryMobile security, Enterprise software
Founded1996
FounderEthertronics
FateAcquired by BlackBerry Limited (2015)
HeadquartersSunnyvale, California
ProductsMobile device management, Secure email, Enterprise mobility management
Employees500–1000 (peak)

Good Technology was a company specializing in enterprise mobile security and productivity software. It developed solutions for securing mobile devices, managing mobile data, and enabling secure collaboration for corporate and government clients. Its technologies were adopted by organizations across sectors including finance, healthcare, and defense, and it became notable for litigation and acquisition activity involving major technology firms.

Definition and Principles

Good Technology referred to a suite of enterprise mobility management (EMM) and mobile security products designed to protect Microsoft Exchange, IBM Lotus Notes, and other enterprise messaging systems on smartphones and tablets. The core principles included encryption of data at rest and in transit, containerization of corporate data within personal devices, policy-driven access controls compatible with FIPS 140-2 standards, and integration with directory services such as Active Directory and LDAP. The architecture emphasized per-application VPNs, secure sync with backend systems like Oracle Database and SAP ERP, and compliance reporting for regulators such as HIPAA and Sarbanes–Oxley Act auditors.

Historical Development

Founded in the late 1990s, Good Technology evolved alongside platforms like BlackBerry, Palm OS, Windows Mobile, Android (operating system), and iOS as smartphone adoption accelerated. The company competed with firms including MobileIron, AirWatch (VMware), and Citrix Systems in the enterprise mobility market. High-profile legal disputes involved Apple Inc. and resulted in patent litigation and licensing negotiations. Strategic moves culminated in acquisition by BlackBerry Limited in 2015, during a period when consolidation in the EMM industry followed deals such as VMware's acquisition of AirWatch and Microsoft's acquisition of Intune expansions.

Applications and Examples

Good Technology products were deployed in industries regulated by U.S. Department of Health and Human Services, Securities and Exchange Commission, and Department of Defense rules. Examples included secure mobile email deployments for banks like JPMorgan Chase and asset managers subject to FINRA oversight, secure document access for hospitals using Epic Systems electronic health records, and controlled field communications for contractors working with Northrop Grumman and Lockheed Martin. Integration scenarios encompassed mobile access to Salesforce CRM, synchronization with SharePoint portals, and containerized collaboration with Box (company) and Dropbox (service) competitors in enterprise contexts.

Ethical and Societal Impacts

Adoption of Good Technology's solutions intersected with privacy debates involving Edward Snowden disclosures, surveillance concerns tied to National Security Agency programs, and workplace monitoring controversies involving firms like Uber Technologies and Amazon (company). The balancing act between corporate security policies enforced by tools and employee privacy rights invoked laws such as General Data Protection Regulation in the European Union and California Consumer Privacy Act state-level rules. Deployment by public-sector agencies raised questions about transparency under Freedom of Information Act requests and lawful access by law enforcement under statutes like the Stored Communications Act.

Governance, Standards, and Policy

Good Technology conformed to standards promulgated by organizations such as National Institute of Standards and Technology, Internet Engineering Task Force, and International Organization for Standardization. Certifications and compliance mappings addressed FIPS 140-2 cryptography requirements and Common Criteria evaluations for government procurement. Policy frameworks for acceptable use and bring-your-own-device (BYOD) programs drew on guidance from entities like Gartner and Forrester Research, and procurement decisions were influenced by federal acquisition regulations administered by General Services Administration contracting officers.

Criticisms and Debates

Critics argued that technologies like those produced limited employee autonomy and facilitated employer surveillance, drawing scrutiny from civil liberties organizations such as the ACLU and advocacy groups active around the Electronic Frontier Foundation. Technical debates focused on efficacy of containerization versus platform-level security offered by vendors like Apple Inc. and Google LLC, and on interoperability with legacy systems maintained by IBM. Legal challenges and patent disputes involved parties including Research In Motion and influenced broader industry consolidation and standards for intellectual property enforcement in the software sector.

Category:Mobile security companies Category:Enterprise software