Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

JLT selects Good Technology for mobilisation

by The Gurus
March 31, 2015
in Case Studies
Share on FacebookShare on Twitter

JLT, one of the world’s leading providers of insurance, reinsurance and employee benefits has partnered with Good Technology to mobilise it’s workforce.
Seeking a way to modernise productivity tools for its global workforce by enabling employees to work on the mobile devices of their choice, with approximately 9,500 employees worldwide, the company opted for Good Technology.
Due to strict regulations and compliance concerns, the company had previously only offered approved BlackBerry phones for mobile workers. To retrieve, edit and share documents, vital features for executives, sales representatives and other frequently-mobile employees, IT was required to issue heavily encrypted laptops. The new team began to explore solutions that would eliminate that need as well as allow employees to use personal devices to be more productive.
 
JLT found its answer in the Good Mobility Suite of mobile solutions that simplify access to email, calendar, contacts, tasks, instant messaging, browsing and document sharing. Good Mobility Suite also includes unlimited licenses for customers to internally deploy their custom-developed Good-secured apps built on the Good Dynamics Secure Mobility Platform.
Chris Hunter, group service delivery director for JLT, said: “In the past, IT had to deny requests from mobile employees who wanted to use their own devices because of security concerns.
“We liked Good’s approach of securing data, not devices, and its long history with the U.S. federal government reassured us that it would meet our strict security requirements. Good Mobility Suite has become a critical business tool for our increasingly mobile workforce.”
“When it comes to implementing successful BYOD programs and policies, the end goal is to enhance productivity while maintaining or even augmenting the security of data,” said Phil Barnett, vice president of EMEA at Good Technology. “Good enables some of the most regulated organisations in the world to find that sweet spot where workers can use the devices they want to do their jobs while IT maintains control over corporate data being accessed, manipulated and used on a broad range of smartphones and tablets.”
 

Now that JLT has solved its BYOD concerns, the company is focused on further extending secure mobile productivity capabilities to its employees by developing custom apps on the Good Dynamics Platform. Good-secured apps being considered for development would permit employees to accept contracts with one click, or to file contracts directly to the document management system instead of emailing them to an outsourced partner. Enabling a Good-secured mobile workflow will speed up contract processing, lower costs and reduce errors.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Protiviti – Technology baffles risk-confused boards

Next Post

Consumers feel lack of control on personal data

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information