Issue #2003 - 04
INFRASTRUCTURE, PRODUCTS & SERVICES
Good's GoodLink Offers Secure Messaging
Recently-upgraded version of Good Technology's GoodLink
system version 1.5 consists of GoodLink Server implemented in Windows
(NT or Windows 2000) environment), GoodLink application
software and its proprietary handheld - the G100 wireless handheld. GoodLink
supports RIM's Blackberry, as well. These components provide
always-on two-way wireless synchronization between users' e-mail client and the handheld.GoodLink Server
that provides compression and encryption functionality. The messages
are sent to the company's GoodLink Operation Center using SSL (Secure Sockets Layer) encryption. The GoodLink Operation Center
then routes the messages to mobile users' handhelds via the Cingular Wireless Mobitex network.
Deployed behind the corporate
firewall, GoodLink Server integrates with Microsoft Exchange Server®
to provide a secure and highly-reliable wireless connection with
users outside the firewall.
For more information: http://www.good.com
MobileInfo Comments and Advisory: GoodLink
is fast encroaching upon RIM's territory. It is not got there but
moving steadily towards that goal. Predictably, Good has got into
trouble with RIM's lawyers - litigation continues.
We would suggest that customers
should evaluate Good's technology if it meets their basic functional
requirements (e-mail only to start with), cost objectives (perhaps
less expensive than the leader (RIM), current messaging system they
employ (Microsoft Exchange only, at this stage) and security (less
secure than RIM). But they must do it consciously and deliberately
after comparing it with RIM's offering.
Note: This news release may contain
forward-looking statements within the meaning of section 27A of the
Securities Act of 1933 and section 21E of Securities Exchange act of
1934 in USA. Similar provisions exist in other countries. There is no
assurance that the stipulated plans of vendors will be implemented.
MobileInfo does not warrant the authenticity of the information.
Readers should take appropriate caution in developing plans utilizing
these products, services and technology architectures. All
trademarks used in this summary are the property of their respective