New App Tool Addresses Buy or Build

— July 08, 2014

According to Forrester Research, 75% of North American information workers using smartphones use mobile email. Now, those organizations are looking for the next phase in mobilizing their businesses. However, this next step in enterprise app adoption hinges on the question "to build or buy?"

While there are many examples of business processes that would require the creation of custom app solutions, there are also opportunities to use ISV-developed apps for greater productivity beyond the basics of mobile email, contacts and calendar.

The new Good Mobile Workflow Builder offers IT shops and lines of business (LOB) the opportunity to define their own mobile workflows supported by existing Good-secured mobile apps, as well as custom-developed apps that can be deployed together.

Utilizing Good-secured third party mobile apps already available to them, organizations can augment existing mobile investments to accelerate productivity, collaboration and engagement for employees, customers or business partners.

"By 2015, four times as many mobile apps will be developed as traditional PC apps today. Before they become overwhelmed by demand, organizations must plan around these new cost models," said Richard Marshall, research director at Gartner.

Workflow Opportunities
The online tool features a workflow gallery, with over 50 business processes being used today across financial services, public sector, healthcare and insurance, as well as supporting sales, field services, team collaboration, business intelligence and more. It also generates a personalized PDF for created workflows, and includes all mobile apps available to support that workflow.

Secure Ecosystem
Good's ISV) ecosystem has over 1,200 Good Dynamics secured apps that enable customers to both enhance collaboration with these secure app-to-app workflows and leverage advanced mobile security features to protect their data.

The company ensures the security of third-party ISV apps by publishing detailed security guidelines, in addition to requiring ISVs to perform testing through an independent lab and verify that their apps comply with their security requirements.

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Who Owns Mobility

Less than one decade ago, smartphones and tablets changed workplace technology—virtually overnight. IT lost "control" and users became decision makers. Is it any wonder we are still trying to figure things out, and that the question of  "who owns mobility" remains? This research examines the current state of mobility in an attempt to answer that question.