According to Forrester Research, 75% of North American information workers using smartphones use mobile email. Now, those organizations are looking for the next phase in mobilizing their businesses. However, this next step in enterprise app adoption hinges on the question "to build or buy?"
While there are many examples of business processes that would require the creation of custom app solutions, there are also opportunities to use ISV-developed apps for greater productivity beyond the basics of mobile email, contacts and calendar.
The new Good Mobile Workflow Builder offers IT shops and lines of business (LOB) the opportunity to define their own mobile workflows supported by existing Good-secured mobile apps, as well as custom-developed apps that can be deployed together.
Utilizing Good-secured third party mobile apps already available to them, organizations can augment existing mobile investments to accelerate productivity, collaboration and engagement for employees, customers or business partners.
"By 2015, four times as many mobile apps will be developed as traditional PC apps today. Before they become overwhelmed by demand, organizations must plan around these new cost models," said Richard Marshall, research director at Gartner.
The online tool features a workflow gallery, with over 50 business processes being used today across financial services, public sector, healthcare and insurance, as well as supporting sales, field services, team collaboration, business intelligence and more. It also generates a personalized PDF for created workflows, and includes all mobile apps available to support that workflow.
Good's ISV) ecosystem has over 1,200 Good Dynamics secured apps that enable customers to both enhance collaboration with these secure app-to-app workflows and leverage advanced mobile security features to protect their data.
The company ensures the security of third-party ISV apps by publishing detailed security guidelines, in addition to requiring ISVs to perform testing through an independent lab and verify that their apps comply with their security requirements.