Mobile employee uses enterprise apps to work at a conference

Mobile Workflow Builder assembles apps into business processes

Good Technology announced its Mobile Workflow Builder, a tool that allows IT managers to select mobile enterprise apps and combine them into business processes to better manage their users’ mobile work experience.

“Regardless of where a customer sits on the mobile maturity curve, there is no question that deploying secure enterprise mobile apps beyond email can deliver significant value quickly and cost-effectively,” said Matt Sturges, vice president of Good Dynamics ecosystem at Good Technology.

“By leveraging tools like the Good Mobile Workflow Builder, customers can easily define the business processes they want to mobilize with the confidence that the mobile investments they are making will foster productivity and protect their corporate assets, while also driving efficiencies and business value.”

The Good Mobile Workflow Builder lets IT shops define mobile workflows that are supported by a wide array of existing Good-secured mobile apps, as well as custom-developed apps that can be deployed together.

If, for example, a mobile user wants to take notes and pictures at a conference, the workflow would comprise five tasks supported by 18 apps. The tasks would include taking the picture, retrieving the image from the mobile device, annotating the file, saving the image and annotation to the mobile device and finally forwarding the complete file via email.  Each workflow step would be supported by a specific app.

There are over 1,200 Good Dynamics-secured applications for customers to choose from, and organizations can augment any existing mobile investments they’ve already made to accelerate productivity, collaboration and engagement for employees, customers or business partners, the company said.

The Good Mobile Workflow Builder also features a workflow gallery, showcasing over 50 of the most popular business processes being used today across government, financial services, healthcare, and insurance sectors. The online tool also generates a personalized PDF for created workflows for reference, and includes all mobile apps available to support that workflow.

About the Author

Connect with the GCN staff on Twitter @GCNtech.


  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

  • Marines on patrol (US Marines)

    Using AVs to tell friend from foe

    The Defense Advanced Research Projects Agency is looking for ways autonomous vehicles can make it easier for commanders to detect and track threats among civilians in complex urban environments without escalating tensions.

Stay Connected