by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : February 2015
As agencies grapple with the rapidly evolving universe of mobile devices and applications, they are scrambling to find faster and better ways to determine which devices they will allow on their networks and how best to secure the devices they acquire. From the Pentagon to the FBI to the Department of Agriculture, agencies are getting newer mobile technol- ogy into the hands of their users faster by streamlining acquisition processes and standardizing on fewer mobile platforms. After the devices are selected, agencies are bolting on extra security through containerization tech- nology, mobile device management platforms and appli- cation security services. There is still a ways to go, however, before federal employees have state-of-the-art and secure mobile devices at their disposal. “We’ve always seen mobile technology change, but it’s happening faster than it ever did before. Just think about the fact that the iPad wasn’t even out five years ago,” explained Tom Suder, president of Mobilegov, a Wash- ington, D.C., consultancy. “There is a real business case for agencies to solve the mobility problem.... Agencies are trying, but it’s still taking too long.” Part of the challenge in mobile security is that the devices themselves are so much more personalized and context-driven than PCs, said Bryan Coapstick, direc- tor of mobile innovation for HP Enterprise Services U.S. Public Sector Business. Mobile security: The device decision BY CAROLYN DUFFY MARSAN Agencies are standardizing on fewer mobile platforms, but device security remains a multilayered challenge FocusOn: Mobile SPECIAL PULLOUT SECTION February 2015 FCW.COM 1 DISA’s short list Just a handful of devices have been approved under the DOD Mobility Program Management Office’s new streamlined process. Approved devices include: Apple iOS (8.x) Phones: iPhone 4s, iPhone 5, iPhone 5s, iPhone 6, iPhone 6 Plus Tablets: iPad mini 2, iPad mini 3, iPad mini 4, iPad mini-R, iPad Air Android OS (4.4) Phones: Samsung Galaxy S4, Samsung Galaxy S5, Samsung Galaxy Note 3, Samsung Galaxy Note 4, Samsung Galaxy Note Edge, Samsung Galaxy Alpha Tablets: Samsung Note 10.1 2014 Edition, Samsung Note Pro 12.2, Samsung Galaxy Tab S 10.5 LTE, Samsung Galaxy Tab S 8.4 LTE, Samsung Galaxy Tab Active (All with Knox) Source: Defense Information Systems Agency 0215fcw_010a-010c.indd 1 1/28/15 2:42 PM
March 15, 2015