by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 15, 2016
March 15, 2016 FCW.COM 25 Unfortunately, Glancey said, mobile device manage- ment systems typically lack the fine-grained controls that government agencies need. “MDM vendors can only control the things that device manufacturers let them control,” he said. “For example, you might not want doctors to text out patient informa- tion, but you do want them to be able to text. So that’s a problem. Agencies have a hard time finding a system that can solve all their problems.” Mobile security’s future Some agencies are starting to look at mobile security from a different direction and focusing more on securing their mobile applications rather than the devices themselves. For example, VASCO Data Security’s e-SignLive applica- tion allows government employees to approve documents via their mobile devices. For example, 1.6 million U.S. Army personnel use the system to sign human resources forms. “We have mobile-optimized signing” that includes encryption and smart card support, said Carolyne Moran, e-SignLive’s senior product manager. “And we validate if the devices are jailbroken. If the devices are jailbroken, we do not allow the signing to happen.” In addition, the top-down approach to technology deployment is on the way out. “It hasn’t happened before, but consumerism is going to drive what the federal gov- ernment offers,” Robinson said. “Whatever Samsung puts out, whatever Apple puts out — that is going to drive what happens in the federal government.” But there are no easy answers, he added. “We are in a continuous game of cat and mouse,” Rob- inson said. “I don’t think we’re in a spot anymore where IT and security people can just say no. Mobile devices certainly aren’t going to go away. We have to tread care- fully, but our users are already moving in that space faster than we are.” On the positive side, smartphones do have some useful security features, said David Belchick, vice president of government solutions at Entrust Datacard. Built-in thumb- print readers, voice and eye scanners, handwriting pattern recognition and other biometric tools make the phones great multifactor authentication devices. Belchick added that mobile devices allow physical access cards to be virtualized, a service that Entrust has been offering for several years. In other words, smart- phones can allow authorized employees to enter secure areas, turn on their personal computers or log into secure websites and applications. “You don’t have to carry around a card reader,” he said. “This basically digitizes the card so the employee can digitally sign an email or encrypt or decrypt an email. It allows for a much stronger security posture. It allows mobile employees to access and do the functions that they can do on their desktop with a comparable level of security.” n Mobile malware 18% of federal employees with smartphones (personal or government-issued) report encountering malicious software (or malware) What types of devices were they using? 40 30 20 10 0 19% Android 14% iOS 35% Government-issued devices 49% of federal employees still don’t have a security app or solution installed on the mobile device they use or bring to work Source: Lookout survey of federal employees 031516fcw_022-025.indd 25 2/24/16 1:19 PM
March 30, 2016