by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2016
federal agencies face a delicate balance when it comes to managing their network of mobile devices. They must provide field workers and anyone using a mobile device with sufficient access in order to do their jobs and meet mission requirements. They must also ensure the devices are sufficiently secure—which is a significant challenge considering the potentially sensitive nature of data agency workers may be accessing and the constantly evolving threat landscape. Balancing the need for security while maintaining productivity is a challenge, but the tools are there to help ease the process. “There are technologies that harden the device and provide the necessary certifications all the way from the hardware to the application layer— the part of device the user sees—while keeping simplicity of device use,” says Johnny Overcast, director of government sales for Samsung Electronics America. “We provide defense grade security while at the same time maintaining usability.” The impact of not equipping the workforce with mobile devices can almost outweigh the potential security risks, depending on the use cases. Studies corroborate that equipping a workforce with mobile devices increases productivity and worker satisfaction. A recent study conduct by the Mobile Work Exchange surveyed 300 government employees from a number of different federal agencies. The survey found 95 percent of the respondents believe using mobile devices has improved their work performance. Some of the notable survey findings include: 76 percent indicate using mobile devices has increased their productivity 61 percent believe using mobile devices improves communication 47 percent believe using mobile devices improves collaboration 62 percent believe using mobile devices improves helps improve customer service 58 percent feel their agency could make better use of mobile devices “Government agencies are taking advantage of these technologies,” says Overcast. “They can have confidence in the level of security, but also execute their mission more efficiently with line of business solutions.” While deploying mobile devices for use in federal agency scenarios is always a balancing act, the current level of security provided by commercial solutions like Samsung provides secure access, while continuing to enable productivity improvements. “It doesn’t sacrifice usability, whether its tactical military or law enforcement or mobilizing enterprise apps,” he says. “The workforce can use these devices to increase productivity and efficiency.” Studies have even shown that not providing access to mobile devices can have a negative effect on worker productivity. According to a recent Gallup survey, each disengaged or disconnected employee costs an organization about $3,400 for every $10,000 in annual salary. Another study by the Economist Intelligence Unit (EIU) revealed a demonstrable connection between a mobile enabled workforce and increased employee engagement. The EIU surveyed 1,865 workers from across the globe and found organizations ranked as mobile “pioneers” saw a 16 percent boost in productivity. That statistic has concrete impact. In a 40- hour work week, a 16 percent increase in productivity translates to 6.4 hours per week. That’s 41 working days or effectively eight weeks of increased productivity from every employee. SeCuRITy fRoM THe GRouND up Mobile security will always be an issue, but security technologies have kept pace with the evolving landscape of cyberthreats. The Samsung Knox architecture is designed to provide security at all levels. Security functions are built into the hardware and the device software. “Samsung Knox secures all the way from the hardware or from when device turns on—the boot process—all the way up through the application layer,” says Overcast. Boot Time Inspection ensures the integrity of all booting components is tested every time someone activates the device. Run Time Protection prevents malicious users from making any code changes to the kernel and ensures the integrity of data stored on the device. The security functions of the Samsung Knox architecture are built around five principles: Software integrity Least privilege Data storage protection Network protection Data isolation In fact, Samsung Knox was given the most “Strong” ratings of any mobile security platform in the April 2016 Gartner research report, “Mobile Device Security: A Comparison of Platforms.” Also Samsung’s federal customer base includes the DoD, intelligence agencies, and all levels of law enforcement, from federal to state and local. So in the balancing act of continuing to enable the federal workforce with mobile devices, the security posture is solid and the productivity enhancements are proven. Mobile Devices Drive productivity GameChanger Game ChanGinG TeChnoloGy To meeT aGenCy missions SponSored content Mobility For more information, please visit: samsung.com/government In addressing the ongoing balance of access and security, mobile devices have found their place.
August 30, 2016
September 30, 2016