by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : January 2013
10 January 2013 FCW.COM January can be a dif cult month for systems administrators as employees bring their shiny new phones, tablet PCs, laptops and other mobile devices to work. That can lead to security challenges and heavier network traf c. Sanjay Castelino, vice president and market leader at IT management company SolarWinds, offered a few tips to help administrators cope. 1. Prioritize network traf c. Agencies can treat mobile devices as guests on the network and x bandwidth so they do not have a negative impact on critical services. 2. Limit access. It s not practical for mobile devices to access everything, so decide which information is essential and move common applications to the Web. 3. Be proactive with IP address management. Castelino said many organizations still use spreadsheets to manage IP addresses, which can lead to situations in which two devices are using the same IP address. The result is random network failures. Make sure your organization has the right tools in place to prevent those kinds of problems. 4. Determine the help desk s responsibility. If your organization does not already have a help desk policy in place, it should institute one now because requests for IT support increase when users bring their own devices to work, Castelino said. --- Frank Konkel Post-holiday BYOD tips for agencies Agencies seeking a cloud services provider certi ed under the Federal Risk and Authorization Management Program have had exactly one option. But the General Services Administra- tion has 80 companies in the pipeline, and experts say agencies will have a sizable pool to choose from by the time the accreditations become a baseline requirement for security. Experts anticipating having 10 to 15 accredited companies by the end of 2013 and double that number by the end of 2014, when the FedRAMP secu- rity accreditations become mandatory. "You have, in effect, a two-year runway" to develop a wide pool of accredited companies that can meet the FedRAMP requirements, said Kevin Jackson, vice president and general manager of cloud and cybersecurity provider NJVC. "The FedRAMP repository could hold over 200 certi ed [cloud service providers] over the next 24 months if the momentum continues to increase," said Tom McAndrew, an executive vice president at Coal re Systems, an inde- pendent IT governance and compliance rm. One expert, however, warned that agencies could face bid protests if the FedRAMP requirement is included in requests for proposals too soon. "Com- panies that are awaiting their accredi- tation will be at a competitive disad- vantage through no fault of their own," said David Bodenheimer, a partner at Crowell and Moring law rm. The accreditation board, which is composed of the CIOs from GSA and the departments of Defense and Home- land Security, faces a potential bottle- neck of applications. But FedRAMP of - cials anticipated that possibility, "and that is why they offer multiple ways of getting into the FedRAMP reposi- tory outside of the Joint Authorization Board," McAndrew said, referring to third-party assessment organizations. FedRAMP is a standardized approach to cloud security authoriza- tion and monitoring, which eliminates the need for agencies to conduct their own security assessments. It can also help agencies adopt new IT capabilities more quickly. "The FedRAMP provisional autho- rization process sets a rigorous cer- tification and accreditation bar for cloud service providers," said Dave McClure, associate administrator of GSA s Of ce of Citizen Services and Innovative Technologies. In the future, there will still be breaches and security issues, but agen- cies can learn from them and develop more secure requirements, McAndrew said. "We aren t creating perfection, just raising the minimum bar across the industry," he said. --- Matthew Weigelt FedRAMP seeks to expand pool of certi ed providers @Be part of the conversation: Follow @FCWNow on Twitter. of feds using smart phones at work are using their own, the Telework Exchange found. Yet just 11% said their agency has a BYOD policy. 55% Trending