by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 30, 2013
T he advantages of a mobile workforce are many, and so are the risks to security as employees use personal devices from a variety of manufacturers and providers to conduct business. In fact, unsecure mobile devices account for a large percentage of workplace data loss. But multiple problems don't require multiple solutions, which is why AT&T created service that protects organizations with mobile device users. example of AT&T getting ahead of emerging threats and leveraging the power of our network for new security architectures and mechanisms," security technology at the company. "It provides endpoint protection through antivirus and antimalware supporting and implements core mobile device management functions, such as lock, wipe, locate, password policy and encryption policy." Security provides multilayered protection on the device and in the network. state-of-the-art and leading security providers within its service design to enable integration with other AT&T to scale the platform is enabled through carrier-grade methodology in both built the service to handle large capacity and have plans to add more sites as the government customers arise." UNI E AL P O EC ION AC O WI E LINE WI ELE By leveraging the AT&T network and enabling organizations to apply the types of controls and security policies to mobile devices that they would monitoring. Authentication. Access control functions. network to do the heavy lifting in destination policies without draining in addition to enforcing a strong set of perimeter controls, you must also consider that the perimeter has been opened with access from mobile devices that would not be normally permitted. Thus, you need a solution that takes into account the differences between mobile In addition to physically protecting architecture, the company also monitors the people who handle security. "Additionally, support personnel are vetted and have background clearances required to support secure government are the personnel separated, but the platform is isolated in secure nodes, along with a dedicated disaster recovery from any outage that might impact a primary production location." DEDICA ION O ECU I Y company's dedication to continued security innovation. The technology behind the service originated at the is dedicated to creating and implementing a secure future for mobile devices. "AT&T has been focusing on network security for most of our at the forefront of many developments that have become today's network security best practices, including a security governance/policy model, risk management methodologies, defense-in- management and analysis, and security address the challenges of mobile security, AT&T is using our expertise in network security to help protect an organization's assets through wireless access." implifying Mobile Security GameChanger GAME CHANGING ECHNOLOG O MEE AGENC MI ION SPONSORED CONTENT MOBILE APPLICATION SECURITY o learn more about A & Mobile ecurity, please visit www. tt.com/go /protect "A & HA BEEN FOCU ING ON NE WO K ECU I Y FO MO OF OU HI O Y." ---MILE MENDENHALL DI EC O OF ECU I Y ECHNOLOGY A A &
March 15, 2013
April 15, 2013