by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : April 15, 2013
D D D D DI I I I IG G G G G GI I I I IT T T T TA A A A AL L L L LD D D D DI I I I IA A A A AL L L L LO O O O O OG G G G G GU U U U U UE E E E E LISTEN/LEARN: For a replay of the webcast, go to: fcw.com/MobileResearchWebcast SPONSORED CONTENT with 46 percent citing it, is mobile malware or spyware. Next is compli- ance risks from mobile data access (43 very concerned, 32 somewhat) and then malicious texting or SMS messag- ing (42 very, 19 somewhat). Still, some doubt their current con gurations. According to the study, only 18 percent of federal IT executives surveyed are truly con dent in their agency s approach to mobile security. Thirty-six percent said they re somewhat con dent and 27 percent were neutral. One policy that has gotten signi cant attention is "bring your own device," sector. In place at only 16 percent of federal agencies, it states that employ- ees can use their own devices to access workplace networks. But most agencies -- 53 percent, according to the study -- prohibit use of personal mobile devices to do agency work. The most common practice, at 78 percent of agencies surveyed, is to issue mobile devices to quali ed employees. That approach could back re, how- ever, Golden said. If policy becomes an obstacle to getting work done, em- ployees will nd a way to circumvent it -- a sentiment echoed by 48 percent of survey respondents. And that s problematic because almost half of the survey respondents said they believe employees may not have the proper training or knowledge to use mobile devices within regulatory guidelines. Other approaches to mobile security that agencies currently use include auto-lock procedures (74 percent), password-based user authentication (73 percent) and policies on what employ- ees can access (56 percent). Interest and investigation is growing in the areas of automated employee device provision- ing and de-provisioning (32 percent), wiping agency applica- tions and data from personal mobile devices (36 percent), mobile application management (36 percent), IT departments managing both employee-owned and agency- issued mobile devices (37 percent), and splitting personal and work via a virtual machine (40 percent). Those initiatives aren t foolproof, either, mainly because they focus only on data on the device, not in transit or on the network. Consequently, many federal agencies are using virtual-pri- vate networks (VPNs) to let employees access agency applications via mobile devices. The two common types are Secure Sockets Layer (SSL) and IP Security (IPsec), and which is best de- pends on whether the protocol needs to be connection-oriented or connection- less, Golden said. For example, for data from real-time applications such as voice and video, SSL VPN is better because IT managers can implement it as an IP tunnel for all IP traf c going through or at an applica- tion layer. "It s really, really important to make sure you understand how and for what purposes your users are going to need these devices with these types of VPNs and then which technology deployed in which fashion best suits that to bal- ance both the security and the usability of the VPN technology," Golden said. Another approach to letting employ- ees access enterprise apps is through customized mobile applications, which 33 percent of survey respondents said they have deployed. Others are trying or screen-scraping, which 26 percent of respondents said they use and which Golden said is a good way to protect data because it s not natively stored or processed on the device. you re virtualizing back into a data center either in a cloud or a federal - vide security for untethered devices because fundamentally all you re providing out to the device is pixels to the screen and some man-machine interface, either button tabs or screen touches," he said. Mobile governance in the government Besides racing to keep up with evolving technology and use of it, federal IT man- agers must also make sure their systems meet regulations and mandates. Survey respondents said the rules they most often have to comply with are Federal the tools at hand to do what they need to do in the most efficient and effective means possible." -- Jack Golden, director of the Secure Mobility and Special Communications Group at AT&T Government Solutions
March 30, 2013
April 30, 2013