by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : April 15, 2013
Information Processing Standard 140-2 for encryption (74 percent), National Institute of Standards and Technology Mobile Security Standards (65 percent), FIPS 201 Personal Identi cation (63 percent) and Trusted Internet Connec- tions compliance (56 percent). "What s really needed is a consistent set of policies that provide guidance on the implementation as well as the enforcement that s really needed," Golden said. "All of those policies have to be adjusted to accommodate this new access methodology of untethered ac- cess that may or may not be going to a physical government data center. It may be going to a government cloud." A holistic approach The tendency when it comes to mobile security is to focus on the device, and that s dangerous, Golden said. The key is looking at the entire ecosystem, including the: "There are several reasons not to just try to do everything on the device," Golden said. "To start with, almost by de nition if you re trying to enforce all of your management policies and all of your security policies on the device, it s going to be reactive. It can t be proactive, be- cause you ve got to have a way of having that instantiated already on the device." That makes it hard to address zero- day attacks, new threat vectors, new botnets and new malware, he added. Security policies that worked for desktops and even laptops might not apply to mobile. First, Golden said, devices are unpredictable: "Are they on your carrier or roaming on another? Are they static or moving 60 mph down the road or 500 mph across the country in an aircraft? Are they coming in through a4Gora3GoranLTEorthroughWi- Fi or on your campus Wi-Fi? "On top of that, the pace of change in this environment is just unprecedented, whether we re talking about the de- vices, the capabilities on the devices, the radio access network, the packet core networks, the services that are being provided," he said, adding that the rst iPhone came out only six years ago. "The entire world has shifted in the last six years, and it s been a bigger and faster shift than even the Internet revolution was when we went through that in the 90s." Commercial help The private sector is moving faster than the public sector, and agencies should take advantage of that, using commer- cial technology to the maximum extent possible in setting up security plans, Golden said. "There is so much investment, quick change and innovation in untethered devices happening in the commercial sector that government off-the-shelf de- velopment is unable to keep up," he said. AT&T Mobile Security is one such commercial solution. The IP-based service can be procured in the cloud from a service provider and includes network-based, carrier-grade protection even for non-AT&T wireless custom- ers. It works by securing four areas: the device, data in transit, network-based policy, and cloud and enterprise. AT&T Mobile Security can be downloaded to mobile devices to pro- tect their connections to the Internet; it integrates device-level security features with network-based security controls and encrypted transport for a comprehensive solution; and it offers botnet, anti-virus, anti-malware and malicious application mitigation to help enforce your security policies. The bottom-line approach, Golden said, is knowing what will work best for your particular environment. "You ve really got to be able to understand your user mission require- ments and how they re evolving: How are the people using these untethered devices using them to do their jobs day in and day out? That s a moving target as people gure out what works for them," he said. SPONSORED CONTENT KEYS TO SUCCESSFUL MOBILE SECURITY into the enterprise. Source: Jack Golden, AT&T Government Solutions For more from AT&T, go to: www.att.com/gov/protect go to: www.juniper.net D D D D DI I I I IG G G G G GI I I I IT T T T TA A A A AL L L L LD D D D DI I I I IA A A A AL L L L LO O O O O OG G G G G GU U U U U UE E E E E
March 30, 2013
April 30, 2013