by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : June 15, 2014
T P Walling the best security software and networking tools available are critical to maintaining mobile security, something is bound to go wrong if users don't know what the rules are. The key is developing an easy-to-understand mobile security policy with strict rules about what is and is not acceptable. At the very least, this policy should: or data on mobile devices. Explain acceptable encryption methods for both data at rest and data in transit. management and mobile application management systems to manage all mobile devices. separate from agency data on the device, and what will happen in case the device is lost or stolen (for example, the device will be automatically wiped clean of agency data but will leave personal data untouched). content stored on the device. usage and settings. G Ch ng GAME CHANGING ECHNOLOG O MEE AGENC MI ION SECURE MOBILITY/ MOBILE WORKFORCE Critical technologies for mobile security he best way to ensure that your agency's data and applications and the devices your workforce uses are secure is by using technology designed for that purpose. he acronyms can get confusing, but each technology serves a slightly di erent purpose and should be evaluated it its own right. Here's a brief rundown: Mobile device management (MDM): For many agencies, this is the first line of defense. MDM aims to secure the entire smartphone or tablet from top by bottom. While features in di erent MDM solutions vary, most can track and inventory mobile devices; provision mobile devices from registration and activation to configuration and patches/updates; distribute software and applications according to permissions set by the organi ation; authenticate users and enforce password policy; remotely wipe devices in case they are lost or stolen; and protect and track sensitive corporate data. Mobile application management (MAM): Here's where it gets confusing. MAM shares some of the features of MDM, but generally provides controls more specific to applications. Most MAM products can securely manage an organi ation's enterprise app store, allowing only authori ed users to download specific apps; wrap applications in security layers and policies that prevent copy/paste or printing; store fully encrypted data without fully encrypting the device; provide security for both data in motion and data in action; disable applications when needed; remotely update application versions and policies; and remotely control management policies. Mobile information management (MIM): his cloud- based service syncs files and documents across devices, making it ideal for mobile employees. MIM solutions focus on provisioning and controlling access to data on both employee- and corporate- owned devices and remove problems associated with disparate platforms. Designed to work with MDM and/ or MAM, there are many secure, corporate-grade MIM solutions that put security fears to rest. SPONSORED REPORT
June 30, 2014
July 15, 2014