by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : June 30, 2014
Commentary | TIM WILLIAMS TIM WILLIAMS is director of product management at Absolute Software. Mobile devices, the near-ubiquity of wireless networks and cloud-based business applications have cultivat- ed an enterprise mobility trend that is changing the way people work and affecting IT at all organizations, including government agencies. A desktop computer and a mobile phone do not serve the needs of the always-on workforce of today. The balance of power has shifted from IT toward the end user, who demands mobility, choice and the option to bring his or her own device. That shift has given rise to a wide range of devices --- laptops, tablets and smartphones --- con- necting to government networks. In the eye of the mobility storm, the agency IT department faces a major challenge: to strike a balance between data security and control on one side and end-user exibility and productivity on the other. Data security is imperative, especially in the government, where devices are more likely to contain highly con - dential, regulated or classi ed data. Organizations that successfully enable and manage mobility follow three key rules: 1. Manage the user, not the device. In the past, the IT depart- ment could dictate the type of equipment an employee could use, thereby maintaining control over the device and the endpoint and ensuring that security measures were enforced. Today, users expect the same network and data access on all devices, and without that exibility, productivity is impeded. On the ip side, agencies must ensure that access to data is appro- priately permitted or restricted for each user, regardless of the device used to access it. By managing user pro les rather than devices, the IT department can consider the needs, rights and permissions of users and build a template to support their produc- tivity. And agencies can provide users with the exibility to use a device of their choice while ensur- ing that data security is not compromised. 2. Implement and enforce a mobile-use policy. Many users believe that data security is not their responsibility. Therefore, effective mobility management is supported by a policy that clearly de nes what is expected of end users. The policy should outline employee accountability and the penalties that can be incurred if the agreement is breached. If employ- ees are allowed to bring their own devices, the policy should clearly state the steps the IT department can take to avoid data breaches if the device is lost or stolen, if the employee leaves the organization or if a suspected security threat occurs. 3. Maintain a persistent con- nection to the devices. Satisfying users and establishing policies are fruitless if the IT department can- not maintain visibility of the device and the data it contains. A persis- tent connection is essential. The Environmental Protec- tion Agency relies on persistence technology for a constant connec- tion to all the devices in its deploy- ment. Because the persistence module is built into the rmware of each device, if efforts are made to remove it, the technology simply rebuilds itself so that the IT depart- ment can continue to track, man- age, and protect the agency's assets and data, regardless of device loca- tion or user. If a device leaves a designated area, EPA's IT department receives an alert. If a device is lost or stolen, the department can remotely freeze it or delete con dential data. Those functions allow EPA to be proac- tive about data security while sup- porting a mobile workforce. Mobility is arguably the most dis- ruptive technology since the World Wide Web, and IT departments that try to resist it will ultimately fail. Those that follow the three rules outlined above can secure data while embracing mobility and enabling a more productive workforce. ■ 3 rules for managing mobility It is possible to balance data security and user exibility --- if agencies follow these key guidelines A desktop computer and a mobile phone do not serve the needs of the always- on workforce of today. 10 June 30, 2014 FCW.COM
May 30, 2014
June 15, 2014