by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : July 30, 2014
Sponsored Content Balancing security Q Why are we seeing a proliferation of mobile devices in gov- ernment agencies? Today’s government worker has become accustomed to mobility through smartphone mobile ap- plications in their everyday life. We have definitely seen an increase in the use of mobile devices by gov- ernment agencies over the past few years driven by more powerful and sophisticated smartphone tech- nologies, operating systems and mobile devices management products. Samsung is addressing these challenges with Sam- sung Knox, a mobile security platform that enables agencies to approve Samsung devices for use in the enterprise. Q Are commercial mobile devices ready to meet the security demands of government agencies? A Samsung has spent the past few years consulting with en- terprise and government customers alike to track their pri- orities. We integrated their insights into our devices to ad- dress mobile security. Samsung Knox secures our devices from the hardware layer, through the operating system and into the application layer. A secure workspace leverages the protections of SE Android to provide enterprise data pro- tection on the device and protect data in transit with a FIPS 140-2 certified VPN. Knox also provides integrity management at the hardware layer using Samsung-devel- oped technology called TIMA, or TrustZone-based Integ- rity Management Architecture. Q To what extent can mobility solutions be customized to meet specific program requirements? A When evaluating mobility solutions, there are two aspects to consider: the software application that provides the solution and the device that enables a degree of customization, ren- dering and usability. At Samsung, we listen to our customers to understand their challenges then use all the tools at our disposal to solve a particular use case with mobile devices and solutions. The PM Nett Warrior program is a great example of that effort. The U.S. Army provides situational awareness for the warfighter using Samsung’s large-screen Galaxy Note smartphones, combined with a custom software solution. Through the Samsung Solutions Exchange, we work with mobile solution providers to enable unique and highly cus- tomized solutions on Samsung devices. Q What certifications are important when considering the purchase of mobile products in the government space? A Samsung devices have been approved by the U.S. Depart- ment of Defense for use in DOD networks—a first for An- droid-powered devices. We have an approved Systems Tech- nical Implementation Guide (STIG) approved by Defense Information Services Agency (DISA) and are the only manu- facture to have gone through the National Information As- surance Program’s (NIAP) new Mobile Device Fundamental Protection Profile (MDFPP) evaluation, also known as Com- mon Criteria. We currently have five devices—the most of any manufacturer—listed on DISA’s Approved Products List. Our devices are National Institute of Standards and Technol- ogy (NIST) Federal Information Processing Standards (FIPS) 140-2 certified. Q Why is mobile security such an important investment for agencies to make? A By making smart investments in mobile security an agency can enable its workers to be more productive and responsive while still protecting their data. Today’s mobile worker ex- pects access to their work when it is convenient, regardless of location. This pervasive mobility that allows users to roam globally, using networks and application stores that may be highly vulnerable to penetration, challenges the traditional security model. Devices have traditionally been protected behind the organization’s network security perimeter, but these devices are always-on and connected directly to the open Internet. This increases the risk profile for these devic- es, and the security infrastructure and posture needs to change to support this. Samsung works with customers to tailor solutions and products that enable mobility while ad- dressing unique security challenges. A Johnny Overcast, Director Government Sales, Samsung To learn more go to www.samsung.com/us/enterprise
July 15, 2014
August 15, 2014