by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2013
Commentary | MARK NEUSTADT Our government strives to arm war ghters with the most modern and innovative tools to protect our nation and ensure their safety. The Defense Department is now focused on making the mobile war ghter a reality by enabling secure information access anytime, anywhere and on any device. Recent news has focused on DOD's efforts to rapidly expand its mobile strategy to in- eld person- nel, and several defense agencies are implementing pilot programs for that purpose. As DOD begins to roll out a broader mobile strategy, the effort to make the war ghter mobile is moving to the forefront. Mobile IT holds vast potential for the defense sector, including cost savings, increased ef ciency, better continuity of operations and improved mission outcomes, to name just a few bene ts. Addition- ally, deploying virtual desktops on mobile devices and thin clients allows defense organizations to deploy on-site, on-demand train- ing that previously required printed manuals, timely presentations and costly travel. We are beginning to glimpse the potential with early programs across defense organizations that secure mobile devices for eld engineers and deliver secure, clas- si ed voice-over-IP capabilities to war ghters on the move. In addi- tion, the military is starting to use commercial off-the-shelf mobile devices with government off-the- shelf radios to provide wireless communications within 150 miles of deployed units. Like other government agencies, DOD acutely recognizes the need for a comprehensive strategy that protects underlying applications and con dential data regardless of device ownership, while enabling access to existing Web- and Windows-based applications from any device. Although many agen- cies are focused on developing a mobile device management solution to their mobility challenges, several industry analysts have called for a more robust approach called enter- prise mobility management. EMM addresses the broader challenges associated with mobile applica- tions, devices, data and analytics. An EMM strategy requires: • Security for mobile data with a focus on ensuring that data is encrypted using the required standards. • Comprehensive device manage- ment that ensures control over peripheral devices and the tracking of inventory and usage for government-owned devices. • Access and control policies that use endpoint analysis and user roles to determine which apps and data to deliver to individual users. • Robust authentication that works with existing tools, such as Com- mon Access Cards, and enables defense agencies to apply the appropriate level of authentication. • Secure containerization that sepa- rates business apps and data from personal apps on mobile devices, which can be remotely adminis- tered, locked and/or wiped by IT managers. • Centralized application manage- ment and deployment via an enter- prise app store to enable organiza- tions to provision and deprovision apps more easily and ensure that mobile app access is deactivated immediately on lost devices when necessary. • Advanced analytics that provide the ability to audit devices, apps and network access and rapidly analyze the ndings to ensure thor- ough control and governance. Mobile war ghters could bring enormous value to the defense mis- sion. However, a awed manage- ment strategy can leave sensitive data vulnerable in the riskiest of sit- uations. Careful planning, the right equipment and effective support are crucial to any successful defense deployment. Mobility initiatives are no different. ■ The mobile war ghter: Preparing for deployment With a comprehensive enterprise mobility management strategy, defense organizations stand to achieve a new level of readiness Careful planning, the right equipment and effective support are crucial to any successful defense deployment. Mobility initiatives are no different. MARK NEUSTADT is director of sales at Citrix Systems' Department of Defense Sector. September 15, 2013 FCW.COM 13
August 30, 2013
September 30, 2013