Federal Tiger Team Crafted Mobile Security Guidelines - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
Federal Tiger Team Crafted Mobile Security Guidelines
Newest First  |  Oldest First  |  Threaded View
AG4IT
50%
50%
AG4IT,
User Rank: Apprentice
11/5/2013 | 1:17:21 PM
re: Federal Tiger Team Crafted Mobile Security Guidelines
Security risks (lost devices, access to sensitive data) are definitely a part of mobile computing. However, these risks can be reduced by keeping data and applications separate from devices. That means that there's no sensitive data exposed if an employee's device is lost or stolen.

This can be achieved with solutions like Ericom AccessNow, an HTML5 RDP client that enables users to connect from most types of devices to any RDP hosts (such as VDI virtual desktops or Windows Remote Desktop Services) and run full Windows desktops or applications in a browser tab.

There's nothing to install on the end user devices, as you only need an HTML5-compatible browser so using AccessNow also reduces IT support costs, since IT staff don't need to spend time installing software on so many different platforms. All they need to do is give employees a URL and login credentials.

Download this free white paper for some additional ideas on securely managing the mobile workforce:
http://www.ericom.com/WP-Mobil...

Please note that I work for Ericom
WKash
50%
50%
WKash,
User Rank: Author
11/1/2013 | 7:57:08 PM
re: Federal Tiger Team Crafted Mobile Security Guidelines
The tiger's team approach certainly deserves the tribute it received. But the larger lesson here is the importance the Digital Government Strategy played in identifying the need, bringing the team together, and fostering a solution.

That said, the absence of a successor plan/document for the Digital Government Strategy, which largely completed its work in May, is worrisome. We need more tiger teams like this one to tackle the redundancies across government and keep advancing the move to mobility.


The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Commentary
Gartner Forecast Sees 7.3% Shrinkage in IT Spending for 2020
Joao-Pierre S. Ruth, Senior Writer,  7/15/2020
Slideshows
10 Ways AI Is Transforming Enterprise Software
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/13/2020
Commentary
IT Career Paths You May Not Have Considered
Lisa Morgan, Freelance Writer,  6/30/2020
Register for InformationWeek Newsletters
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll