Federal Tiger Team Crafted Mobile Security Guidelines - InformationWeek
IoT
IoT
Comments
Federal Tiger Team Crafted Mobile Security Guidelines
Newest First  |  Oldest First  |  Threaded View
AG4IT
50%
50%
AG4IT,
User Rank: Apprentice
11/5/2013 | 1:17:21 PM
re: Federal Tiger Team Crafted Mobile Security Guidelines
Security risks (lost devices, access to sensitive data) are definitely a part of mobile computing. However, these risks can be reduced by keeping data and applications separate from devices. That means that there's no sensitive data exposed if an employee's device is lost or stolen.

This can be achieved with solutions like Ericom AccessNow, an HTML5 RDP client that enables users to connect from most types of devices to any RDP hosts (such as VDI virtual desktops or Windows Remote Desktop Services) and run full Windows desktops or applications in a browser tab.

There's nothing to install on the end user devices, as you only need an HTML5-compatible browser so using AccessNow also reduces IT support costs, since IT staff don't need to spend time installing software on so many different platforms. All they need to do is give employees a URL and login credentials.

Download this free white paper for some additional ideas on securely managing the mobile workforce:
http://www.ericom.com/WP-Mobil...

Please note that I work for Ericom
WKash
50%
50%
WKash,
User Rank: Author
11/1/2013 | 7:57:08 PM
re: Federal Tiger Team Crafted Mobile Security Guidelines
The tiger's team approach certainly deserves the tribute it received. But the larger lesson here is the importance the Digital Government Strategy played in identifying the need, bringing the team together, and fostering a solution.

That said, the absence of a successor plan/document for the Digital Government Strategy, which largely completed its work in May, is worrisome. We need more tiger teams like this one to tackle the redundancies across government and keep advancing the move to mobility.


How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll