Government agencies rely on mobile devices more than ever before. And it’s not just field operatives or inspectors. Agency staffers at all levels are being issued mobile devices. The challenge now for agencies is to ensure productivity and access to the tools they need to do their jobs; while at the same time ensuring those devices are truly secure. Security threats facing mobile devices continue to evolve, and so too must the security solutions and policies that protect those devices.
Security is a critical component of mobility in all areas and any level of government. The goal is the ability to work anytime, anywhere, in any place, with the same level of security as in the office environment. Now there are newer classes of devices that let agencies manage settings and profiles at a granular level based on their security requirements, needs and policies.
Read More Here
A Mobile Device Management (MDM) system should anchor the device management and security process. MDM supports different configurations depending on user roles, prevents mobile devices from installing unapproved applications, tracks devices, enforces application whitelists and blacklists, provides geo-fencing, enforces data sharing restrictions and remotely wipes devices if they are lost or compromised.
Read More Here
Mobile devices are here to stay in the government arena. Policy leaders OMB and GSA, along with standards and technology experts at NIST, have issued guidance to help agencies develop mobile security policies to address their specific needs. At this point, it’s advisable to reexamine agency mobile security policy to ensure it fits the current environment and requirements.
Read More Here
Yasir Aziz, Senior Director on Samsung’s Knox Regulated Markets, gives his take on the current state of security, effective mobile security policy, and the future of mobile security. He presents his thoughts on the current state of mobile security, identity and access control, biometrics and security policies.
Read More Here
Government agencies have been using some form of biometric identification for years. Biometrics, generally fingerprint or iris scanning, are critical for accurately authenticating and identifying people. Biometric technologies are particularly effective, especially when used with another form of authentication. And mobile devices are uniquely suited to be equipped with biometric identification capabilities.
Read More Here