by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : October 2014
Manage intelligently Get the right tools. Depending on the agency’s needs, the tools might cover asset/device workspace management, resource provisioning, application delivery, and patch management and upgrades. Automate as much as possible. By choosing tools with as much built-in automation as possible, the scenes in terms of managing users, content, applications and policies without disturbing employees. Provide as many self-service options to employees as possible. Not only does self-service empower employees, but it makes the IT department’s job easier by reducing the number of support calls and emails. Create a central point of management. With picture and then drill down to areas that need attention. Centralizing administration also enforces standardization across the board, which is critical for successful mobile management. Keep security front and center In this environment, it is not enough to buy technology to monitor devices and usage. It also requires crafting and communicating sound security policies and guidelines. The more agencies do this, the fewer security concerns they tend to have. Yet according to the FCW study, less than half of agencies require data encryption, use identity and access management tools, and have the ability to wipe agency applications and data. In addition, only 37 percent have the ability to continuously monitor employees’ personal device access and use of agency resources. To make sure your agency is putting the right emphasis on security, consider these tips: Create a separate, secure enterprise workspace. Put agency data and applications into a secure area, inaccessible without appropriate passwords and authentication. This allows users to securely access enterprise applications and content without impacting the use of existing personal applications, tools and data. technology that can set and enforce policies on the secure container and remotely wipe the contents of the secure container without disturbing personal data or applications. mobile strategy. Mobile Device Management (MDM) constant security demands by establishing compliance policies across the workspace of the mobile device. The workspace can be applied across the entire device if it is owned by the organization, to the virtual workspace or “secure container” if the device is owned by the end user. Protect your network. In the era of BYOD, users use the same device for both business and personal consumption. The per-app VPN approach allows within the business environment from those applications being used for personal consumption and only allowing secure applications access to the enterprise. Manage holistically By creating an agency-wide strategy instead of managing mobility in a piecemeal way, agencies can avoid the problems that can occur with miscommunication and overlapping costs—not to mention security—while achieving consistency and standardization. A holistic mobility strategy spans the entire mobility lifecycle from delivering network security and device control, to managing devices and applications, to content distribution and managing the workspace on both corporate and personal devices. All of the components of the mobility lifecycle must be integrated and interoperable. Without that capability, adding new functions over time can be frustrating, time-consuming and expensive. “Before making decisions on mobile solutions, take a step back and consider how you want to mobilize the enterprise. Take a holistic approach that considers everything from network security and device control, to content distribution and workspace management through the entire lifecycle of application development,” says Tina Chester, Director of Mobility Technology at AT&T. “If all of the pieces are designed to work together, it’s much easier to add additional capabilities as the agency grows into its mobility strategy.” With the right strategy and technology approach, agencies will not only be able to keep up with the growing and changing demand for mobile devices and applications and data are fully secure. For more information, please visit www.corp.att.com/gov/mobile/ SPONSORED CONTENT
November and December 2014