by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January 2015
don’t have to be as concerned about oth- er applications on an employee’s device or just how that device is configured. “Most organizations these days, both public and private, have gotten away from trying to blacklist or whitelist what you can put on the device,” said Taylor. “That’s largely because containerization has led them to feel that they can allow more latitude for personally enabling a device while still keeping the apps and content that they are interested in se- cure.” Fairfax County, Va., which has been using an MDM platform to manage its fleet of mobile devices for some time, is now taking its first steps toward an EMM approach to BYOD. Initially, said Jeffrey Porter, director of the county’s Platform Technology Division, support will be limited to iOS and Android devices, to be followed in a few months by support for Windows Phones. “Now that we’re starting to let people touch applications,” said Porter, “it pres- ents a problem for us about who we al- low to touch what information. We want to make sure we are restrictive.” Porter plans to use containerization to help ensure the security of those appli- cations. LEGACY APPS MANAGEMENT For many IT managers deploying apps to mobile devices carries special chal- lenges, since many agencies are sill run- ning older legacy apps designed to run on mainframes. These in-place applica- tions are too resource intensive to run on mobile devices. That, said Michael Valivullah, chief technology officer at the National Ag- ricultural Statistics Service, is the case with some of the applications at the De- partment of Agriculture. “Based on user needs, we are rewriting those applica- tions,” he said, in part to make the ap- plications more appropriate for mobile use. Data center consolidation is also driv- ing demand for an application-focused approach to device management, ac- cording to Valivullah. “We have de- creased our data centers from 46 to two, and with the data center consolidation, we have longer distances to go between client devices and the data center,” he explained. The result is delays and, eventually, user complaints. “So we are having to optimize those applications to decrease the I/O,” he said. “We’re implementing caching so apps don’t have to go all the way to the database for every operation.” FOCUS ON THE DATA Moving forward, said Valivullah, his team will focus more on the data than anything else. “Our mobile strategy is based on the data instead of focusing on devices,” said Valivullah. “Our concept is to access anything, anywhere from any technology at any time.” And to protect the data, apps on US- DA’s mobile devices are configured so that the data is never stored on the de- vice. “We rolled out a virtual desktop in- terface that can run on pretty much any device,” said Valivullah. All the apps run through the interface, and all the data is stored on USDA’s servers or in its cloud storage. “Nothing is resident on the computer,” said Valivullah. “ We just give them bare-bones devices and they can’t save data on it. Even for the couple of minutes that data might be there it is encrypted. We don’t see a lot of risk there.” Gartner’s Taylor confirms that more government agencies are turning to the cloud for securing mobile data as part of their mobile device repertoire. “We are seeing a lot more interest in 2015 TECH FORECAST 28 GCN SEPTEMBER 2014 • GCN.COM 28 GCN JANUARY 2015 • GCN.COM UBER MONITORING: Agencies will adopt some form of continuous monitoring, including threat and identity scanning. (Coalfire) NEW DETECTION TECH: Crowdsourcing, machine intelligence and advanced analytics emerge as new threat detection tools. (Coalfire) SHIFT TO OFFENSE: A transition toward offensive tactics, including systems to identify and delay attackers, gathers steam. (Coalfire) SECURITY TALENT GAP: Rising demand for cybersecurity skill sets means government-commercial partnerships need to be part of the talent mix. (NASCIO-Deloitte) COMPLIANCE AS A SERVICE: As complexity of cyber threats rise, CISOs will need to respond with more regulation and devote more resources to compliance requirements. (NASCIO-Deloitte) BUILD AS YOU GO: Greater data center consolidation and cloud projects will provide CISOs creative opportunities for building security into the government enterprise. (NASCIO-Deloitte) CYBERSECURITY 0115gcn_022-030.indd 28 1/13/15 11:36 AM
November and December 2014