by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : October 2015
there’s a lot riding on mobility at all levels of government. It can improve productivity, increase employee satisfaction and even play a key role in agencies’ disaster recovery plans. Yet despite significant progress in providing at least some degree of mobility to government employees, security concerns have hampered progress. To manage security concerns, government has largely turned to solutions like Mobile Device Management (MDM) and Mobile Application Management (MAM), which help secure data on devices through encryption and containerization. While these measures are helpful, they’re far from foolproof. For example, if a device is lost or stolen, there’s a risk of sensitive data falling into the wrong hands. There’s a better way—by not storing data on mobile devices in the first place. That way, first responders, field workers and office workers who need mobile devices can access sensitive or classified data securely without the risk. The data is never stored on the devices. Instead, users see the data redisplayed on their screens. Government agencies have been using virtual desktop infrastructure (VDI) technology for years on laptops. VDI runs a user’s applications and desktop, storing their data on a server and displaying that information on the endpoint. For example, a federal law enforcement agency uses Raytheon|Websense’s Trusted Thin Client® solution for employee laptops. That way, agents in the field can access multiple sensitive networks without having to bring multiple laptops and encryption devices. And if they need to leave the unit behind during an unexpected evacuation, there’s no risk of data loss. Today, agencies can use the same type of technology for smartphones and tablets. “We knew this was something government needed to solve security concerns, especially in the case of sensitive and classified information on mobile devices,” says George Kamis, CTO of Raytheon|Websense, Federal Sector. “Trusted Access Mobile uses an encrypted network connection, a secure mobile gateway and virtual mobile infrastructure to ensure that when users need to access sensitive information on mobile devices, what they are really seeing is only a display of the information on a screen.” The Trusted Access Mobile solution runs on both Android and iOS devices. It uses Defense-grade security with Suite B encryption algorithms and nested TLS encrypted tunnels. Its hardened mobile gateway uses an SE Linux® foundation, and the mobile gateway blocks all other traffic between the device and the agency. With this technology, mobility becomes more secure across the board. Agencies allowing BYOD no longer have to worry about sensitive information falling into the wrong hands. Employees appreciate the flexibility it gives them to use the device for their personal needs as well as work. There are other benefits as well. In situations when the office is inaccessible, such as a weather or threat event, employees can remain productive. And when traveling abroad, employees can securely access email, calendar and data on mobile devices. The data isn’t stored on the device, which greatly reduces data loss or exposure. At the other end of the spectrum, agencies that require solutions with top- level security can equip their employees with mobile devices for use in the office without raising undue concern if a device mistakenly leaves the building. “For a long time, thin clients have been considered more secure than PCs,” says Kamis. “Now mobile devices can be just as secure.” secure Mobility across the board GameChanger Game ChanGinG TeChnoloGy To meeT aGenCy missions SponSored content Mobile Security http://www.raytheoncyber.com/capabilities/products/trusted-thinclient/ http://www.raytheoncyber.com/capabilities/products/trusted-mobile/ http://www.raytheoncyber.com/resources/
January and February 2016