by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : February 2014
5 > CDWG.com | 800.808.4239 Mobile computing is changing the way organizations function and interact, offering unprecedented opportunities to improve work processes, collaboration and interpersonal communication, as well as drive innovation. Achieving such benefits doesn't happen overnight, of course. Putting in place the right policies, processes and technologies --- particularly for management, security and support --- is critical to reaping mobility's productivity gains. Many government agencies and educational institutions initially were wary of the bring-your-own- device (BYOD) movement, but that resistance is dwindling as its benefits (and those of mobility in general) become more readily apparent. Increasingly, these organizations' IT departments are allowing workers, students and other stakeholders to use personally owned tablets, smartphones and other devices to connect to their networks, access data and use applications. In doing so, they're also taking a fresh look at user policies, associated costs and the technologies that their organizations have relied on to secure crucial assets. With the proper safeguards and tiers of support in place, BYOD stands to play a leading role in public sector mobility plans going forward. To be effective, though, mobile security policies and management technologies should address not only proliferating devices, but also the data and applications they access, the networks that connect them and the users themselves. Device Options: Setting Limits Establishing a workable use policy is a critical component of BYOD M Bring-your-own-device programs can be both productive and secure when the right safeguards and support are in place. initiatives, and it always comes with some compromises. Use policies should encompass devices, operating systems, apps, data storage, cloud services, security requirements, procedures for handling missing devices and a host of other criteria. Because IT administrators have to respond quickly to situations in which a device is lost, stolen or considered compromised, users need to understand that all data --- even personal data --- may have to be wiped from their devices. ey also have to play by best- practice network access rules. For example, users should adopt the same password practices for their mobile devices that they've been trained to apply to standard PC access. e IT department also should at least encourage users to get their own digital certificates to protect their mobile devices, if not actually dictate the specific certificate-issuing authority they should use, as well as the type of hardware and software options they should choose for storing certificates and keys. BYOD use policies should also define which physical locations are deemed acceptable (and cost-effective) for mobile device use. IT managers have learned the hard way to restrict the use of mobile devices for staff traveling internationally, whether because the countries visited have laws related to Internet access and other data, or because using the Internet in these locations to gain access to organizational resources racks up astronomical data usage fees. Such issues mean IT departments must not only educate themselves on the nuances of leveraging BYOD (including understanding the laws of the regions in which their users travel and the specifics of their carriers' data plans), but also continuously educate and inform users on proper device usage, policy updates and effective security practices. MDM Solutions: Must- have Functionality Requirements for a BYOD or larger mobile device management strategy will differ depending on the organization's mission, user base and other criteria. Nonetheless, there are functions that all MDM solutions should provide. • Device enrollment: MDM software simplifies the addition of new devices into the management infrastructure, enabling administrators to enroll a single device or a large number of new devices simultaneously. It also provides self-service enrollment capabilities through user-oriented wizards, so workers and other users can handle the enrollment process themselves. • User authentication: To enhance security when adding new devices, MDM software authenticates users during the enrollment process, as well as prior to allowing secure access to organizational resources, such as wireless networks, applications and content. MDM solutions support authentication through such methods as username/password combinations, directory services credentials tied to Active Directory or the Lightweight Directory Access Protocol (LDAP), and multifactor authentication via Security Assertion Markup Language (SAML), tokens, certificates and proxies. • Application provisioning: Following device enrollment and authentication, the IT department uses MDM to handle application provisioning to select devices. Apps provisioning can be performed over the air via a wireless network or through web-based means. • Security: To ensure secure access