by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : July 2014
Sponsored Content Going mobile: How to boost productivity and data integrity Q What are the essential ingredients of a mobile security pro- gram? A An e ective mobile security pro- gram combines strategy, architec- ture, technology, policy and peo- ple to ensure security at every stage --- from design to daily implemen- tation. An enterprise strategy should encompass mobility and security to maintain an acute level of awareness of the mobile envi- ronment and take control of it. Technical architecture should be designed to enable the business vision. Architecture and business strategy are then enabled through technology, in- cluding the mobile device management systems, app stores, cloud/server processing, secure end point devices and secu- rity auditing capabilities. To secure this technology, enter- prises must establish a security policy, something that Sam- sung and its ecosystem of partners support 'out of the box.' Q Is it possible to enable employees to access both agency and per- sonal resources on one device without compromising the security? A Yes, Samsung Knox provides the ability to have a secure workspace container that totally secures and cordons o gov- ernment enterprise applications and protects from malicious attacks and data leakage. Government employees can use the 'personal' side of the device as they wish without fear of alter- ing the Samsung Knox container and its applications or con- tent. Integrity of agency data is protected no matter how the device is used. With Samsung Knox, agencies have the tech- nology to enable a Bring Your Own Device model or allow for personal use on government-owned devices. Q What tools are available to help government customers that have custom mobile program requirements? A Samsung has a broad ecosystem of mobile solutions provid- ers, and we have provided them with industry leading Soft- ware Developer Kits (SDKs) and various levels of developer support from our enterprise technical teams and R&D labs to enable unique and highly customized use cases. One ex- ample is our support of the PM Nett Warrior program. e U.S. Army uses the Galaxy Note line of smartphones as part of a solution that provides situational awareness for the warf- ighter. rough the Samsung Solutions Exchange, we work with mobile solution providers to enable unique and highly customized solutions on Samsung devices. Q What mobile security controls do the various government certi cations address and why are they important? A Government certi cations are important because they provide assurance that certain aspects of security are being performed correctly. FIPS certi cations address the strength of encryp- tion solutions---the algorithms, key lengths, and implementa- tions of the algorithms. e Mobile Device Fundamental Pro- tection Pro le (MDFPP) under the 26-country Common Criteria program addresses the robustness of security functions on mobile devices. e Virtual Private Network Protection Pro le (VPNPP), also under Common Criteria, addresses the security of how VPN tunnels between the mobile device and enterprise are established, executed and torn down. e De- partment of Defense Security Technical Information Guide (STIG) is an annex to the National Information Assurance Partnership's protection pro le, and describes how users and IT departments should con gure the capabilities to operate securely. Samsung mobile devices comply with FIPS 140-2, MDFPP, VNPP and STIG requirements. Q To what extent can mobile solutions be integrated with the traditional work environment? A ere are several ways to consider wireless integration in the traditional work environment, or in the place of the tradi- tional work environment. Within a more traditional o ce space, most of the products and tools available today are al- ready connected or can be connected wirelessly. Wireless and mobile technologies can be integrated further into the work- place by leveraging capabilities that connect them to print- ers, displays and other IT products. Samsung is innovating in this arena at a tremendous pace, for example, providing the ability for mobile devices to connect via Near Field Com- munication (NFC) to our displays and other IT products. Johnny Overcast, Director Government Sales, Samsung To learn more go to www.samsung.com/us/enterprise