by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : August 2014
Cloud computing has become a critical element in enterprise IT, changing the way organizations use and consume IT resources. IDC esti- mates that worldwide spending on cloud services will reach more than $100 billion this year. With the use of mobile devices outpac- ing that of less portable technology, offi- cials at government agencies are working to provide constituents with the services they want and expect. This effort has two parts. First, there s the information provider -- the govern- ment, securing mobile applications and data at rest and in transit. Then there s the consumer -- citizens, looking to obtain a trusted identity to prove who they are and to use across websites, organizations and the public and private sectors. Symantec Corp. has solutions that address these needs, said David Hurley, mobility and identity sales lead at Symantec, and Lewis Etheridge, the company s national practice manager for public health, during a June 24 webinar titled "Enabling Government to Citizen Engagement through Mobility and Identity Solutions." "What we find is if the user is expect- ing a certain experience, whether it s an [Apple] iOS, [Google] Android or even a [Microsoft] Windows device, if they don t get that on the device, then they re less likely to use the tool," Hurley said. "The focus that Symantec is taking toward mobile, and our vision, is really any device, anywhere at any time. That is the goal." Mobile apps are not really new, he said, but their functions are. Historically, apps have been informational, telling users the hours of operation at the Smithsonian Institution or what they can bring into a national park, for example. The need for security and management on these is low. Now apps are becoming more transac- tional, incorporating sensitive data, such as payments, health records and personally identifiable information, making app poli- cies are necessary. Symantec App Center, which puts mobile device management, mobile threat protection and mobile app management into one solution, can help cre- ate them. "What we re addressing here is what type of policy do we need around that applica- tion? How secure do we want it?" Hurley said. "We are taking that mobile application to do whatever you may need it to do." App Center can protect apps against data loss through encryption, removal control and separation of corporate data. It s flex- ible, letting the agency set the rules. For instance, an agency might set a policy securing information in an app to its server so nothing can be leaked, he said. Sometimes agencies apps aren t enough or a commercial version already in exis- tence is better. In those cases, the govern- ment turns to apps from third-party devel- opers, and those also need to be secured. Symantec s Sealed Program covers that. "What Symantec is doing is working D D D D D DI I I I I IG G G G G G G GI I I I I IT T T T T TA A A A A AL L L L L LD D D D D DI I I I I IA A A A A AL L L L L LO O O O O O O OG G G G G G G GU U U U U UE E E E E E MOBILE APPS MAKE GAINS IN SECURITY, IDENTITY Application management and trusted credentials can revolutionize the way government agencies interact with citizens SPONSORED CONTENT The government is transitioning its app offerings from straightforward information- al to more complex transactional setups. As more agencies embrace mobile apps, their possibilities become apparent, said David Hurley, mobility and identity sales lead at Symantec. Here are a few examples: use mobile apps on a tablet at a veteran s home for updating health information. Agency s network of local citizens respond- ing to a disaster could collect and send data back to the agency so it can adjust resource allocation. Census Bureau could incorporate mobile apps for secure data gathering. deploy an app to a contractor in a particu- lar area and pull information securely back to its data center. for preventing and fighting fires. Highlights from a recent webcast on mobile security LISTEN/LEARN: For a replay of the webcast, go to: GCN.com/2014SecureMobileEngagement MOBILE APP USE-CASES IN THE FEDERAL GOVERNMENT