by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : October 2015
What is Virtual Mobile Infrastructure and why do we need it? When it comes to protecting mobile data and securely accessing mobile apps, government agencies have increasingly turned to solutions like Mobile Device Management (MDM) and Mobile Application Management (MAM). These solutions are effective to a point, but with the increasing adoption of Bring- Your-Own-Device (BYOD) throughout government, the stakes are higher—and protection more elusive. Enter Virtual Mobile Infrastructure (VMI). What Is VMI? Think of this as Virtual Desktop Infrastructure (VDI) for mobile devices. The purpose of VMI is to provide secure access to mobile applications, data and secure networks from mobile devices. Like VDI, users are assigned a profile. This profile is centrally managed and stored on agency servers. Applications and data are delivered to the device via a secure remote protocol. To access applications, users must log in securely on the device. No agency data is stored on the device. Because nothing sensitive is stored on the device, there is no risk of data loss due to device theft. It’s more efficient because installation, upgrading and patching are automated. hoW does VMI help WIth seCurIty When Many eMployees use theIr oWn deVICes? Agencies can be confident there’s no cross-over between agency data and apps, and personal data and apps. This means the chance of confidential data getting into the wrong hands is slim to none. WhydoWeneedVMIIFWe already use enterprIse MobIlIty ManaGeMent solutIons lIke MdM and MaM? MDM focuses on distributing data, applications and security configuration settings to mobile devices. MAM provides more controls specific to applications and often manages an organization’s app store. MAM solutions can also store fully encrypted data without fully encrypting the device and remotely enforce policies. However, both have limitations. MDM doesn’t do much to secure applications and isn’t ironclad when it comes to protecting against attacks or data leaks. Also, both MDM and MAM solutions require multiple protocols, which means more potentially weak links. And enforcing policies on these solutions is time-consuming. does thIs Mean our InVestMent In MdM and/or MaM Was a Waste oF tIMe and Money? Not at all—these solutions are an important step in managing mobile devices. Layering a VMI solution over your existing infrastructure will strengthen security. Existing solutions are still useful in securely delivering some mobile apps, while VMI can take care of more sensitive, complex apps and provide access to more sensitive data. GameChanger Game ChanGinG TeChnoloGy To meeT aGenCy missions SponSored report Mobile Security by the nuMberS: the Mobile Security threat 29% The percentage of mobile devices connected to the network of a major U.s federal agency that has encountered a mobile threat during the past year. 33% The percentage of organizations that never test their apps. 40% The percentage of organizations that aren’t scanning the code in their apps for security vulnerabilities. 75% The percentage mobile malware in the U.s. has grown over past year. 85% The percentage of commercial mobile apps that track when WiFi and data networks are used, if the device is turned on, or the device’s current and last location. 188% The percentage by which android vulnerabilities have increased compared to 2011. 262% The percentage by which ios vulnerabilities have increased compared to 2011. More than 20,000 The number of mobile applications that fail to properly validate ssl certificates. 16 million The number of mobile devices worldwide that have been infected with malware. 1,432,660,467 The number of attacks launched from online resources located throughout the world.
January and February 2016