by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : March 2013
olutions to the security concerns with bring-your- own-device policies are ready at hand, experts say, but are federal agencies and their employ- ees ready for those solutions? The problem is not the technol- ogy itself. The basic approaches to protecting government applications and data on devices are fairly well understood. The BYOD Toolkit published by the Obama Administration in 2012 outlined three: virtualization, in which no data or application re- sides on the device; a "walled gar- den," in which data or applications reside in a secure compartment on the device; or limited separation, in personal and corporate data are allowed to comingle as long as certain policies are enacted. But such approaches require agencies and employees to come to terms on the extent to which employees must cede control of their device to the IT department. It's an in-depth discussion that people need to engage in for this, said Kyle Keller, cloud business manager for EMC Federal. The rst part of that is to ask whether agency data will be going to the user's de- vice, and if so if they will be allowed to copy that data to the device. "Most customers I talk to say the desire is to give them access, but to maintain the data in their own or a shared data center they have with other agencies," he said. "In that case, the question is how to take a data centric approach and secure the data and [control] ac- cess to it using two-factor authen- tication or something else." Organizations then need to con- sider the possibility that devices will be lost or stolen. The ability to remotely wipe a device clean is a "huge factor" in BYOD, he said. Other approaches to security in the near future could include such options as implementing a hypervi- sor on the device itself. This would enable the IT department to create a speci c work number for the user, set up a virtual instance of their workspace, and provide con- tainers on the device that would automatically encrypt agency data. A holistic approach to security would also help with identifying where BYOD makes sense in an organization and where it doesn't, said Daniel McCrae, director of NOAA's service delivery division. Such a managed risk approach would consider device security, use policies, encryption, remote management and so on. So any evaluation needs to start from the mission requirement said and determine if the nature of the work lends itself to a BYOD envi- ronment. That certainly doesn't mean that there would be no security, McCrae said, "but if it's to the point where the bene ts are obviated because you do have that severely reduced functionality on the device, then chances are that the things they are trying to do with it are not a good t for BYOD." Sponsored Report SPONSORED BY: BYOD BYOD: Employees ponder the cost of security The development of security solutions for employee-owned de- vices requires employees to give up some personal space FULL REPORT ONLINE Go to GCN.com/2013BYOD 2. BYOD presents benefits, challenges for mobile strategies 3. Is BYOD really that important to Millennials? 4. Virtualization, already a major trend, can help with BYOD 5. Implementing BYOD is not easy, but here are ways to start Other BYOD Report Articles