75% of enterprises now have "Bring Your Own Device' (BYOD) policies, according to the Aberdeen Group. Given the power, availability, and relative affordability of today's smartphones and tablets, the Federal government cannot keep up on technology and shouldn't have to. Instead, provide standard mobile data management (MDM) security protocols to allow employees to use their own, privately owned devices. Agencies should ...more »
The civilian side of the federal government currently has no common policies or guidelines in place on how to evaluate, validate, protect or secure mobile technologies - including mobile infrastructure, mobile devices, mobile apps, mobile data practices, etc. I suggest that the government create reasonable security guidelines so that the important work of protecting the federal computing infrastructure is not duplicated ...more »
Even in early draft form, a document like this that has the power to transform Government must address security at a fundamental level. If security is left to be bolted on by individual agency procurements, we'll end up increasing risks and costs. There should be some high level direction that the introduction of mobile must not increase the risks, and that a common set of standards (not products) across broad groups ...more »
A federal identity management standard combined with set of mobile applications for communication (web, voice, text, e-mail, video), collaboration (online document sharing), productivity (word processing, spreadsheets, presentations, online publishing), HR, travel and expense reporting that would empower all federal workers to fully support their mission at any time from anywhere on any device.
Establish a government run wireless operator (MVNO) leased from a commercial carrier that meets the unique security and operational requirements of the Federal government.
Leveraging a user's own smart device such as an iPad, tablet, iPhone, or other smart phone can provide significant cost savings for the Federal government. The issue becomes how to securely authenticate the user with strong multi-factor credential to meet level of assurance 3 requirements. This is done today with software credentials such as those from CA (http://www.ca.com/us/vpn-authentication.aspx) and other vendors. ...more »
The US Forest Service Fire and Aviation Management chartered a committee in August 2011 -Mobile Technologies Integration into Fire and Aviation Management committee. The following mobile strategy recommendations are a result of the Committee’s established test group surveys, informal field feedback and conference notes. Recommendations for CIOs core objectives 1, 4, 5 and 6: 1.The integration of mobile devices into ...more »
What if...? The Federal Government is the legal owner or tennant of tens or hundreds of thousands of servers, network and storage devices and probably millions of desktops and laptops worldwide... Imagine if a mobile app available on all pupular mobile devices could automatically scan, identify and assign location to every federal IT asset with a barcode. Then it could communicate that encrypted information over existing ...more »