Government Commitment to Mobile Devices Highlights ... - AT&T

Government Commitment to Mobile Devices Highlights ... - AT&T Government Commitment to Mobile Devices Highlights ... - AT&T

13.07.2015 Views

Pantone 1797CMYKPantone 1797100M 99Y 12KMOBILE APPLICATION SECURITYGameChangerSPONSORED REPORTGAME CHANGING TECHNOLOGY TO MEET AGENCY MISSIONSGovernment Commitment to MobileDevices Highlights Security NeedsLast spring, President Barack Obamaput mobile devices on the centerstage when the Office of Managementand Budget released the DigitalGovernment Strategy, the first documentaimed at standardizing and securing thegovernment’s use of mobile technology.“The innovative use of technologyis fundamentally transforming how theAmerican people do business and livetheir daily lives,” Obama said in a May 23,2012, memo titled “Digital Government:Building a 21st Century Platform to BetterServe the American People.”Government employees are notimmune to this new way of conductingbusiness. In fact, with mandates to getmore feds teleworking and improvecontinuity of operations planning, thegovernment has been pushing mobility forsome time. The development of mobilerelatedpolicies is playing catch-up.Federal agencies are also not immuneto the threats that come with these newoperations. As more feds use smartphones, laptops and tablets to conductofficial business and access governmentnetworks, the risk of exposure to viruses,malware and data theft multiply. Malwareattacks directed at mobile devicesincreased by 185 percent in less than ayear, according to a Sept. 18, 2012, reportfrom the Government AccountabilityOffice titled “Better Implementation ofControls for Mobile Devices Should BeEncouraged.”But securing a device is only part ofthe issue. Agencies must also protecttheir networks. To do that, government ITmanagers are turning toward applicationcontrol. Application control involves settinglimits on what apps are appropriate forcertain devices and restricting what the appscan do and who can use them.There is a growing market formobile device management solutionsfor desktop and mobile computers.For instance, the Agriculture and theVeterans Affairs departments awardedMDM contracts last year, and NASAruns several at its facilities. Agenciescan also develop their own.Several organizations are developingpolicies or guidelines to help agenciesget and stay secure. For instance, theNational Institute of Standards andTechnology recently released revisionsto “Security and Privacy Controlsfor Federal Information Systems andOrganizations, Special Publication(SP)800-53, Revision 4,” outliningapproaches to application security.In August, the federal CIO Councilreleased a toolkit for agencies planningto implement a bring-your-own-devicepolicy, allowing workers to use their ownmobile technology within limits set bythe agency for which they work.“‘Mobility’ is not just aboutembracing the newest technology, but“THE INNOVATIVE USE OFTECHNOLOGY IS FUNDAMENTALLYTRANSFORMING HOW THEAMERICAN PEOPLE DO BUSINESSAND LIVE THEIR DAILY LIVES.”—PRESIDENT BARACK OBAMArather reflects a fundamental change inhow, when and where our citizens andemployees work and interact,” states theDigital Government Strategy. “Mobiletechnology – the devices, infrastructureand applications required to support amobile citizenry and workforce – is acritical enabler of mobility, but is onlypart of the profound environmental shiftthat mobility represents.”WHAT AGENCIES ARE DOING ALREADYIN 2012, 2,400 SPECIAL AGENTS at the Bureau of Alcohol, Tobacco, Firearmsand Explosives switched from BlackBerrys to iPhones in an effort to makeApple’s mobile platform the agency’s standard and thereby simplify theinfrastructure for managing those devices.The Defense Department’s National Center forTelehealth and Technology is using mobile applicationsto help members of the military and veterans handlehealth information. Among the apps it has created forAndroid, iOS and BlackBerry is Breathe2Relax, whichshows videos of deep breathing exercises and explainshow breathing works.The Census Bureau has a mobile app called America’sEconomy that mashes up Census statistics with data fromthe Bureau of Economic Analysis and Bureau of LaborStatistics to provide real-time economic indicators that economists, planners,business owners and the public can use to see trends in the U.S. economy.The Equal Employment Opportunity Commission was one of the firstfederal agencies to implement a bring-your-own-device program. It allowedemployees to eschew government-provided mobile devices in favor ofinstalling third-party software on their own smart phones so they could usethem for official work.

Pan<strong>to</strong>ne 1797CMYKPan<strong>to</strong>ne 1797100M 99Y 12KMOBILE APPLICATION SECURITYGameChangerSPONSORED REPORTGAME CHANGING TECHNOLOGY TO MEET AGENCY MISSIONS<strong>Government</strong> <strong>Commitment</strong> <strong>to</strong> <strong>Mobile</strong><strong>Devices</strong> <strong>Highlights</strong> Security NeedsLast spring, President Barack Obamaput mobile devices on the centerstage when the Office of Managementand Budget released the Digital<strong>Government</strong> Strategy, the first documentaimed at standardizing and securing thegovernment’s use of mobile technology.“The innovative use of technologyis fundamentally transforming how theAmerican people do business and livetheir daily lives,” Obama said in a May 23,2012, memo titled “Digital <strong>Government</strong>:Building a 21st Century Platform <strong>to</strong> BetterServe the American People.”<strong>Government</strong> employees are notimmune <strong>to</strong> this new way of conductingbusiness. In fact, with mandates <strong>to</strong> getmore feds teleworking and improvecontinuity of operations planning, thegovernment has been pushing mobility forsome time. The development of mobilerelatedpolicies is playing catch-up.Federal agencies are also not immune<strong>to</strong> the threats that come with these newoperations. As more feds use smartphones, lap<strong>to</strong>ps and tablets <strong>to</strong> conduc<strong>to</strong>fficial business and access governmentnetworks, the risk of exposure <strong>to</strong> viruses,malware and data theft multiply. Malwareattacks directed at mobile devicesincreased by 185 percent in less than ayear, according <strong>to</strong> a Sept. 18, 2012, reportfrom the <strong>Government</strong> AccountabilityOffice titled “Better Implementation ofControls for <strong>Mobile</strong> <strong>Devices</strong> Should BeEncouraged.”But securing a device is only part ofthe issue. Agencies must also protecttheir networks. To do that, government ITmanagers are turning <strong>to</strong>ward applicationcontrol. Application control involves settinglimits on what apps are appropriate forcertain devices and restricting what the appscan do and who can use them.There is a growing market formobile device management solutionsfor desk<strong>to</strong>p and mobile computers.For instance, the Agriculture and theVeterans Affairs departments awardedMDM contracts last year, and NASAruns several at its facilities. Agenciescan also develop their own.Several organizations are developingpolicies or guidelines <strong>to</strong> help agenciesget and stay secure. For instance, theNational Institute of Standards andTechnology recently released revisions<strong>to</strong> “Security and Privacy Controlsfor Federal Information Systems andOrganizations, Special Publication(SP)800-53, Revision 4,” outliningapproaches <strong>to</strong> application security.In August, the federal CIO Councilreleased a <strong>to</strong>olkit for agencies planning<strong>to</strong> implement a bring-your-own-devicepolicy, allowing workers <strong>to</strong> use their ownmobile technology within limits set bythe agency for which they work.“‘Mobility’ is not just aboutembracing the newest technology, but“THE INNOVATIVE USE OFTECHNOLOGY IS FUNDAMENTALLYTRANSFORMING HOW THEAMERICAN PEOPLE DO BUSINESSAND LIVE THEIR DAILY LIVES.”—PRESIDENT BARACK OBAMArather reflects a fundamental change inhow, when and where our citizens andemployees work and interact,” states theDigital <strong>Government</strong> Strategy. “<strong>Mobile</strong>technology – the devices, infrastructureand applications required <strong>to</strong> support amobile citizenry and workforce – is acritical enabler of mobility, but is onlypart of the profound environmental shiftthat mobility represents.”WHAT AGENCIES ARE DOING ALREADYIN 2012, 2,400 SPECIAL AGENTS at the Bureau of Alcohol, Tobacco, Firearmsand Explosives switched from BlackBerrys <strong>to</strong> iPhones in an effort <strong>to</strong> makeApple’s mobile platform the agency’s standard and thereby simplify theinfrastructure for managing those devices.The Defense Department’s National Center forTelehealth and Technology is using mobile applications<strong>to</strong> help members of the military and veterans handlehealth information. Among the apps it has created forAndroid, iOS and BlackBerry is Breathe2Relax, whichshows videos of deep breathing exercises and explainshow breathing works.The Census Bureau has a mobile app called America’sEconomy that mashes up Census statistics with data fromthe Bureau of Economic Analysis and Bureau of LaborStatistics <strong>to</strong> provide real-time economic indica<strong>to</strong>rs that economists, planners,business owners and the public can use <strong>to</strong> see trends in the U.S. economy.The Equal Employment Opportunity Commission was one of the firstfederal agencies <strong>to</strong> implement a bring-your-own-device program. It allowedemployees <strong>to</strong> eschew government-provided mobile devices in favor ofinstalling third-party software on their own smart phones so they could usethem for official work.


Pan<strong>to</strong>ne 1797CMYKPan<strong>to</strong>ne 1797100M 99Y 12KMOBILE APPLICATION SECURITYGameChangerSPONSORED REPORTGAME CHANGING TECHNOLOGY TO MEET AGENCY MISSIONSDefining and Preventing Threats<strong>Mobile</strong> technologyexposes users,organizations and networks <strong>to</strong>a spate of risks. Enter a newgenre of protections: mobiledevice management (MDM)and mobile applicationmanagement (MAM). MAMmaps out what applicationsare allowed on companyissuedor personal mobiledevices accessing companysystems, while MDM includesall of a device’s configurationsettings.The bring-your-own-deviceprinciple of incorporatingpersonal handhelds in<strong>to</strong>workplace networks isa driving force behindMAM. Characteristics ofMAM include applicationdelivery, updating,performance moni<strong>to</strong>ring, userauthentication, user controlsand analytics.BY THE NUMBERSMOBILE USEMDM solutions help byworking across multipleoperating systems – such asApple iOS, Google Androidand Microsoft Windows<strong>Mobile</strong> -- and device typesand brands, includingiPhones, iPads, BlackBerrys,Samsung Galaxies and more.Security measures built in<strong>to</strong> those devices are simplynot enough <strong>to</strong> combat threatsthat can come throughmultiple portals: SMS, MMS,Blue<strong>to</strong>oth, Wi-Fi, 2.5G, 3G,4G or desk<strong>to</strong>p sync.In addition <strong>to</strong> addingsecurity layers, MDM keepsindividual devices andorganizations’ networkssafe by helping informationtechnology managers trackdevices and users. MAM andMDM also help establishpolicies and standards forusing handhelds by forcingIT leaders <strong>to</strong> think aboutwhat mobility means at theirorganizations. Consequently,MDM outlines how anagency supports mobiledevices.The General ServicesAdministration recognizesthe need for reliable MDMACCORDING TO THE Digital <strong>Government</strong> Strategy, overall mobile broadbandsubscriptions are expected <strong>to</strong> grow from about 1 billion in 2011 <strong>to</strong> more than 5 billionin 2016, and by 2015 more Americans will get online using mobile devices thandesk<strong>to</strong>ps.Within the government, statistics from the <strong>Mobile</strong> Work Exchange’s “The 2013 DigitalDilemma Report: Mobility, Security, Productivity – Can We Have It All?” released Jan.15 support such an explosion in use:• Three out of four feds use mobile devices <strong>to</strong> do work an average of nine hoursper week.• 95 percent of feds said access <strong>to</strong> mobile devices improved their work.• 55 percent bring their own devices <strong>to</strong> work, but one in three of those users lackspassword protection.• 85 percent of feds have downloaded an app <strong>to</strong> their personal smart phone or tablet.suppliers. It issued a requestfor technical capabilities onFeb. 1 <strong>to</strong> find vendors offeringMDM and MAM solutions.Other organizations, suchas the National Institute ofStandards and Technologyand the CIO Council, are alsoputting <strong>to</strong>gether policies formanaging mobility while alsoencouraging it.“To provide the highestvalue of services, we mustrethink from step one howgovernment builds andprovides services for theAmerican people,” federalCIO Steven VanRoekel saidAug. 23, 2012, in “Building-Blocks of a 21st CenturyDigital <strong>Government</strong>.” “Wemust unlock rich governmentdata, information and servicesso that everyone from citizendevelopers and private-sec<strong>to</strong>rentrepreneurs, <strong>to</strong> our veryown federal agencies can helpprovide the American peoplewith the access <strong>to</strong> theseservices ‘anywhere, anytime,on any device.’”


Pan<strong>to</strong>ne 1797CMYKPan<strong>to</strong>ne 1797100M 99Y 12KMOBILE APPLICATION SECURITYGameChangerSPONSORED REPORTGAME CHANGING TECHNOLOGY TO MEET AGENCY MISSIONSSimplifying <strong>Mobile</strong> Securityhe advantages of a mobileT workforce are many, and so arethe risks <strong>to</strong> security as employeesuse personal devices from a varietyof manufacturers and providers <strong>to</strong>conduct business. In fact, unsecuremobile devices account for a largepercentage of workplace data loss. Butmultiple problems don’t require multiplesolutions, which is why AT&T created<strong>Mobile</strong> Security, a single end-<strong>to</strong>-endservice that protects organizations withmobile device users.“AT&T <strong>Mobile</strong> Security is a greatexample of AT&T getting ahead ofemerging threats and leveraging thepower of our network for new securityarchitectures and mechanisms,”said Miles Mendenhall, direc<strong>to</strong>r ofsecurity technology at the company. “Itprovides endpoint protection throughantivirus and antimalware supportingbuilt the service <strong>to</strong> handle large capacityand have plans <strong>to</strong> add more sites as thespecific needs of our commercial andgovernment cus<strong>to</strong>mers arise.”UNIVERSAL PROTECTIONACROSS WIRE LINE, WIRELESSBy leveraging the AT&T network andenabling organizations <strong>to</strong> apply thetypes of controls and security policies<strong>to</strong> mobile devices that they would<strong>to</strong> desk<strong>to</strong>p or lap<strong>to</strong>p traffic, AT&T<strong>Mobile</strong> Security offers a unique edge,Mendenhall said. The key is in thesolution’s core strengths:• Network-based applicationmoni<strong>to</strong>ring.• Traffic inspection.• Authentication.• Access control functions.“We leverage the strength of thenetwork <strong>to</strong> do the heavy lifting inrequired <strong>to</strong> support secure governmentcontracts,” Mendenhall said. “Not onlyare the personnel separated, but theplatform is isolated in secure nodes,along with a dedicated disaster recoverylocation in another U.S. time zone, awayfrom any outage that might impact aprimary production location.”DEDICATION TO SECURITYAT&T <strong>Mobile</strong> Security illustrates thecompany’s dedication <strong>to</strong> continuedsecurity innovation. The technologybehind the service originated at theAT&T Research Security Center, where aspecialized team of more than 12 Ph.D.sis dedicated <strong>to</strong> creating and implementinga secure future for mobile devices.“AT&T has been focusing onnetwork security for most of ourhis<strong>to</strong>ry,” Mendenhall said. “It has beenat the forefront of many developments“AT&T HAS BEEN FOCUSING ONNETWORK SECURITY FOR MOST OFOUR HISTORY.” —MILES MENDENHALL, DIRECTOR OFSECURITY TECHNOLOGY AT AT&Tmajor mobile operating systems,and implements core mobile devicemanagement functions, such as lock,wipe, locate, password policy andencryption policy.”Where most mobile security focusesonly on the device, AT&T <strong>Mobile</strong>Security provides multilayered protectionon the device and in the network.“AT&T <strong>Mobile</strong> Security usesstate-of-the-art and leading securityproviders within its service design <strong>to</strong>enable integration with other AT&TManaged Trusted Internet Pro<strong>to</strong>colService [MTIPS] services with the samenodes,” Mendenhall said. “Our ability<strong>to</strong> scale the platform is enabled throughcarrier-grade methodology in bothrouting and blade-based design. We’veproviding secure data traffic anddestination policies without drainingmobile device CPU, s<strong>to</strong>rage or batterycapacity,” he said. “We believe thatin addition <strong>to</strong> enforcing a strong se<strong>to</strong>f perimeter controls, you must alsoconsider that the perimeter has beenopened with access from mobile devicesthat would not be normally permitted.Thus, you need a solution that takes in<strong>to</strong>account the differences between mobiledevice traffic and traffic originating fromthe PC or other desk<strong>to</strong>p environment.”In addition <strong>to</strong> physically protectingthe platform within AT&T MTIPSarchitecture, the company also moni<strong>to</strong>rsthe people who handle security.“Additionally, support personnel arevetted and have background clearancesthat have become <strong>to</strong>day’s networksecurity best practices, including asecurity governance/policy model, riskmanagement methodologies, defense-indepthsecurity design, firewalls, threatmanagement and analysis, and securityevent correlation. It’s only fitting that <strong>to</strong>address the challenges of mobile security,AT&T is using our expertise in networksecurity <strong>to</strong> help protect an organization’sassets through wireless access.” •To learn more about AT&T <strong>Mobile</strong>Security, please visitwww.att.com/gov/protect

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!