Today I will be live blogging at the Cisco Government Solutions Forum. The session I just attended, Establishing Trust Within the Enterprise and Beyond, is part of the Managing Risks in a Dynamic Network Environment track. This track explores security and identifies that managing risks is always part of the conversation on technology. One ofRead… Read more »
Search Results for: BYOD
Mobile Dialogue Update – Top 3 – Shared Services, BYOD, Info Assurance
Last week as we posted on GovLoop, Federal CIO Steven VanRoekel launched the call for feedback on the National Dialogue on Mobility Strategy. A week later let’s look the top 3 most popular suggestions are: –Develop a shared services catalogue –Encourage Bring Your Own Device policies(see GL discussion thread on Bring Your Own Device) –MobileRead… Read more »
Phishing for Trouble: Personal Mobile Devices and Government Security
Government employees are using personal devices for work-related communications more than ever before. That leaves agencies vulnerable to new cyber risks.
Building Digital Workspaces to Meet the Needs of a Changing Government Workforce
No longer can government employees be expected to tackle all of their responsibilities from a desk chair. Now, everything from emails to data-heavy applications needs to be available from anywhere – at any time and on any device.
Why You Need a Digital Workspace
Agencies need a way to cut IT costs, boost employee productivity, and deliver high-definition user experiences on any device. And they need to do all of that without sacrificing security. That’s a tall order, but with secure digital workspaces it’s possible.
What Prevents Great Government Network Access
Government employees must be able to contribute to their missions on day one, and they need a more secure and reliable means of accessing the agency network. Plus, IT organizations need a way to reduce the complexity and overhead associated with wireless access, so they can scale BYOD programs while maintaining the agency’s security posture.
Providing Secure Network Access for Government Users
In this course, we examine how agencies can provide secure network access to employees, guests and other device users. We examine the challenges to provisioning access and how those obstacles increase costs and IT workloads. We also explore how self-service systems can overcome these barriers and examine how these solutions work in real-world, government scenarios.
Government-Grade Cloud: The Right Mix of Security, Standards
Among the chief benefits of government-grade clouds is that they help agencies manage their growing mission compute needs while remaining nimble and well-shielded from cyberthreats.
How to Ultra-Lock Your Accounts With Multi-Factor Authentication
There is no 100 percent guaranteed protection against anything that exists or has yet to be developed. But there is a way to make yourself a harder target by setting up multi-factor authentication. Please do it today.
How Modern Enterprise Data Fabric is Facilitating Digital Transformation
Check out what digital transformation means for the public sector, how the data deluge is adding to the complexity and how a segment of big data, called machine data, is offering opportunities to ride the digital transformation wave seamlessly and effectively.