Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
How to secure mobile devices at your agency
Tuesday - 2/19/2013, 9:21pm EST
This year we will see new hardware and operating systems, all in a world of thousands of apps.
No wonder federal information technology professionals are looking for solutions to manage this mess.
One option to consider is using hardware.
Today's interview is with Glenn Schoonover from Koolspan.
They recommend a solution that uses a micro SD card for each device. This card can be encrypted so the operating system cannot be altered.
During the interview Schoonover elucidates upon the variations of using software and passwords for securing mobile devices. Then, he contrasts that with the success of using micro SD cards.
Most security experts have predicted the end of passwords.
Users just have too many to worry about and tend to use the same password that leads to dangerous exploits being run.
There is a current report from NIST which gives guidelines for using hardware authentication for mobile devices.
Nobody has a crystal ball that will show what will replace passwords, it could be something as exotic as voice recognition.
However, it is important for all federal information professionals to listen to options that may fit their specific circumstances.