Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Securing smartphones for the war zone
Thursday - 7/28/2011, 6:05pm EDT
Federal News Radio
A smart phone is worthless if it's not secure, especially if you're taking that device into combat. The Defense Information Systems Agency and the military branches are testing iPhones and Droids for security in the most difficult environments.
John Herrema is Senior Vice President of corporate strategy at Good Technology, the company working with DISA on the project. He joined In Depth to talk about securing mobile devices
There are many factors in using mobile phones, Herrema said, from the networks, individual devices, platforms, applications used on devices. Also, the devices will be used on public and private networks and are much more likely to be misplaced, lost or stolen.
Another critical concern is in verifying the source of emails.
"You simply can't have a case where a bad guy, can find a device, acquire a device or otherwise impersonate a legitimate officer or soldier," Herrema said.
Security isn't just a concern in the defense sector, Herrema said.
"I think we're starting to see our commercial customers embrace technologies that previously was really used only by our DoD or federal customers," Herrema
On the opposite side, federal customers are becoming more open to and adopting the "Bring Your Own Device" model. This way, organizations increase mobility and reduce costs by leveraging devices that employees already own. And everybody wins, Herrema said, because employees get to use the devices they want.
"We are finding that we do have government customers that are already embracing this 'BYOD' model," Herrema said.