Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Monday - Friday, 6-9 a.m.
Host Tom Temin brings you the latest news affecting the federal community each weekday morning, featuring interviews with top government executives and contractors. Listen live from 6 to 9 a.m. or download archived interviews below.
Navigating the sea of mobile devices
Monday - 8/30/2010, 9:31am EDT
With a mind-numbing array of mobile devices on the market, how does an agency go about sourcing them in the best possible way? You've got to balance features, security, and the limits of how many devices can be supported with keeping users happy.
Brownlee Thomas, a member of Forrester Research's global IT Sourcing & Vendor Management Team, joined the Federal Drive with some industry perspective. Thomas specialize in enterprise network and telecoms, and she says the two most important factors to consider when procuring mobile phones are cost and privacy and security concerns.
It's important she says, to manage the security capabilities for any citizen and policy information that might be involved, and also maintaining user security.
Among the cost-cutting measures around the industry, Thomas says, is to have employees purchase their own devices. When it comes down to deciding device-specifications (keypad v. touch screen, screen size, etc), it's better that the employees themselves decide and purchase the device, and the agency pay for service.
Thomas said 17 percent of public sector agencies already require employees to pay 100 percent of device cost, and just over 20 percent of private sector do too. That way, Thomas explained, the agency isn't charged with addition peripheral costs, such as replacing a charger or case for example.
"it really simplifies administration," Thomas said.
More importantly, it's only after the agency installs work applications , which the agency bears the costs for, that the device can be functional for work use. Since the company already absolves that cost, putting limitations on further costs could include limiting the number of operational systems for smart phones the agency supports.
Thomas said 2/3rds of government agencies currently can support BlackBerrys, just over half can support Window's Mobile and and 33 percent can also support Apple's iPhone.
"But what typically you're going to try to do is say 'Ok, we're going to support a couple of operating systems and no more,' and that's exactly to keep the costs down for IT," Thomas said.
But agencies can help themselves the most by outlining a formal mobile device policy, which surprisingly few agencies have, Thomas said.
As per Forrester Research's most recent survey, only 6 percent of public sector agency had a mobile policy in place, and 11 percent of U.S. private sector companies did.
These policies not only monitor and set guidelines for the use of agency-owned and managed devices, but also dictate the use of private devices at work.