DoD announces new mobile strategy
The Defense Department released a mobile device strategy on June 15, 2012. The plan focuses on three areas considered crucial to mobility: wireless infrastructure, the devices themselves, and mobile applications.
“The Department of Defense is taking a leadership role in leveraging mobile device technology to improve information sharing, collaboration and efficiencies,” said Teri Takai, the department’s chief information officer. “As today’s DoD personnel become increasingly mobile, a wide variety of devices offers unprecedented opportunities to advance the operational effectiveness of the DoD workforce. This strategy will allow mobile activities across the department to converge towards a common vision and approach.”
Among the challenges in implementing this new strategy is ensuring that there are appropriate certification and validation strategies in place that will facilitate the use of these devices on defense networks.
BYOD – Bring Your Own Device – has become one of the most important issues in security today. At the Gartner conference last week, analysts described how hackers have been able to hijack data and calls on mobile devices through malware and spoofing.
Gartner recommends a layered strategy for fraud prevention on mobile devices that starts with endpoint and navigation security and moves to behavior analysis across the various channels the users engage in. The DoD plan starts down this road. “The architecture must enable the management of mobile devices, applications and network connections to secure the interfaces between DoD networks and commercial networks,” the strategy states. “Additionally, it must employ DoD Public Key Infrastructure security, access and identification controls at the network, device and application levels.”
For more information about how layered security can help mitigate fraud and data loss for your mobile users, contact us.
Recommended For You
Mobile Usage is Changing Member Experience Did you know 88% of U.S. online adults now use a smartphone?[i] Living in an […]
A Two-step Authentication Approach Consumers are always on the go, using digital devices to make purchases, check account balances and […]
Meet Credit Union Members Where They Want to Do Business. It takes more than a “smile and a handshake” to […]
From movies like the “Big Short” to today’s history lessons, the Great Recession is well documented. I’ve worked in the […]