Soldier using smartphone to access Army mobile sites

Mobile devices run amok in the Army, report says

DOD's inspector general says the Army is "unaware" of some 14,000 smart phones and tablets, many of them unmanaged and unsecure.

Fixmo Secure Gesture password technology

Better than a password? Write with your finger.

For iOS and Android devices, Secure Gesture from Fixmo and Lockheed Martin lets users log in with a touch-screen gesture that can be almost impossible to duplicate.

FIPS 140 2 validated TrustChip for Trustcall on iPhone

TrustCall brings fully encrypted voice to the iPhone

With the FIPS 140-2 validated TrustChip, KoolSpan's solution is the first hardware-encrypted security for the iPhone 4 series.

North Miami Beach uses the online 311 reporting application Fix It NMB

City sees a lot more than potholes in mobile reporting apps

Cloud-based services let residents and city employees report problems; North Miami Beach wants to use that data to anticipate problems and allocate resources.

Businessman with smartphone in front of Old Executive Office Building Eisenhower

BYOD: The elements of getting it right the first time

Allowing personal mobile devices onto your network requires a lot more than platform support.

Mobile device management

MDM is only part of the story

XenMobile MDM from Citrix provides gives admins a wealth of management capabilities, which can be leveraged further when used with the other applications in the Mobile Solutions Bundle.

Armor X10 rugged tablet FDNY

FDNY medical crews to arrive at the scene with Armor tablets

The rugged tablets, along with DRS Technologies' EVDO routers, will let crew establish two-way links from the scene of an emergency to a hospital.

Tablet with data in 3D

Digital payoff at GPO: More content, 2008 costs

Shifting the focus from print to digital has produced a leaner, more efficient Government Printing Office with a growing number of digital products and delivery systems.

DOD considering BlackBerry iOS and Android devices

DOD's mobile plan still calls for multiple platforms

The department says its management plan calls for supporting multiple devices, despite a report that it would drop BlackBerry for Apple devices.

Surface RT and Surface Pro

RT vs. Pro: Which Surface is best for your agency?

The natural reaction is to go with the more powerful Pro, but the choice depends on how employees will be using the tablet.

Collage of Apple Andriod BlackBerry logos

BlackBerry to open secure workspace for Android, iOS

The company said it will soon update Blackberry Enterprise Service 10 to allow separate work and personal environments for third-party devices.

Kyocera Torque 6710

Ultra tough smart phone has tools for field work

The 4G LTE Kyocera Torque 6710 passes the toughest tests for ruggedness while still providing some nice features.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.