Smart phone with New York City map app

Agencies have the tools to unleash dynamic mobile services

A smart mobility platform with integrated security will let agencies at all levels focus on the real goal: transforming the way they provide services, Vervio's T.L. Neff says.

Panasonic Toughpad

4 tablets that would look good under the public-sector tree

In the season of giving -- and getting -- here are four new and forthcoming tablets that have appealing features for agencies.

People checking cellphones

Total on-the-job control of Android devices?

Software being developed by Optio Labs would control data access and app use depending on location, time of day, other apps in use and even who you’re with.

Secure keypad on digital map of world

5 programs break down the elements of an identity ecosystem

Groups will run a variety of pilots for trusted identities covering areas ranging from first-responder authentication and secure business transactions to the exchange of health care information.

Doctor using smart phone

HHS prescribes 11 basic steps for securing mobile devices

With an eye toward protecting patient privacy, HHS offers tools for keeping health data protected on mobile devices -- advice that any public-sector agency could follow.

Good Techology Corp. Vault iphone sleeve

Good Vault wears iPhone security on its sleeve

Good Technology's product fits over an iPhone 4 or 4s and contains a smart-card or microSD reader for two-factor authentication.

Amped Wireless TAN1 wi-fi adapter

Amplifier boosts long-range Wi-Fi for Windows 8 devices

Amped Wireless' compact TAN1 uses high-gain antennas to increase performance.

Smart phone cameras geotag pictures

How to disable a smart phone's geotagging feature

Pictures taken with a GPS-enabled device can give up your location, as the recent arrest of John McAfee showed. But turning off the function is not hard.

10 predictions for government IT in 2013

Consolidation, cloud and mobile computing, lots of data and the foundations of smart government are among the key trends forecasted by IDC Government Insights.

Fire in apartment building

FCC tests if 911 cell-phone calls can be traced indoors

With a growing number of 911 calls coming from cell phones, an FCC committee wants to set benchmarks on the accuracy of calls made from inside buildings.

Government citizen services

Data-driven government's goal: Personalized service

Agencies need to create a tech strategy that supports convergence of cloud, big data, mobility and Web services, a Justice CTO says.

Futuristic office computer display

8 reasons agency IT will change course in 2013

Next year is likely to be a tipping point when agencies will have to make landmark decisions about the types of client machines they use.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.