Business mobility to the Battlefield. Discuss!

12:43 PM
Business mobility to the Battlefield. Discuss! -

We have some great events lined up. On July 31, we have our federal Citrix User Group focusing on mobility. I also get a unique privilege to serve as a panelist this week on Transformative Technologies for the Warfighter: Moving Forward with mobility. I am happy to share not only what we have learned as a society more involved in cloud and mobile computing, but also as a representative of the US public sector group that has the opportunity to talk with people around the DoD. I owe a great debt to the people of the United States Armed Forces for their vigilance gift every day, and we owe it to the warfighter to provide the latest technology to make them effective in their daily work protection our lives of those who have it.

The average age of the enlisted fighter is 29, and 43% are below the age of 26 1 . The currently enlisted as recruits sign now have never known a world without the Internet. Many of them own a smartphone on their own, and I bet that many of them have iPads and Android tablets. This is not the latest technology for them, but how we could use in their life as a fighter can be. If a mobile device gives a fighter a tactical advantage, then by all means, we should do everything we can to support these devices.

Kevin Mitnick We can not give up the security of the conversation. I had the pleasure of speaking at an event with Kevin Mitnick, the notorious pirate who was said to be able to pick up a phone and launch nuclear weapons at will. The majority of hacks were entirely based on social engineering. There were a few who were cracks or actual exploits, but even then need a lot of social engineering to make it fully effective. Mobile devices are-a new attack vector and target for hackers, social engineering and not friendly foreign entities? Absolutely. Do we need to be concerned entirely with the security at the expense of usability? Absolutely not, but we must have a balance between security and still be acceptable to actually WANT to use the device. That's one reason that security and flexibility are so important that we move forward with mobile technologies for the Warfighter. Be assured that Mobile Device Management (MDM) by itself is not a mobile strategy. The idea that mobile devices and sensitive data against-intuitive is disputed, but simply because the technology can protect data does not guarantee his safety. Snowden and Manning-defeat Suite B cryptography, nor do they carry data to and from a mobile device. The idea that the next allocation will WikiLeak data that was accessed from a mobile device is more threatening than the data being leaked from a laptop. People will find a way to use technology, no matter what, and no matter how much money is thrown at it, and security technologies. What we really need to do is ensure that mobile technology does not create NEW threats while facilitating access to information on any device.

Therefore a balanced approach that involves mobile device management and mobile application management and remote access and local data and applications is a reasonable approach to enable us to provide this generation and the next combatants with the technology they grew up on and understand. Geofencing is hardly a strategy for security and remote wipe does not guarantee the retention of data string, so a mixture of MDM, MAM, and remote access is the only way to really guarantee that data must remain within appropriate limits.

These types of mobility conversations occur in all segments of the DoD, civilian governments and state / local. Mobility is not just about the fighters on the side of the largest enterprise of the house is very concerned about mobility regarding executive mobility, teleworking and Bring Your Own Device (BYOD). When we enter these conversations the most salient point is to remember why we love mobile devices in the first place: It makes us feel good use. We value the freedom of non-captive power in the palm of our hands, liberating choice of applications, and the way we interact with these devices. This is a far cry from all authorized applications and devices that companies distribute to users. For mobile or BYOD strategy to be beneficial to the bottom line, companies must remain faithful to the idea that mobile devices give the user more productive.

On July 31, we deep dive on mobility with the help of the group of Citrix user federal , which is hosted by us in our Citrix office in Bethesda. We'll delve into the themes of

  • Customer Citrix "Day in the Life" Federal updated presentation
  • of XenMobile solutions
  • Mobility Breakout presentation tory and dealer demo
please come join other federal Citrix focused on users and administrators of the debate on mobility. This is an opportunity to discuss with other federal agencies on how mobility affects the business, and how they can create a structural change in the business of empowering users. You can register here: http://bit.ly/11r0Rai
We hope to see you at each event, and would like to hear perspectives on mobility within government
[

1 According to the USAF APC - http://www.afpc.af.mil/library/airforcepersonneldemographics.asp

Previous
Next Post »
0 Komentar