mobile device management (MDM)
See the following -
CIS Mobile Announces altOS on Pixel 4a Smartphones
CIS Mobile, an Acorn Growth Company and a mobile security leader, announced the availability of altOS on the Pixel 4a smartphone. By combining the latest Pixel hardware and our altOS secure mobility platform, government customers now can protect sensitive data while using the latest high-performance smartphone. CIS Mobile’s altOS is a security-enhanced Android operating system designed with the extra management, security, and privacy features needed for sensitive government use cases, and used by multiple government intelligence and defense agencies.
- Login to post comments
CIS Mobile Announces Major Update to the altOS Platform
CIS Mobile, a leader in mobile security, today announced the release of altOS 10. This new major release adds significant security, management, and control features for sensitive government user cases and updates the altOS operating system to Android 10. In addition to the new privacy features incorporated into Android 10, this major update to the altOS platform includes...Secure Mode upgrades. Secure Mode enables altOS devices to dynamically control access to peripherals that might be used to exfiltrate data from sensitive government sites, or that could reveal sensitive location data to a foreign adversary.
- Login to post comments
Forensic Scientist Identifies Suspicious 'Back Doors' Running On Every iOS Device
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices...
- Login to post comments
GSA Seeks Governmentwide Mobile Device Management Contracts
The General Services Administration is seeking governmentwide contracts with vendors who can ensure the security of federal employees’ smartphones and tablets and the applications that run on them, solicitation documents show. Read More »
- Login to post comments
Healthcare CIOs Juggle More Mobile Challenges
As mobile devices multiply in numbers and grow more sophisticated, healthcare CIOs are facing all kinds of new challenges in distributing information and keeping networks secure. Read More »
- Login to post comments
The Goldilocks Problem of Mobile Security - Usability vs. Security
The “Goldilocks and the Three Bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for government and organizations. The theme is trade-offs between the usability of a mobile device and security for confidential organizational data such as conversations, messages, documents, images, and locations. The security, confidentiality, and integrity of communication are key. However, if the usability of mobile devices for end-users, administrators, and organizations is too challenging, then the availability of the data for productive work is lost.
- Login to post comments
VA Awards Contract For Mobile Device Management, Apps Store
The Department of Veterans Affairs has awarded a long-awaited contract to build a system that will manage a stable of mobile devices officials hope will eventually grow to 100,000 handhelds and tablets. Read More »
- Login to post comments
VA BYOD Reimbursement Strategy Isn't IT's Call, Says Baker
Who pays for data plans under a forthcoming bring-your-own-device strategy at the Veterans Affairs Department? Don't ask Chief Information Officer Roger Baker--determining that isn't his job, he says. Read More »
- Login to post comments
VA Gears Up for Buy of Up to 100,000 Tablet Computers
In one of the largest moves to mobile devices by a civilian agency, the Veterans Affairs Department plans to procure up to 100,000 tablet computers, the agency recently announced. Read More »
- Login to post comments
Who Controls Your Smartphone? And How to Leverage Open Source to Prevent it from Spying on You
There are many things about today’s world that warrant us asking that question. Do you or the mobile vendor control your smartphones? If you are a consumer, small or medium business (SMB) -- the answer is the vendor...What if you are a large enterprise or a government agency? The answer is still the vendor...How can the user regain control? Not all vendors have locked devices and walled gardens. Google’s line of Pixel hardware, for example, is a mid-market solution whose bootloader allows locking and re-locking. Pixels support two versions of Android. Google Mobile Services (GMS), where free services are tied to data monetization and a UX like Apple and Samsung devices. Secondly, Pixels can run Android Open-Source Project (AOSP) code that shares the same strengths as the GMS build, but the customer controls the code base and updates. There are several companies that are selling AOSP operating system builds for Pixel and other unlockable/lockable mobile phones and tablets...
- Login to post comments