SlideShare a Scribd company logo
1 of 4
GameChanger
Game Changing Technologyto MeetAgency Missions
MobilitySurge Raises SecurityStakes
The conversationaroundmobilityandmobile securityhastakenona new sense of urgencyinthe federal IT
community.
Until recently,federal agenciessawmobile technologyasa promisingtool primarilyforimprovingthe
productivityof employeeswhoseworkoftentakesthemonthe road—the so-calledmobile warriors.Today,
agenciesrecognize the federalworkforce hasbecome amobile workforce,withemployeesexpectingaccessto
informationandservicesatanytime,fromanywhere,usinganydevice.
Agenciesare responding.Forexample,the demandforwirelesstechnologyissurgingacrossgovernment.Earlier
thisyear,the General ServicesAdministrationreportedthe federal government’suse of wirelessblanket
purchase agreementsincreasedby500 percentinfiscal 2015.
In August,the Office of ManagementandBudgetdirectedagenciestostreamline mobile solutionprocureme nt
so theycan realize bettercost-savingsandrelatedefficiencies.OMBalsotoldagenciestobeginreportingdataon
mobile serviceusage andpricingtoa centrallymanagedsystemonaquarterlybasisto helpeliminate
unnecessaryinventoryandservices.
Nowthe questioniswhetheragenciesare puttinginplace the appropriate securitymeasures.The Departmentof
HomelandSecurityandGSA recentlylaunchedaninitiativetoscope outthe mobile securitythreatlandscapein
the federal government.The initiative,mandatedbythe CybersecurityActof 2015, includesarequestfor
information,publishedinJuly,andtwoindustrydays,whichwill involve subjectmatterexpertsfromleading
mobile manufacturersandservice providers.
“Mobile devicesandthe broadermobile ecosystemshare manyof the same securitythreatsassociatedwith
traditional desktopandlaptopcomputers,”the RFIstates.“Additionally,the impactof manyof these threatscan
be magnified—andnew threatsare introduced—bythe unique attributesof mobiledevices.”
One of the primaryconcernsisthe continuedpresence of “shadow”mobile IT—thatis,unauthorizedmobile
solutionsbeingusedtoaccessgovernmentnetworks.Industrysurveyshave confirmedwhatagencieshave long
suspected:Employeesare usingtheirpersonal devicestoaccesse-mail andotherservices.If these devicesaren’t
equippedwithadequate securitymeasures,they’re puttinggovernmentnetworksatrisk.
Federal ITmanagersunderstandmobiledevices,whethergovernment-oremployee-owned,are oftenusedfor
dual purposes,withauthorizationorwithout.The bestcourse istoensure the necessarysafeguardsare inplace.
In short,agenciesneedtosee mobilesecuritynotassomethingthatinhibitsproductivity,butasa facilitator.
[[SIDEBAR]]
DEFINING THE MOBILE ECOSYSTEM
In itsrequestforinformation,DHSandGSA ask mobilitymanufacturersandservice-providerstoidentifyhow
theirproducts/services/solutionsaddressthree primarymobile enterprisethreats:
 Exploitationof Enterprise MobilityManagement/MobileDevice Managementsystemsorobtaining
administratorcredentials
 Exploitationof private enterprise mobile applicationstoresbyobtainingadministratorcredentials
 Exploitationof private enterprise mobile applicationstoresbysubvertingapplicationsecurityvetting
procedures
 The RFI alsolooksat threatsto the larger mobile ecosystem.Inadditiontomobile enterprisethreats,the
RFI looksat fourotherareas:
 Application-basedthreats(e.g.,appsthatgathersensitive information)
 Operatingsystem/firmware/software threats(e.g.,exploitationof the OSor lower-level device
components)
 Physical threats(e.g.,lostorstolendevices)
 Network-basedthreats(e.g.,collectionormanipulationof voice anddatacommunicationstoandfroma
device)
DHS, NIST Lead Wayon Mobile Security
The Departmentof HomelandSecurity(DHS) andthe National Instituteof StandardsandTechnology(NIST) both
have multiple effortsunderwaytostrengthenmobile security.Amongotherissues,DHSisfocusedonmobile
applicationsecurity.Aspartof a five-yearcybersecuritybroadagencyannouncement,DHSislookingforindustry
expertstodevelopnew toolstoassistmobile appdevelopers,analystsandsecurityornetworkoperators.
One area of interestiscontinuousvalidationandthreatprotectionformobile applications.“Thisentails
developingthe capabilitytoanticipate and,if needed,reacttofuture threatsand vulnerabilitieswhile
continuouslymonitoringamobile device’ssecurityposture,”the BAA states.Anotherfocusareaisintegrating
securitythroughoutthe mobile applicationlifecycle,whichincludesdevelopingasecurityframeworkformobile
applicationdevelopment.
Separately,DHSisworkingwithNorthropGrummanona biometricsolutionintendedtoeliminatethe needfor
passwordsonmobile devices.The projectwill combinebehavioralsensingandmodelingtechniquesto
authenticate useridentities.
Meanwhile,NIST’sNational CybersecurityCenterof Excellence isworkingonstandardsdesignedtostreamline
mobile authenticationforfirst responders.Thiseffortisaimedatmaintainingsecure accesstocritical resources
withoutobstructinginformation-sharingamongthe variousfirstrespondersona scene.
Many publicsafetyagenciesare investinginmulti-factorauthenticationsystemsasa wayto control access to
sensitiveinformation.However,thiscanbe a problemif first-respondersneedtoaccessmultiplesystemswhile
on the scene,witheachrequiringmulti-factorauthentication.
“Whenrespondingtoan emergency,publicsafetypersonnel require on-demandaccesstodata,”the NISTproject
descriptionstates.“The abilitytoquicklyandsecurelyauthenticate inordertoaccesspublicsafetydataiscritical
to ensuringthatfirstresponderscandeliverpropercare andsupportduringan emergency.”
The goal isto make it possible forall applicationsinagivenenvironmenttorecognize anidentityacceptedbyone
of them,providingsinglesign-onfunctionality.
[[SIDEBAR]]
SIZE UP MOBILITY RISKS
People understandthe securityrisksthatcome withmobility,accordingtoarecentstudyconductedbythe
PonemonInstitute.The survey,whichcoverednearly600 IT and securityexecutivesinthe private andpublic
sectors,foundmobile usersunderstandthe risksandbelieve the risksare growing.
Here are some keydata points:
83% say mobile devicesare susceptible tohacking
70% believe poormobile securityhas likelyresultedina data breach
33% say their organizationis “vigilant” inprotectingsensitive data from unauthorizedaccess
30% say their organizationspecifieswhat data can be storedon a personal device
In addressingthe ongoingbalance of access and security,mobile deviceshave found theirplace.
For more information,please visit: samsung.com/government
Mobile DevicesDrive Productivity
In addressingthe ongoingbalance of accessandsecurity,mobile deviceshave foundtheirplace.
Federal agenciesface adelicate balance whenitcomestomanagingtheirnetworkof mobiledevices.
Theymust provide fieldworkersandanyone usingamobile device withsufficientaccessinorderto do
theirjobsand meetmissionrequirements.Theymustalsoensure the devicesare sufficientlysecure—
whichisa significantchallenge consideringthe potentiallysensitive nature of dataagencyworkersmay
be accessingand the constantlyevolvingthreatlandscape.
Balancingthe needforsecuritywhile maintainingproductivityisachallenge,butthe toolsare there to
helpease the process.“There are technologiesthathardenthe device andprovide the necessary
certificationsall the wayfromthe hardware tothe applicationlayer—the partof device the usersees—
while keepingsimplicityof device use,”saysJohnnyOvercast,directorof governmentsalesforSamsung
ElectronicsAmerica.“We provide defense grade securitywhileatthe same time maintainingusability.”
The impact of not equippingthe workforce withmobile devicescanalmostoutweighthe potential
securityrisks,dependingonthe use cases.Studiescorroborate thatequippingaworkforce withmobile
devicesincreasesproductivityandworkersatisfaction.A recentstudyconductbythe Mobile Work
Exchange surveyed300 governmentemployeesfromanumberof differentfederalagencies.The survey
found95 percentof the respondentsbelieve usingmobile deviceshasimprovedtheirwork
performance.Some of the notable surveyfindingsinclude:
 76 percentindicate usingmobile deviceshasincreasedtheirproductivity
 61 percentbelieve usingmobiledevicesimprovescommunication
 47 percentbelieve usingmobiledevicesimprovescollaboration
 62 percentbelieve usingmobiledevicesimproveshelpsimprove customerservice
 58 percentfeel theiragencycouldmake betteruse of mobiledevices
“Governmentagenciesare takingadvantage of these technologies,”saysOvercast.“Theycan have
confidence inthe level of security,butalsoexecute theirmissionmore efficientlywithline of business
solutions.”
While deployingmobiledevicesforuse infederal agencyscenariosisalwaysabalancingact,the current
level of securityprovidedbycommercialsolutionslike Samsungprovidessecure access,while continuing
to enable productivityimprovements.“Itdoesn’tsacrifice usability,whetheritstactical militaryorlaw
enforcementormobilizingenterpriseapps,”he says.“The workforce canuse these devicestoincrease
productivityandefficiency.”
Studieshave evenshownthatnotprovidingaccesstomobile devicescanhave a negative effecton
workerproductivity.Accordingtoa recentGallupsurvey,eachdisengagedordisconnectedemployee
costs an organizationabout$3,400 for every$10,000 inannual salary.
Anotherstudybythe EconomistIntelligenceUnit(EIU) revealedademonstrable connectionbetweena
mobile enabledworkforce andincreasedemployee engagement.The EIUsurveyed1,865 workersfrom
across the globe andfoundorganizationsrankedasmobile “pioneers”saw a16 percentboostin
productivity.Thatstatistichasconcrete impact.Ina 40-hour work week,a16 percentincrease in
productivitytranslatesto6.4 hours perweek.That’s41 workingdaysor effectivelyeightweeksof
increasedproductivityfromeveryemployee.
SECURITY FROM THE GROUNDUP
Mobile securitywill alwaysbe anissue,butsecuritytechnologieshave keptpace withthe evolving
landscape of cyberthreats.The SamsungKnox architecture isdesignedtoprovide securityatall levels.
Securityfunctionsare builtintothe hardware andthe device software.
“SamsungKnox securesall the wayfromthe hardware or fromwhendevice turnson—the boot
process—all the wayupthroughthe applicationlayer,”saysOvercast.BootTime Inspectionensuresthe
integrityof all bootingcomponentsistestedeverytime someoneactivatesthe device.RunTime
Protectionpreventsmalicioususersfrommakinganycode changestothe kernel andensuresthe
integrityof datastoredon the device.
The securityfunctionsof the SamsungKnox architecture are builtaroundfive principles:
 Software integrity
 Leastprivilege
 Data storage protection
 Networkprotection
 Data isolation
In fact,SamsungKnox was giventhe most“Strong”ratingsof anymobile securityplatforminthe April
2016 Gartner researchreport,“Mobile Device Security:A Comparisonof Platforms.”AlsoSamsung’s
federal customerbase includesthe DoD,intelligence agencies,andall levelsof law enforcement,from
federal tostate and local.Sointhe balancingact of continuingtoenable the federal workforcewith
mobile devices,the securityposture issolidandthe productivityenhancementsare proven.
For more information,please visit: samsung.com/government

More Related Content

What's hot

IRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android ApplicationsIRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android ApplicationsIRJET Journal
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019Merry D'souza
 
Mobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva SundararamanMobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva Sundararamanagilemaine
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondCompTIA
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Fuji Xerox Australia
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigmKumar Gaurav
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementThe Marketing Distillery
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentationAlessandro Bottega
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
Report 2 empathic things – intimate technology - from wearables to biohackin...
Report 2  empathic things – intimate technology - from wearables to biohackin...Report 2  empathic things – intimate technology - from wearables to biohackin...
Report 2 empathic things – intimate technology - from wearables to biohackin...Rick Bouter
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersEric Wong
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlookBloomberg LP
 
The magic of advanced technology: Predicting real-time behaviour & needs via ...
The magic of advanced technology: Predicting real-time behaviour & needs via ...The magic of advanced technology: Predicting real-time behaviour & needs via ...
The magic of advanced technology: Predicting real-time behaviour & needs via ...FAIR PLAY AD / @VeronicaRRSouza
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)CM Research
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...eraser Juan José Calderón
 
mHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal overview - mhealth apps - mobile health appsmHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal overview - mhealth apps - mobile health appsmHealth Journal
 

What's hot (20)

IRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android ApplicationsIRJET - Detecting the Advertisement Behavior in Android Applications
IRJET - Detecting the Advertisement Behavior in Android Applications
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
 
Mobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva SundararamanMobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva Sundararaman
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
 
Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
M2M innovations invigorate warehouse management
M2M innovations invigorate warehouse managementM2M innovations invigorate warehouse management
M2M innovations invigorate warehouse management
 
Enterprise Mobility presentation
Enterprise Mobility presentationEnterprise Mobility presentation
Enterprise Mobility presentation
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Report 2 empathic things – intimate technology - from wearables to biohackin...
Report 2  empathic things – intimate technology - from wearables to biohackin...Report 2  empathic things – intimate technology - from wearables to biohackin...
Report 2 empathic things – intimate technology - from wearables to biohackin...
 
Networking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile WorkersNetworking Plus December 2014: Connecting Mobile Workers
Networking Plus December 2014: Connecting Mobile Workers
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlook
 
The magic of advanced technology: Predicting real-time behaviour & needs via ...
The magic of advanced technology: Predicting real-time behaviour & needs via ...The magic of advanced technology: Predicting real-time behaviour & needs via ...
The magic of advanced technology: Predicting real-time behaviour & needs via ...
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)2014 Global Trend Forecast (Technology, Media & Telecoms)
2014 Global Trend Forecast (Technology, Media & Telecoms)
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
 
mHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal overview - mhealth apps - mobile health appsmHealth Journal overview - mhealth apps - mobile health apps
mHealth Journal overview - mhealth apps - mobile health apps
 

Viewers also liked

Jime pf
Jime pfJime pf
Jime pfame234
 
Trico Centrre Handbook FIRST SUBMISSION
Trico Centrre Handbook FIRST SUBMISSIONTrico Centrre Handbook FIRST SUBMISSION
Trico Centrre Handbook FIRST SUBMISSIONJoseph Waring
 
Ziqiang Ma - Reference Letter2015
Ziqiang Ma - Reference Letter2015Ziqiang Ma - Reference Letter2015
Ziqiang Ma - Reference Letter2015ziqiang Maziqiang
 
Lianna_J_ZIto_Openstack_I
Lianna_J_ZIto_Openstack_ILianna_J_ZIto_Openstack_I
Lianna_J_ZIto_Openstack_ILianna Zito
 
Atkinson_Vinette_resume_Sept 2016
Atkinson_Vinette_resume_Sept 2016Atkinson_Vinette_resume_Sept 2016
Atkinson_Vinette_resume_Sept 2016Vinette Atkinson
 
Presentaciócopia sg
Presentaciócopia sgPresentaciócopia sg
Presentaciócopia sgmjvercher
 
Revitalizing your boring Retrospectives_3.0final
Revitalizing your boring Retrospectives_3.0finalRevitalizing your boring Retrospectives_3.0final
Revitalizing your boring Retrospectives_3.0finalTerri Spencer
 

Viewers also liked (10)

Jime pf
Jime pfJime pf
Jime pf
 
Trico Centrre Handbook FIRST SUBMISSION
Trico Centrre Handbook FIRST SUBMISSIONTrico Centrre Handbook FIRST SUBMISSION
Trico Centrre Handbook FIRST SUBMISSION
 
Margarita useche
Margarita usecheMargarita useche
Margarita useche
 
Retargeting
RetargetingRetargeting
Retargeting
 
Ziqiang Ma - Reference Letter2015
Ziqiang Ma - Reference Letter2015Ziqiang Ma - Reference Letter2015
Ziqiang Ma - Reference Letter2015
 
Lianna_J_ZIto_Openstack_I
Lianna_J_ZIto_Openstack_ILianna_J_ZIto_Openstack_I
Lianna_J_ZIto_Openstack_I
 
Atkinson_Vinette_resume_Sept 2016
Atkinson_Vinette_resume_Sept 2016Atkinson_Vinette_resume_Sept 2016
Atkinson_Vinette_resume_Sept 2016
 
Presentaciócopia sg
Presentaciócopia sgPresentaciócopia sg
Presentaciócopia sg
 
Revitalizing your boring Retrospectives_3.0final
Revitalizing your boring Retrospectives_3.0finalRevitalizing your boring Retrospectives_3.0final
Revitalizing your boring Retrospectives_3.0final
 
Medios inalámbricos y access point
Medios inalámbricos y access pointMedios inalámbricos y access point
Medios inalámbricos y access point
 

Similar to Samsung_FCW GameChanger

Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyMobile Labs
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2CMR WORLD TECH
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising businessSno Jutt
 
Actionable insights
Actionable insightsActionable insights
Actionable insightsTim Youm
 
Project 3:Government Mobile Apps Security Assessment & Strategy
Project 3:Government Mobile Apps Security Assessment & StrategyProject 3:Government Mobile Apps Security Assessment & Strategy
Project 3:Government Mobile Apps Security Assessment & StrategyArshad ali
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programsIBM Software India
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of GlobalizationAujas Networks Pvt. Ltd.
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsIBM Software India
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableCapgemini
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 

Similar to Samsung_FCW GameChanger (20)

Strategic Private Cloud - When and Why
Strategic Private Cloud - When and WhyStrategic Private Cloud - When and Why
Strategic Private Cloud - When and Why
 
Mobile App Development
Mobile App DevelopmentMobile App Development
Mobile App Development
 
Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2Mobile Security - Risk-to-revenue-v2
Mobile Security - Risk-to-revenue-v2
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
Actionable insights
Actionable insightsActionable insights
Actionable insights
 
The Workplace of Things
The Workplace of ThingsThe Workplace of Things
The Workplace of Things
 
Why Managing Mobility Matters
Why Managing Mobility MattersWhy Managing Mobility Matters
Why Managing Mobility Matters
 
Project 3:Government Mobile Apps Security Assessment & Strategy
Project 3:Government Mobile Apps Security Assessment & StrategyProject 3:Government Mobile Apps Security Assessment & Strategy
Project 3:Government Mobile Apps Security Assessment & Strategy
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Developing more effective mobile enterprise programs
Developing more effective mobile enterprise programsDeveloping more effective mobile enterprise programs
Developing more effective mobile enterprise programs
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
Mobile-Applications-Testing
Mobile-Applications-TestingMobile-Applications-Testing
Mobile-Applications-Testing
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
Securely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology InnovationsSecurely Adopting Mobile Technology Innovations
Securely Adopting Mobile Technology Innovations
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerable
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 

Samsung_FCW GameChanger

  • 1. GameChanger Game Changing Technologyto MeetAgency Missions MobilitySurge Raises SecurityStakes The conversationaroundmobilityandmobile securityhastakenona new sense of urgencyinthe federal IT community. Until recently,federal agenciessawmobile technologyasa promisingtool primarilyforimprovingthe productivityof employeeswhoseworkoftentakesthemonthe road—the so-calledmobile warriors.Today, agenciesrecognize the federalworkforce hasbecome amobile workforce,withemployeesexpectingaccessto informationandservicesatanytime,fromanywhere,usinganydevice. Agenciesare responding.Forexample,the demandforwirelesstechnologyissurgingacrossgovernment.Earlier thisyear,the General ServicesAdministrationreportedthe federal government’suse of wirelessblanket purchase agreementsincreasedby500 percentinfiscal 2015. In August,the Office of ManagementandBudgetdirectedagenciestostreamline mobile solutionprocureme nt so theycan realize bettercost-savingsandrelatedefficiencies.OMBalsotoldagenciestobeginreportingdataon mobile serviceusage andpricingtoa centrallymanagedsystemonaquarterlybasisto helpeliminate unnecessaryinventoryandservices. Nowthe questioniswhetheragenciesare puttinginplace the appropriate securitymeasures.The Departmentof HomelandSecurityandGSA recentlylaunchedaninitiativetoscope outthe mobile securitythreatlandscapein the federal government.The initiative,mandatedbythe CybersecurityActof 2015, includesarequestfor information,publishedinJuly,andtwoindustrydays,whichwill involve subjectmatterexpertsfromleading mobile manufacturersandservice providers. “Mobile devicesandthe broadermobile ecosystemshare manyof the same securitythreatsassociatedwith traditional desktopandlaptopcomputers,”the RFIstates.“Additionally,the impactof manyof these threatscan be magnified—andnew threatsare introduced—bythe unique attributesof mobiledevices.” One of the primaryconcernsisthe continuedpresence of “shadow”mobile IT—thatis,unauthorizedmobile solutionsbeingusedtoaccessgovernmentnetworks.Industrysurveyshave confirmedwhatagencieshave long suspected:Employeesare usingtheirpersonal devicestoaccesse-mail andotherservices.If these devicesaren’t equippedwithadequate securitymeasures,they’re puttinggovernmentnetworksatrisk. Federal ITmanagersunderstandmobiledevices,whethergovernment-oremployee-owned,are oftenusedfor dual purposes,withauthorizationorwithout.The bestcourse istoensure the necessarysafeguardsare inplace. In short,agenciesneedtosee mobilesecuritynotassomethingthatinhibitsproductivity,butasa facilitator. [[SIDEBAR]] DEFINING THE MOBILE ECOSYSTEM In itsrequestforinformation,DHSandGSA ask mobilitymanufacturersandservice-providerstoidentifyhow theirproducts/services/solutionsaddressthree primarymobile enterprisethreats:  Exploitationof Enterprise MobilityManagement/MobileDevice Managementsystemsorobtaining administratorcredentials  Exploitationof private enterprise mobile applicationstoresbyobtainingadministratorcredentials  Exploitationof private enterprise mobile applicationstoresbysubvertingapplicationsecurityvetting procedures  The RFI alsolooksat threatsto the larger mobile ecosystem.Inadditiontomobile enterprisethreats,the RFI looksat fourotherareas:  Application-basedthreats(e.g.,appsthatgathersensitive information)
  • 2.  Operatingsystem/firmware/software threats(e.g.,exploitationof the OSor lower-level device components)  Physical threats(e.g.,lostorstolendevices)  Network-basedthreats(e.g.,collectionormanipulationof voice anddatacommunicationstoandfroma device) DHS, NIST Lead Wayon Mobile Security The Departmentof HomelandSecurity(DHS) andthe National Instituteof StandardsandTechnology(NIST) both have multiple effortsunderwaytostrengthenmobile security.Amongotherissues,DHSisfocusedonmobile applicationsecurity.Aspartof a five-yearcybersecuritybroadagencyannouncement,DHSislookingforindustry expertstodevelopnew toolstoassistmobile appdevelopers,analystsandsecurityornetworkoperators. One area of interestiscontinuousvalidationandthreatprotectionformobile applications.“Thisentails developingthe capabilitytoanticipate and,if needed,reacttofuture threatsand vulnerabilitieswhile continuouslymonitoringamobile device’ssecurityposture,”the BAA states.Anotherfocusareaisintegrating securitythroughoutthe mobile applicationlifecycle,whichincludesdevelopingasecurityframeworkformobile applicationdevelopment. Separately,DHSisworkingwithNorthropGrummanona biometricsolutionintendedtoeliminatethe needfor passwordsonmobile devices.The projectwill combinebehavioralsensingandmodelingtechniquesto authenticate useridentities. Meanwhile,NIST’sNational CybersecurityCenterof Excellence isworkingonstandardsdesignedtostreamline mobile authenticationforfirst responders.Thiseffortisaimedatmaintainingsecure accesstocritical resources withoutobstructinginformation-sharingamongthe variousfirstrespondersona scene. Many publicsafetyagenciesare investinginmulti-factorauthenticationsystemsasa wayto control access to sensitiveinformation.However,thiscanbe a problemif first-respondersneedtoaccessmultiplesystemswhile on the scene,witheachrequiringmulti-factorauthentication. “Whenrespondingtoan emergency,publicsafetypersonnel require on-demandaccesstodata,”the NISTproject descriptionstates.“The abilitytoquicklyandsecurelyauthenticate inordertoaccesspublicsafetydataiscritical to ensuringthatfirstresponderscandeliverpropercare andsupportduringan emergency.” The goal isto make it possible forall applicationsinagivenenvironmenttorecognize anidentityacceptedbyone of them,providingsinglesign-onfunctionality. [[SIDEBAR]] SIZE UP MOBILITY RISKS People understandthe securityrisksthatcome withmobility,accordingtoarecentstudyconductedbythe PonemonInstitute.The survey,whichcoverednearly600 IT and securityexecutivesinthe private andpublic sectors,foundmobile usersunderstandthe risksandbelieve the risksare growing. Here are some keydata points: 83% say mobile devicesare susceptible tohacking 70% believe poormobile securityhas likelyresultedina data breach 33% say their organizationis “vigilant” inprotectingsensitive data from unauthorizedaccess 30% say their organizationspecifieswhat data can be storedon a personal device
  • 3. In addressingthe ongoingbalance of access and security,mobile deviceshave found theirplace. For more information,please visit: samsung.com/government Mobile DevicesDrive Productivity In addressingthe ongoingbalance of accessandsecurity,mobile deviceshave foundtheirplace. Federal agenciesface adelicate balance whenitcomestomanagingtheirnetworkof mobiledevices. Theymust provide fieldworkersandanyone usingamobile device withsufficientaccessinorderto do theirjobsand meetmissionrequirements.Theymustalsoensure the devicesare sufficientlysecure— whichisa significantchallenge consideringthe potentiallysensitive nature of dataagencyworkersmay be accessingand the constantlyevolvingthreatlandscape. Balancingthe needforsecuritywhile maintainingproductivityisachallenge,butthe toolsare there to helpease the process.“There are technologiesthathardenthe device andprovide the necessary certificationsall the wayfromthe hardware tothe applicationlayer—the partof device the usersees— while keepingsimplicityof device use,”saysJohnnyOvercast,directorof governmentsalesforSamsung ElectronicsAmerica.“We provide defense grade securitywhileatthe same time maintainingusability.” The impact of not equippingthe workforce withmobile devicescanalmostoutweighthe potential securityrisks,dependingonthe use cases.Studiescorroborate thatequippingaworkforce withmobile devicesincreasesproductivityandworkersatisfaction.A recentstudyconductbythe Mobile Work Exchange surveyed300 governmentemployeesfromanumberof differentfederalagencies.The survey found95 percentof the respondentsbelieve usingmobile deviceshasimprovedtheirwork performance.Some of the notable surveyfindingsinclude:  76 percentindicate usingmobile deviceshasincreasedtheirproductivity  61 percentbelieve usingmobiledevicesimprovescommunication  47 percentbelieve usingmobiledevicesimprovescollaboration  62 percentbelieve usingmobiledevicesimproveshelpsimprove customerservice  58 percentfeel theiragencycouldmake betteruse of mobiledevices “Governmentagenciesare takingadvantage of these technologies,”saysOvercast.“Theycan have confidence inthe level of security,butalsoexecute theirmissionmore efficientlywithline of business solutions.” While deployingmobiledevicesforuse infederal agencyscenariosisalwaysabalancingact,the current level of securityprovidedbycommercialsolutionslike Samsungprovidessecure access,while continuing to enable productivityimprovements.“Itdoesn’tsacrifice usability,whetheritstactical militaryorlaw enforcementormobilizingenterpriseapps,”he says.“The workforce canuse these devicestoincrease productivityandefficiency.” Studieshave evenshownthatnotprovidingaccesstomobile devicescanhave a negative effecton workerproductivity.Accordingtoa recentGallupsurvey,eachdisengagedordisconnectedemployee costs an organizationabout$3,400 for every$10,000 inannual salary. Anotherstudybythe EconomistIntelligenceUnit(EIU) revealedademonstrable connectionbetweena mobile enabledworkforce andincreasedemployee engagement.The EIUsurveyed1,865 workersfrom across the globe andfoundorganizationsrankedasmobile “pioneers”saw a16 percentboostin productivity.Thatstatistichasconcrete impact.Ina 40-hour work week,a16 percentincrease in
  • 4. productivitytranslatesto6.4 hours perweek.That’s41 workingdaysor effectivelyeightweeksof increasedproductivityfromeveryemployee. SECURITY FROM THE GROUNDUP Mobile securitywill alwaysbe anissue,butsecuritytechnologieshave keptpace withthe evolving landscape of cyberthreats.The SamsungKnox architecture isdesignedtoprovide securityatall levels. Securityfunctionsare builtintothe hardware andthe device software. “SamsungKnox securesall the wayfromthe hardware or fromwhendevice turnson—the boot process—all the wayupthroughthe applicationlayer,”saysOvercast.BootTime Inspectionensuresthe integrityof all bootingcomponentsistestedeverytime someoneactivatesthe device.RunTime Protectionpreventsmalicioususersfrommakinganycode changestothe kernel andensuresthe integrityof datastoredon the device. The securityfunctionsof the SamsungKnox architecture are builtaroundfive principles:  Software integrity  Leastprivilege  Data storage protection  Networkprotection  Data isolation In fact,SamsungKnox was giventhe most“Strong”ratingsof anymobile securityplatforminthe April 2016 Gartner researchreport,“Mobile Device Security:A Comparisonof Platforms.”AlsoSamsung’s federal customerbase includesthe DoD,intelligence agencies,andall levelsof law enforcement,from federal tostate and local.Sointhe balancingact of continuingtoenable the federal workforcewith mobile devices,the securityposture issolidandthe productivityenhancementsare proven. For more information,please visit: samsung.com/government