NetMotion Wireless A Primer for Government Agencies: Mobilizing Public Services eBook
a primer for government agenciesMOBILIZING PUBLIC SERVICE eBook
Share this eBookINTRODUCTIONGovernment agencies such as lawenforcement and first responders havealways been early users of mobilecomputing technologies.The reason is simple: their job dutiesrequire access to real-time information inorder to safely complete their work.(continue reading...)49121623a primer for government agenciesMOBILIZING PUBLIC SERVICE eBookMOBILE COMPUTING FORGOVERNMENTTHE ELEMENTS OF AMOBILE DEPLOYMENTTHE UNSEEN CHALLENGE:SEAMLESS CONNECTIVITYMANAGING A MOBILEDEPLOYMENTRELIABILITY TO GO: NETMOTIONWIRELESS MOBILITY XE MOBILE VPN
Share this eBookINTRODUCTIONAs mobile computing has evolved and equipmentand service costs have decreased, more governmentagencies are realizing the productivity increasesgarnered by equipping workers with laptops, tabletPCs and smart handheld devices. Now a wide arrayof government organizations are deploying mobilecomputing technologies to improve public service,increase worker productivity and better leveragebudgetary resources.This eBook outlines examples of mobile technologieswithin different government agencies and details thekey components that any organization should consideras they mobilize their workforce.
MOBILE COMPUTING FOR GOVERNMENTlaw enforcementIn most jurisdictions, police and sheriff’s departmentshave been the innovators in mobile computing.Typically the first application for these deploymentsis computer-aided dispatch which delivers completeinformation about a call faster than would be possibleusing radio-only dispatch. This speeds response timeand enhances officer safety.POLICE OFFICERS USE MOBILEDEVICES TO:• Access federal Criminal JusticeInformation System (CJIS) data• Update incident reports stored inrecords management systems (RMS)in realtime• View images of missing children,fingerprints or photos of suspects• Access other law enforcementinformation on the Internet• Run drivers’ license checks• Check e-mail and access intranets• Access case records, incident reportsand call history for doing fieldinvestigations• Stream video traffic from dashboard-mounted camerasWIRELESS DATA ACCESS CANSAVE OFFICERS TIMEAND THEIR LIVES.
5emergency medical servicesVital medical information about patients gathered onthe scene and during transport to the hospital hastypically been gathered on paper forms, and enteredlater into EMS systems by hand. This time-consumingdouble entry can delay treatment at the hospital.As a growing number of EMS departments havefound, entering the clinical data directly into a laptopcomputer and transmitting it directly to the receivinghospital via wireless networks speeds up this process,MEANING BETTER RESULTS FOR THE PATIENTSAND PHYSICIANS.public worksPublic works involves all kinds of tasks,from patching roads to clearing sewersto repairing park benches. These aregenerally outdoor jobs, in far-flunglocations, requiring different kinds of toolsand equipment.Coordinating and scheduling crews andequipment, directing them to variouslocations and maximizing use of theworking day is MADE MUCH EASIER BYDEPLOYING A MOBILE DATA SOLUTION.Crews can access maps, plans andschedules, and update work orders andinspection data while still at the job sites.REPORTS ARE FILED FASTER, PROJECTSCAN BE REVIEWED ON-THE-FLY,AND PERSONNEL AND EQUIPMENTRESOURCES BETTER UTILIZED.
Share this eBookfire departmentsFire departments are deploying CAD applicationsfor the same reasons as police departments – TOFOSTER MORE INFORMED, MORE EFFECTIVE ANDFASTER RESPONSES.Response pre-plans can include building maps,information on suppression systems, hydrantlocations and exactly where gas and power shutoffsmay be accessed. Pre-plans also detail hazardousmaterials on-site.Some newer systems link vehicles with GPS systems,so dispatchers know exactly where each unit is. Thisis extremely useful in rural counties or in congestedurban areas where transit time could be an issue.Often, a unit already in the field could be closer to anincident than one in the nearest station.RESPONDERS USE MOBILEDATA ACCESS TO CONFIRMINFORMATION ABOUT RISKSSO THEY CAN BETTER PROTECTTHEMSELVES AND THE PUBLIC.
7health, safety andenvironmental inspectiondepartmentsHealth, safety and environmental department workersconstitute a broad group of government employeeswho perform inspections and compliance monitoringfor occupational safety and health regulations. Inspectors complete paper reports, update existing reports, and either fax or drop off completed paperwork for processing.DEPLOYING MOBILE DEVICES AND REAL-TIMEDATA ACCESS VIA CONNECTION TO CELLULARDATA NETWORKS HAS DRAMATICALLY IMPACTEDINSPECTOR PRODUCTIVITY. Reports and data records are updated on the spot and violationsand remediation plans are filed before the inspectorleaves the premises.municipal utilitiesField service efficiency is a toppriority for utility companies, andONE OF THE MOST EFFECTIVEWAYS TO INCREASE UTILITYWORKER PRODUCTIVITY ANDEFFICIENCY IS USING MOBILETECHNOLOGIES.Deploying mobile devices to fieldworkers allows customer informationand site info to be reviewedremotely, speeding up delivery ofservice.Whether they are checking on agas leak, reading an electric meter,or responding to customer servicerequests, utility workers can usemobile technologies to increase theirfield service efficiency and customersatisfaction.
Share this eBookchild and family servicesCFS agencies are dedicated to improving services forchildren, youth, families, and vulnerable populations— promoting their development and protecting themfrom violence, neglect, abuse, and abandonment.With a rising number of cases that need addressingon a daily basis, MANY CFS AGENCIES AREEMBRACING TECHNOLOGY AS A WAY TO HANDLETHEIR INCREASED WORK LOAD.Case workers and counselors are now equipped withmobile devices to replace the pen and paper notesthey used to keep. Doing so has enabled workers tospend more time in the field making more visits perday and increasing their agencies’ overall efficiencies.Mobile technology has reducedthe administrative burden andPUT INFORMATION LITERALLYAT THEIR FINGERTIPS.
9THE ELEMENTS OF AMOBILE DEPLOYMENTmobile devicesMobile devices are typically notebook or tabletcomputers, although smart phones or other handhelddevices may figure into the deployment based on jobrequirements.Leading laptop manufacturers offer ruggedized devices designedfor field use. Unlike an executive who pulls a laptop out of aprotective case and uses it sporadically throughout the day,MOBILE GOVERNMENT WORKERS USE THEIR LAPTOPSCONSTANTLY AND CAN’T ALWAYS PROTECT THEIR DEVICE.Field-tested rugged devices are typically more costly, but THESEUNITS PAY FOR THEMSELVES IN LOWER FAILURE RATES,incidence of damage and overall support costs. Manufacturersand users alike claim units continue to function even whendropped from great heights, exposed to water, or excessive heat.
Share this eBookwireless networksAlthough there are some benefits of private radionetworks, in a disaster carrier networks are a betteroption. IN A CRISIS, CARRIER NETWORKS ARETYPICALLY UP AND RUNNING FASTER, PROVIDINGGREATER ACCESSIBILITY OVER A BROADERCOVERAGE AREA.Carriers have disaster teams with cell-sites-on-wheelsunits and fleets of vehicles in order to ensure littledisruption of service during times of disaster — asopposed to a city or county with only a small stafftrying to fix downed antennas.Reliable coverage can still be an issue at the best oftimes in areas with natural and man-made barriers.Carrier coverage maps based on tower locationsdo not account for local conditions that can block orimpede transmission (e.g. mountainous terrain, tunnels,buildings). ORGANIZATIONS SOMETIMES COMBINENETWORKS TO GET RELIABLE, BLANKETEDCOVERAGE THROUGHOUT THEIR JURISDICTION.TAKING CONTROL OF YOUR WI-FIMany organizations also supplementcellular networks by deploying theirown Wi-Fi networks, with access pointsat strategic locations. Typical hot spotlocations are parking lots and garages, firestations, police precinct buildings, healthdepartment stations, maintenance facilitiesand other neighborhood offices maintainedby various public agencies.In some jurisdictions, IT cooperates acrossdepartments to place hot spots in strategiclocations, such as in public parks. WI-FICONNECTIONS ARE USEFUL FOR DATA-INTENSIVE TASKS that can bog downbandwidth on a cellular network, such asupdating maps and images, or downloadingpatches, software updates and antivirussignatures.
11softwareMobile devices are tools that workers use everydayin the course of doing their jobs. LIKE ANY OTHERTOOL, WORKERS SIMPLY EXPECT THEM TOWORK. They cannot be bothered to update software,tweak network settings, or deal with the minutiaeof configuring their devices. IF THE SYSTEM ISDIFFICULT TO USE, THEY WON’T USE IT.Remote management gives the IT departmentcentralized control and visibility over the installedapplications, security and status of every mobiledevice. The larger the deployment, the more essentiala remote management system becomes.PRIMARY APPLICATIONS USED BYGOVERNMENT AGENCIES• Computer-Aided Dispatch• Records Management Systems• Mapping and GIS software• General-purpose Internet applicationsincluding e-mail clients and Webbrowsers• Database applications with offeraccess to state and federal databasescontaining criminal records and driver’slicense information; pre-filed responseplans for fire departments; healthrecords and other information• Scheduling, job tracking, time-trackingand other applications as necessary
12Mobile devices communicate via multiple cellular data networksor Wi-Fi hotspots in the field. A mobile VPN secures theconnection end-to-end and maintains reliable connections asdevices move between various networks.THE UNSEEN CHALLENGE:SEAMLESS CONNECTIVITYVPNs handle issues of sensitive or privileged data sent over public airwaves or the Internet. A mobileVPN is a special class of VPN, distinct from IPsec or SSL VPNs. MOBILE VPNS MAINTAIN A SECURETUNNEL through conditions that would break a conventional VPN, such as going out of coverage rangeor crossing from one wireless network to another.A MOBILE VPN IS A NECESSITY IN A REMOTEDEPLOYMENT, where workers need applications andconnections to be always on and available. It’s also alogical evolutionary tool as a mobile worker’s needschange from accessing one or two field applicationsto full desktop-like functionality. Mobile VPNs arespecifically designed for these challenges.A mobile VPN solves the single, most vexing problemimpacting mobile deployments: MAINTAININGAPPLICATION AND USER LOG-IN SESSIONS.Continuous connectivity is not always present ina wireless environment. When users lose theirconnections, sessions drop, applications often crash,and users have to re-authenticate to the network.
coverage gapsNearly all cellular networks have local “dead zones” and whenworkers go out of range, they lose their connections. When theyhave to re-login or re-enter lost data, productivity can be impacted.In some cases – like during an emergency response – an inabilityto connect can be life-threatening.use of multiple networksMany agencies need multiple networks to covertheir jurisdiction. When crossing a network boundary,each new connection needs to be authenticated.Responders may cross these boundaries hundredsof times a day. Even specifically mobile applicationscannot handle crossing network boundaries, andrequire users to re-authenticate.SOLUTIONWHEN USING A MOBILE VPN:Devices automatically use fastest availableconnection and log in automatically whenroaming between departmental Wi-Fihotspots and multiple cellular data networks.SOLUTIONWHEN USING A MOBILE VPN:The session simply resumes when theconnection is available again, requiring noeffort on the user’s part.
Share this eBooksuspend/resume cyclesFor devices running on battery power, suspendinga device puts it in a lower-power state. For health orsocial services workers doing home visits, this mayhelp the device make it through the working day on asingle charge. Typically, suspending cuts power to thewireless system, breaking the connection.SOLUTIONWHEN USING A MOBILE VPN:Mobile-aware VPN handles complexities ofdealing with coverage gaps and roamingbetween networks, so public workers canfocus on serving the public.A mobile VPN works in the background,handling logins and the complexitiesof roaming between networks whilemaintaining applications through coveragegaps. To users, it appears they are constantlyconnected to a single, seamless network.
Share this eBookapplication reliabilityVirtually all applications assume a permanentnetwork connection. If the connection disappears, theapplication crashes. Failures can require re-logging inand retyping any lost data.Although special-purpose applications present away to solve reliability issues, MORE AGENCIESARE OPTING FOR SOLUTIONS THAT OFFER REAL-TIME ACCESS, MAKING A MOBILE VPN A BETTEROPTION.General purpose applications are prone to crash in amobile environment. These application crashes aremost often the greatest source of worker frustration ina typical mobile deployment. SOLVING CRASHES ISCONSIDERED ONE OF THE MOST IMPORTANT ANDWELCOME ATTRIBUTES OF A MOBILE VPN.SOLUTIONWHEN USING A MOBILE VPN:Compression and optimization techniquesimprove throughput and applicationresponsiveness.
16MANAGING A MOBILE DEPLOYMENTMobile devices may be used hundreds of miles away from the data center, on unseen networks, far out ofreach of the IT department. Workers may bring their device onsite only at the beginning or end of a shift,and in some cases, not at all. This leads to management challenges far beyond those encountered withfixed machines on a wired network.visibilityA MOBILE DEPLOYMENT REPRESENTS A MAJORINVESTMENT OF TAXPAYER DOLLARS AND WITHIT COMES A RESPONSIBILITY TO USE RESOURCESWISELY. A mobile VPN is typically a fraction of the totaldeployment cost, but it allows use of the entire systemto be centrally configured, managed, and observed.monitoringWith workers far removed from IT resources, problemswith a device or network take longer to correct, possiblyresulting in a loss of productive hours.SOLUTIONWHEN USING A MOBILE VPNAutomated notifications promote hands-offmanagement, including pre-emptive detection ofconditions that indicate failure might be imminent.
Share this eBookcontrolManaging even a handful of remote devices can be a chore. In a large deployment with hundreds orthousands of devices it can be impossible without an automated solution. A MOBILE VPN WITH ACENTRAL CONSOLE MAKES IT EASY TO QUARANTINE DEVICES THAT ARE MISUSED, LOST ORSTOLEN. Policy management capability allows administrators to decide how devices andapplications use the networks. Policies may be assigned to individual users or groups,affording flexible, streamlined control with permissions based on job function ororganizational role.SOLUTIONWHEN USING A MOBILE VPN:Browser-based administrative console allowsall aspects of the system to be centrallyconfigured, managed and observed.
18system managementA large mobile deployment may include hundreds orthousands of individual mobile devices. Tasks that aresimple in a small LAN environment become incrediblycomplex in a mobile deployment where devices areconstantly on the move. The problems compoundwhen a mobile deployment serves multiplegovernment agencies, as THE APPLICATIONPROFILE FOR A FIRST RESPONDER’S DEVICE ISRADICALLY DIFFERENT FROM THAT USED BY AHEALTH DEPARTMENT WORKER.SYSTEM MANAGEMENT INCLUDES:• Staging of new devices or thosereturned from the service center;• Standardizing software versions andconfigurations within and across varioustypes of users; and• Pushing out application updates,device refreshes, and security andnetwork settings with minimal impact orinterruption to the user.?SOLUTIONWHEN USING A MOBILE VPN:A management system especially designedfor a mobile environment, tightly coupledwith a mobile VPN that is “connection andbandwidth-aware,” presents an ideal solutionfor large government deployments.
fault isolation and resolutionIn a mobile deployment, access points may be atremote locations. In the case of cellular data networksor workers using wireless “hotspots” in publiclocations, entire pieces of the delivery network areoutside of IT control.worker productivityAn application-proxy mobile VPNcan also proactively ensure usersand devices use applicationsand networks properly. Policymanagement capabilities affordextremely effective control overuser and device behavior, THUSENSURING PROPER USE OFMOBILE DEVICES.Even workers who are usingtheir devices as intended canaccidentally launch a process, suchas initiating an anti-virus signaturedownload or running Windowsupdates over a cellular dataconnection which can bog downtheir device for many minutes.SOLUTIONWHEN USING A MOBILE VPN:A mobile VPN with a reporting and analyticscapability can quickly evaluate connectivityproblems across networks and isolate anddetect root causes that otherwise would takehours of sleuthing.
Share this eBookbandwidth managementData access contracts with cellular carriersrepresent a sizable investment of public funds thatmust be used wisely. A MOBILE VPN THAT USESAPPLICATION-PROXY TECHNOLOGY IS ABLE TOEXAMINE THE COMPLETE TRAFFIC FLOW and howusers, devices and applications use bandwidth acrosseach cellular network.REPORTS HELP ADMINISTRATORSUNDERSTAND WHEN:• Total bandwidth use is approaching thecontracted limit and agreements mayneed to be renegotiated;• Data-intensive applications (such asstreaming media over Web browsers)might be wasting a public resource;• Non-essential applications arebeing used; and• Large file transfers are runningover a cellular network that couldbe more cost-effectively handledover a wired or Wi-Fi connection.SOLUTIONWHEN USING A MOBILE VPN:Policies control device andapplication behavior, and keepdata-intensive processes offslower networks.
Share this eBook* * * * >authenticationEnsuring that users are authorized is of greaterconcern in a mobile deployment where devicescan more easily be misplaced, lost or stolen. Lawenforcement agencies face increasingly stringentrequirements for authentication, which is requiredto access federal criminal databases.SOLUTIONWHEN USING A MOBILE VPN:Highest-standard FIPS 140-2 validated AESencryption secures data sessions as devicestraverse networks. Mobile VPN support forstrong authentication meets CJIS securitypolicy requirements.
22end-to-end securityWireless networks use public airwaves, which poses security risks. While Wi-Fi and cellular networksoffer their own security technologies, some have known vulnerabilities.SOLUTIONWHEN USING A MOBILE VPN:A mobile VPN creates a secure end-to-endtunnel that encrypts the complete datasession from the corporate data center tothe wireless device.Mobile VPNs may also offer Network AccessControl capabilities that protect both theindividual device and the corporate networkagainst viruses and spyware.
Share this eBookreliability to go:NETMOTION WIRELESSMOBILITY XE® MOBILE VPNMobility XE® from NetMotion Wireless is an award-winning mobile VPN that presents an elegant, singlesolution to all of the challenges of mobile deployments.• PREVENT CRASHES through no-coverage zones, paused devices, orcrossed network boundaries.• AUTOMATICALLY HANDLES LOGINSon behalf of the user, as well asconfiguring each connection as devicesswitch between networks.• AUTHENTICATES EACH USER, throughMobility XE’s own user database orintegration with Windows Active Directory.• SUPPORTS STRONG AUTHENTICATION,a requirement for accessing the federalCJIS database.• ENCRYPTS ALL DATA transmitted toprotect against compromise, using theUS Advanced Encryption Standard.• ENFORCES PROPER BANDWIDTH USEby making sure large data transfersstay off of slower networks, and mobileresources are used appropriately.• DOES ALL OF THE ABOVE INA WAY THAT IS ESSENTIALLYINVISIBLE TO THE USER, IMPROVESPRODUCTIVITY, AND IS HIGHLYRESISTANT TO USER MISSTEPS THATMIGHT IMPAIR THE FUNCTIONALITYOF THE DEVICE.