SlideShare a Scribd company logo
1 of 17
Commercial Mobility Device (CMD)Way Forward mark.norton@osd.mil 703-607-0711 1 DoD Mobility TEM July 18 , 2011, Mitre Unclassified:  https://www.intelink.gov/sites/mobile SIPR: https://www.intelink.sgov.gov/sites/mobile JWICS:  https://www.intelink.ic.gov/sites/mobile
The Future is Mobility Go Forth & B Mobile - No Really Go … 2
GIG Transport Services Tiers WGS Commercial  SATCOM 3
Mobile Device Strategy 4 Mobile  Strategy (Draft) Goals: 1. Evolve the infrastructure to support mobile devices 	 2. Establish a common mobile application environment 3. Enable mobile device security and  information assurance  https://www.intelink.gov/sites/mobile
Core Policy Issues: Emphasizing Security, Spectrum, and App Management 5 Security ,[object Object]
Data-in-Transit
Two-factor Authentication
Mobile Device ManagementApplication Management  ,[object Object]
Data Interfacing across services/networks
Applications/system functionality
System operationSpectrum  ,[object Object]
Commercial Coexistence commercial
TRANSEC
Anti-Jam,[object Object]
Data Protection
Access Control
DoD Public Key Infrastructure (PKI) Credentials

More Related Content

What's hot

Usb Wp Implementing Usb
Usb Wp Implementing UsbUsb Wp Implementing Usb
Usb Wp Implementing Usballankliu
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017IDATE DigiWorld
 
CIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communicationsCIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communicationsWim D'Hondt
 
NATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationNATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationRachik Abidi
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIDan Mårtensson
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015Ludovic Privat
 
Towards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsTowards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsLaurent Ciavaglia
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...ijngnjournal
 
Open Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing DeploymentOpen Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing DeploymentIgnacio Verona
 

What's hot (10)

Usb Wp Implementing Usb
Usb Wp Implementing UsbUsb Wp Implementing Usb
Usb Wp Implementing Usb
 
Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017Ioterop @DigiWorldAwards2017
Ioterop @DigiWorldAwards2017
 
CIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communicationsCIRED 2011 Presentation Smart Grid communications
CIRED 2011 Presentation Smart Grid communications
 
NATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationNATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine Communication
 
Understand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROIUnderstand how optimized connectivity improves IoT ROI
Understand how optimized connectivity improves IoT ROI
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015Telecommunication Systems IR presentation 25-06-1015
Telecommunication Systems IR presentation 25-06-1015
 
Towards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network OperationsTowards Intent-driven and Cognitive Network Operations
Towards Intent-driven and Cognitive Network Operations
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
 
Open Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing DeploymentOpen Source Possibilities for 5G Edge Computing Deployment
Open Source Possibilities for 5G Edge Computing Deployment
 

Similar to Dmg tem2011-0718-02 norton cmd disa mitre overview - v9

Ian Smith - Mobile Software Testing - Facing Future Challenges
Ian Smith -  Mobile Software Testing - Facing Future ChallengesIan Smith -  Mobile Software Testing - Facing Future Challenges
Ian Smith - Mobile Software Testing - Facing Future ChallengesTEST Huddle
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiJoachim Ritter
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
10 dosmann -disa tem slides
10 dosmann -disa tem slides10 dosmann -disa tem slides
10 dosmann -disa tem slidesjakreile
 
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Tim Harvey
 
The Architectural Models Of UC
The Architectural Models Of UCThe Architectural Models Of UC
The Architectural Models Of UCRonald Gruia
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutArthur Sanchez
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Tim Harvey
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerationsMary McEvoy Carroll
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business DivisionHarry Sohn
 
View Slides
View SlidesView Slides
View SlidesVideoguy
 
M2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon ValleyM2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon ValleyDaniel Kellmereit
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSMarco Lisi
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxSahanaMk2
 
Independent LTE networks for major resources projects
Independent LTE networks for major resources projectsIndependent LTE networks for major resources projects
Independent LTE networks for major resources projectsComms Connect
 
Srivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_newSrivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_newsrivaishnavi sivagnanam
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesSatya Harish
 

Similar to Dmg tem2011-0718-02 norton cmd disa mitre overview - v9 (20)

Ian Smith - Mobile Software Testing - Facing Future Challenges
Ian Smith -  Mobile Software Testing - Facing Future ChallengesIan Smith -  Mobile Software Testing - Facing Future Challenges
Ian Smith - Mobile Software Testing - Facing Future Challenges
 
Enterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGiEnterprise Mobility with Mobile OSGi
Enterprise Mobility with Mobile OSGi
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
10 dosmann -disa tem slides
10 dosmann -disa tem slides10 dosmann -disa tem slides
10 dosmann -disa tem slides
 
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
Complete Presentation | Federal Mobile Computing Summit | July 9, 2013
 
The Architectural Models Of UC
The Architectural Models Of UCThe Architectural Models Of UC
The Architectural Models Of UC
 
Miami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handoutMiami in touch-amdocs-lte-2011-05-16-handout
Miami in touch-amdocs-lte-2011-05-16-handout
 
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton &...
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Lte security concepts and design considerations
Lte security concepts and design considerationsLte security concepts and design considerations
Lte security concepts and design considerations
 
SMEC ICT Business Division
SMEC ICT Business DivisionSMEC ICT Business Division
SMEC ICT Business Division
 
View Slides
View SlidesView Slides
View Slides
 
M2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon ValleyM2M Presentation at Telecom Council of Silicon Valley
M2M Presentation at Telecom Council of Silicon Valley
 
Cloud Mobility SIG
Cloud Mobility SIGCloud Mobility SIG
Cloud Mobility SIG
 
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptx
 
Independent LTE networks for major resources projects
Independent LTE networks for major resources projectsIndependent LTE networks for major resources projects
Independent LTE networks for major resources projects
 
Srivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_newSrivaishnavi Sivagnanam_resume_final - CA_new
Srivaishnavi Sivagnanam_resume_final - CA_new
 
HH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devicesHH QUALCOMM UplinQ - the next 10 billion mobile devices
HH QUALCOMM UplinQ - the next 10 billion mobile devices
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Dmg tem2011-0718-02 norton cmd disa mitre overview - v9

  • 1. Commercial Mobility Device (CMD)Way Forward mark.norton@osd.mil 703-607-0711 1 DoD Mobility TEM July 18 , 2011, Mitre Unclassified: https://www.intelink.gov/sites/mobile SIPR: https://www.intelink.sgov.gov/sites/mobile JWICS:  https://www.intelink.ic.gov/sites/mobile
  • 2. The Future is Mobility Go Forth & B Mobile - No Really Go … 2
  • 3. GIG Transport Services Tiers WGS Commercial SATCOM 3
  • 4. Mobile Device Strategy 4 Mobile Strategy (Draft) Goals: 1. Evolve the infrastructure to support mobile devices 2. Establish a common mobile application environment 3. Enable mobile device security and information assurance https://www.intelink.gov/sites/mobile
  • 5.
  • 8.
  • 9. Data Interfacing across services/networks
  • 11.
  • 14.
  • 17. DoD Public Key Infrastructure (PKI) Credentials
  • 20.
  • 21. CMD Security Overview ‘Tactical support’ users will require unique hardware, spectrum, infrastructure, and networking requirements 8
  • 22. CMD /Operating System Security Matrix Blackberry provides security advantage but offers limited user features Alternate approaches provide greater capability with reduced security New products such as Dell Streak may provide a balance of security and performance + + + - - - + Low Security Risk Medium Security Risk High Security Risk 9
  • 23. DoD LTE Security Goals and Commercial Standard Vulnerabilities LTE Security Goals Commercial Standard Vulnerabilities
  • 24.
  • 25. The security associated with the signaling exchange
  • 26. Spectrum of cellular assignments
  • 28. Identity and assured user accessBTS structures can be housed on mobile platforms and placed on secure sites, but environmental obstructions force extensive solutions Ownership of the BTS and MSC can offer solutions to signaling and the introduction of unwanted software Offsetting the spectrum offers a means to resolve the license issues Embedded COMSEC and potential token solutions can be employed 11 While solutions exist for cellular implementations – the offered solution set falls short
  • 29. 12 Military Applications of CMDs (Selected Examples) Multiple vendors/Mil R&D developing CMDs for edge applications Each vendor approaches CMD networking by leveraging different components of commercial architectures (i.e. operating system, closed cell based networks, commercial waveforms, etc) Systems offer performance features of commercial networks and are exploring ways to mitigate security risks
  • 30. To be determined…… Dual Persona Data Delivery Diversity (Local WLAN vs3G/4G) Services of the future: CMD Voice over IP, etc Technology Wildcards Super Wi-Fi Contactless payments – near field communications Application Management – Metrics, Common Operating Environment 13
  • 31. Way Forward New product evaluations Update Policy Re-examine security posture Common Operating Environment for CMD Applications Business case analysis Life cycle management 14
  • 32. Federal Mobility Summit 15 Sponsors: Fed CIO Council/ISIMC/DoD/DoJ/Federal Business Council Date/Time: 23-24 Aug /0800-1600 Location: UMUC, Auditorium/Conference Center, College Park MD Max Attendees: 750 (USG Primarily-No Rank Requirements) Focus: 6 Main DoD Mobility Issues Mentioned in TT's Memo/6 Apr 11 & Approximately 25 other Issues from the Rest of .gov POA/Outcome: 1. Provide the Major Players with Our Issues B4 the Summit vs. Presentation of their Wares/Sell Products 2. Get their buy-in and/or assistance to work with us in fixing the big problems we have vs. piecemeal solutions. C3PO – Collaborate, Communicate, Connect & Produce Outcomes
  • 33. CMD Policy Development Topics The following lists provide the criteria definition of minimum acceptable CMDs, OSs, and Applications 16
  • 34. CMD Policy Development Topics (Cont’d) 17