mobile device management (MDM)

See the following -

CIS Mobile Announces altOS on Pixel 4a Smartphones

Press Release | CIS Mobile | December 9, 2020

CIS Mobile, an Acorn Growth Company and a mobile security leader, announced the availability of altOS on the Pixel 4a smartphone. By combining the latest Pixel hardware and our altOS secure mobility platform, government customers now can protect sensitive data while using the latest high-performance smartphone. CIS Mobile’s altOS is a security-enhanced Android operating system designed with the extra management, security, and privacy features needed for sensitive government use cases, and used by multiple government intelligence and defense agencies.

Read More »

CIS Mobile Announces Major Update to the altOS Platform

Press Release | CIS Mobile | September 9, 2020

CIS Mobile, a leader in mobile security, today announced the release of altOS 10. This new major release adds significant security, management, and control features for sensitive government user cases and updates the altOS operating system to Android 10. In addition to the new privacy features incorporated into Android 10, this major update to the altOS platform includes...Secure Mode upgrades. Secure Mode enables altOS devices to dynamically control access to peripherals that might be used to exfiltrate data from sensitive government sites, or that could reveal sensitive location data to a foreign adversary.

Read More »

Forensic Scientist Identifies Suspicious 'Back Doors' Running On Every iOS Device

Jason D. O'Grady | ZD Net | July 21, 2014

During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices...

Read More »

GSA Seeks Governmentwide Mobile Device Management Contracts

Joseph Marks | Nextgov | February 8, 2013

The General Services Administration is seeking governmentwide contracts with vendors who can ensure the security of federal employees’ smartphones and tablets and the applications that run on them, solicitation documents show. Read More »

Healthcare CIOs Juggle More Mobile Challenges

Neil Versel | Information Week | November 22, 2011

As mobile devices multiply in numbers and grow more sophisticated, healthcare CIOs are facing all kinds of new challenges in distributing information and keeping networks secure. Read More »

The Goldilocks Problem of Mobile Security - Usability vs. Security

The “Goldilocks and the Three Bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for government and organizations. The theme is trade-offs between the usability of a mobile device and security for confidential organizational data such as conversations, messages, documents, images, and locations. The security, confidentiality, and integrity of communication are key. However, if the usability of mobile devices for end-users, administrators, and organizations is too challenging, then the availability of the data for productive work is lost.

Read More »

VA Awards Contract For Mobile Device Management, Apps Store

Jared Serbu | Federal News Radio | October 3, 2012

The Department of Veterans Affairs has awarded a long-awaited contract to build a system that will manage a stable of mobile devices officials hope will eventually grow to 100,000 handhelds and tablets. Read More »

VA BYOD Reimbursement Strategy Isn't IT's Call, Says Baker

Molly Bernhart Walker | FierceGovernmentIT | September 27, 2012

Who pays for data plans under a forthcoming bring-your-own-device strategy at the Veterans Affairs Department? Don't ask Chief Information Officer Roger Baker--determining that isn't his job, he says. Read More »

VA Gears Up for Buy of Up to 100,000 Tablet Computers

Alice Lipowicz | Federal Computer Week | October 24, 2011

In one of the largest moves to mobile devices by a civilian agency, the Veterans Affairs Department plans to procure up to 100,000 tablet computers, the agency recently announced. Read More »

Who Controls Your Smartphone? And How to Leverage Open Source to Prevent it from Spying on You

There are many things about today’s world that warrant us asking that question. Do you or the mobile vendor control your smartphones? If you are a consumer, small or medium business (SMB) -- the answer is the vendor...What if you are a large enterprise or a government agency? The answer is still the vendor...How can the user regain control? Not all vendors have locked devices and walled gardens. Google’s line of Pixel hardware, for example, is a mid-market solution whose bootloader allows locking and re-locking. Pixels support two versions of Android. Google Mobile Services (GMS), where free services are tied to data monetization and a UX like Apple and Samsung devices. Secondly, Pixels can run Android Open-Source Project (AOSP) code that shares the same strengths as the GMS build, but the customer controls the code base and updates. There are several companies that are selling AOSP operating system builds for Pixel and other unlockable/lockable mobile phones and tablets...

Read More »