Revised U.S. Security Guidelines Provide Strategy for Government Mobile Device Management

Share via AddThis
Posted June 26, 2013

The National Institute of Standards and Technology (NIST) has published a mobile device management guide for federal agencies seeking secure methods for workers to use smart phones and tablets.

Employees want to be connected to work through mobile devices for flexibility and efficiency, and managers can appreciate that. However, the technology that delivers these advantages also provides challenges to an agency’s security team because these devices can be more vulnerable.

For example, a smartphone or tablet could be stolen or lost, potentially allowing unauthorized individuals access to an agency’s network and its sensitive information. Also, an employee can unknowingly infect its agency’s network by downloading an application containing malware.

Guidelines for Managing the Security of Mobile Devices in the Enterprise helps federal agencies and other organizations struggling with this dilemma. Originally issued in 2008 as Guidelines on Cell Phone and PDA Security, the new guidelines have been extensively updated and reflect comments received on a draft version issued a year ago.

The revised guidelines recommend using centralized device management at the organization level to secure both agency-issued and individually owned devices used for government business.

Centralized programs manage the configuration and security of mobile devices and provide secure access to an organization’s computer networks. Many agencies currently use this type of system to manage the smartphones they issue to staff. The new NIST guidelines offer recommendations for selecting, implementing and using centralized management technologies for securing mobile devices.

Other key recommendations include instituting a mobile device security policy, implementing and testing a prototype of the mobile device solution before putting it into production, securing each organization-issued mobile device before allowing a user to access it, and maintaining mobile device security.

Guidelines for Managing the Security of Mobile Devices in the Enterprise (NIST Special Publication 800-124 Revision 1) is available at

Source: NIST

48,925 science & technology articles


Our Articles (see all)

General News

Follow us

Facebook   Twitter   Pinterest   StumbleUpon   Plurk
Google+   Tumblr   Delicious   RSS   Newsletter via Email

Featured Video (see all)

In control skin from the hip (A) and normal-appearing skin from the abdomen (B), elastic fibers responsible

for skin elasticity are intact, forming an intricate mesh-like network. In stretch marks that have recently

formed during pregnancy (C), elastic fibers are lost and replaced by disorganized, thin fibrils, or “strands,”

that persist without forming a normal elastic network. The middle and bottom panels magnify the identified

areas of the top panels.
Stretch mark science: What happens to your skin when pregnancy gives you a stretch mark?
Don’t believe the hype when you see those creams and ointments promising to prevent or reduce pregnancy stretch…

Featured Image (see all)

Scientists Set Quantum Record by Using Photons to Ferry Data between Electrons 1.2 Miles Apart
Quantum entanglement is the observed phenomenon of two or more particles that are connected, even over thousands of…