Showing 2 ideas for tag "it security"

Department of Homeland Security

Let Employees Use Personal Smartphones and Tablets to Connect

Use a service such as Citrix or Good Technologies to provide a secure connection to Government networks for people to use their personal smart phones (iPhone), tablets (iPad) or laptops. Provide an incentive to encourage to use their personal equipment. People using their personal electronics would have to agree to allow a "kill' feature be installed on all personal smart phones and tablet so that Government information... more »

Voting

4 likes
Active

National Aeronautics and Space Administration

FDCC/USGCB/CIS-configured operating systems from factory

Per the Federal Information Security Management Act (FISMA), federal information systems must be hardened according to security configuration standards such as the Federal Desktop Core Configuration (FDCC), the U.S. Government Configuration Baseline (USGCB), and the Center for Internet Security (CIS) benchmarks. Government (and contractor) IT shops spend countless hours configuring new and existing systems to ensure... more »

Voting

3 likes
Active