EMC/DELL MERGER: BYOD May Be Coming to an End at EMC as Dell Merger Looms. As Dell and EMC prepare to complete their merger, EMC purportedly issued a statement insisting that customers of the two companies only see Dell laptops during meetings and consulting engagements. EMC workers that use Apple products as part of that company’s existing BYOD policy will need to leave them at the office, according to the report. Read the rest
FEDERAL GOVERNMENT: Federal Government Exec Gives Advice on Enterprise BYOD Implementations. Josh Moulin, a chief information security officer (CISO) for a federal US national security agency, has detailed in a post the process of a proposal to move an agency to BYOD – and why it was eventually disallowed. Find out more
MARINE CORPS: Marines Work to Join Enterprise Network to JIE. The Marine Corps expeditionary mission set continues to challenge efforts to join the Corps with the Department of Defense’s Joint Information Environment (JIE). In a further effort to align its present networking policies with those of JIE, the Corps is taking a hard look at Bring Your Own Device, or BYOD. The service is moving forward on a pilot project which will use drive certificates as a means to create secure software containers on some 250 test mobile devices by the end of the fiscal year. Read more
ENTERPRISE: Enterprise Mobility: BYOD, EMM, and New Security Approaches. Today’s enterprise employees increasingly expect to be productive wherever they may be, on whatever device they choose, which raises multiple management and security issues for IT departments. The Ponemon Institute’s 2016 survey report reveals some telling insights about enterprise mobile security — many of them clearly driven by the BYOD trend of recent years. Read more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems July 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-july-2016.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.