Skip to main content
Oct 24, 2013

State and Local Government Can Lead the Mobility Movement

HarveyMobile Application Management (MAM) can help agencies secure and manage their apps and data in a BYOD environment. While federal agencies have not completely bought off on the value of bring your own device (BYOD) for a variety of reasons, I’ve found that their state and local (S&L) counterparts are much more open and interested in trying to find a way to make BYOD work. Is BYOD right for every employee or agency? No. Security can be a big concern in this space, but the facts are agency budgets are tight and shrinking and the consumerization of IT is driving employees to want to use the latest devices. Consider some interesting points:
  • The federal government spends about $1.2 billion annually for mobile and wireless services/devices and maintains roughly 1.5 million accounts.
  • Paired with automatic budget cuts, the White House is adding pressure to cut costs, especially when it comes to mobile devices.
  • Employees want to use devices of their own choice, especially the millennial generation.
The current approach many agencies are trying to take to implement and manage BYOD tends to pose some key challenges that reduce user participation and raise legal questions. Utilizing security solutions that require users to have their devices controlled and locked down (similar to the approach organizations take to secure their desktops), have been shown to dramatically reduce user participation... Read the full article as it appeared on Government Technology.

Apperian

More from the Blog
Jun 26, 2019

The Mobile App Vulnerability Epidemic and Its Impact on Global Business

There is a widespread mobile app vulnerability epidemic unfolding and it’s impacting organizations across industries around t ...
Read more
Apr 16, 2019

Vulnerability Epidemic in Financial Mobile Apps - Episode 7 [Video]

What should we do?
Read more
Apr 15, 2019

Vulnerability Epidemic in Financial Mobile Apps - Episode 6 [Video]

Pros & cons of app security approaches
Read more