Skip to Main Content
Access your saved content
Mitigate security risks associated with enterprise mobility through a structured government technology approach.
The presence of personally owned mobile devices in the workplace IT ecosystem is a significant trend that threatens to compromise the security of government and corporate data. Effectively implementing a mobile security strategy for government technology across the workplace and mapping that strategy to local devices and applications can help address concerns around data loss prevention, stolen devices, password policies and other such government technology issues. Additionally, where both personal and corporate data and content are involved, a layered approach to security is crucial in ensuring the protection of the corporate data.
In this video, Sesh Seshagiri, Senior Manager – Accenture Mobility, explores the various options available—containerization, compliance assessment and enforcement, testing, deploy and run, and others—to mitigate possible mobile security risks.
Download Video Transcript [PDF, 115KB] PDF Help
This video was recorded at the Mobile Government 2013 forum held in Sacramento, CA on March 28, 2013. View other videos in this series:
How the Scale of Mobility is Transforming Government Technology in the Workplace—Video
Barriers to Implementing Mobile Government Technology—Video
Enhancing Government Productivity through Mobile Security—Video
Potential Security Threats to Mobility and Government Technology—Video
Mitigating Mobile Security Threats to Government Technology—Video
Developing a Bring Your Own Device (BYOD) Strategy for Government Productivity—Video
Securing Mobile Government Technology through User Scenarios—Video
Embracing Bring Your Own Device (BYOD) to Drive Government Productivity—Video
April 3, 2014
Skip Footer Links