Skip to Main Content
Access your saved content
Consider these key government technology issues while developing mobile security policy through use cases.
Getting the user experience right without compromising on security is a key driver in implementing mobility in government technology. But how can organizations ensure that employees are using proper security measures while accessing public sites and applications to avoid infecting their device with malware that impacts corporate data? And how can agencies make sure that, when employees leave the company, all traces of corporate data are deleted while leaving their personal data intact?
Watch Sesh Seshagiri, Senior Manager – Accenture Mobility, address these and related issues as he explains how a comprehensive government technology mobile security strategy can be drawn up and implemented through scenario planning and use cases.
Download Video Transcript [PDF, 114KB] PDF Help
This video was recorded at the Mobile Government 2013 forum held in Sacramento, CA on March 28, 2013. View other videos in this series:
How the Scale of Mobility is Transforming Government Technology in the Workplace—Video
Barriers to Implementing Mobile Government Technology—Video
Enhancing Government Productivity through Mobile Security—Video
Potential Security Threats to Mobility and Government Technology—Video
Mitigating Mobile Security Threats to Government Technology—Video
Developing a Bring Your Own Device (BYOD) Strategy for Government Productivity—Video
A Layered Approach to Securing Mobile Government Technology—Video
Embracing Bring Your Own Device (BYOD) to Drive Government Productivity—Video
April 3, 2014
Skip Footer Links