gtr july-aug 2014 sample
DESCRIPTION
A small taste of Government Technology Review – Technology news and experience from all levels of government.TRANSCRIPT
GEOSPATIAL:MAPPING THE CLOUD
INTERVIEW: US CIO FRAN
TRENTLEY
GOVERNMENTIN THE
FIELD GO MOBILE WITHOUT LOSING CONTROL
| JULY/AUG 2014 ISSUE 25GOVERNMENT TECHNOLOGY REVIEW
GADGETS GALORETHE LATEST IN
CONSUMER TECHNOLOGY
USE YOUR ASSETS LIKE NEVER BEFORE
VIDEO AND COMMUNICATIONS TOOLS DATA CENTRES ROUNDTABLE
Keeping it in the family
Recreated PMS
Choose from the FUJITSU Enterpise Family to transform your IT environment.
An efficient, flexible foundation for business growth.
www.fujitsu.com.au
shaping tomorrow with you
GTR JULY/AUG 2014 | 1
MAPPING IN THE CLOUDGeospatial technology is more widely used in government than in many other industries – and to much greater effect. But with social content and cloud-based data architectures now changing the way it's collected and used more dramatically than ever, even the GIS old-timers are finding new ways to unlock value from their geospatial investments. Here's how.
ROUNDTABLE: THE DATA CENTRE REVOLUTION TURNS INWARDSWith the government reviewing its data centre as a service (DCaaS) arrangements and a large amount of top-tier capacity now on the market, providers are looking at new ways to add value for customers that have come to expect increasing service levels and integration both between and within data-centre environments.
Special Features
14
34
GOVERNMENT IN THE FIELD: GO MOBILE WITHOUT LOSING CONTROL
REGULARS2 Editor’s Letter
4 News
46 Opinion: Ovum, Esri, TechnologyOne, Emantra, NextDC, Bellridge, Spatial Vision, Fuji Xerox, Schneider Electric, Outback Imaging
FEATURES20 Just talk to the cloud
Videoconferencing used to be complex, proprietary business – but a new wave of cloud-based VC providers has taken the guesswork out of the process and opened up videoconferencing to anyone with a desk phone, computer, smartphone, or tablet.
22 Interview: Fran Trentley
A former CIO of the Presidential-level White House Communications Agency, Fran Trentley now engages with government customers of content-distribution giant Akamai. GTR caught up with him to talk about the security challenges government faces today. Watch the entire interview at www.gtrknowledgeseries.com.au.
26 GTR Government Suppliers Guide
GTR's regular directory of key suppliers of information systems to government agencies.
44 Gadgets Galore Everyone loves a great gadget
– so we round up some of the latest and best.
CASE STUDIES12 City of Charles Sturt
SA council shares its success locking down BYOD.
30 Orange City Council
A major asset-management upgrade has improved asset maintenance and financial forecasting.
32 Victoria Department of Justice
The FireReady mobile app was a great hit – until demand surged so far that it fell in a heap. It was fixed with the help of the cloud.
Mobility is everywhere these days, and the new style of working is certainly paying dividends. But that doesn't simplify things for the IT strategists who are charged with executing on the mobility agenda whilst retaining security, policy and data control – not to mention the very real logistics involved in managing fleets of bring your own device (BYOD) empowered workers. How can you go mobile without losing control?
8
Contents
Keeping it in the family
Recreated PMS
Choose from the FUJITSU Enterpise Family to transform your IT environment.
An efficient, flexible foundation for business growth.
www.fujitsu.com.au
shaping tomorrow with you
Cover Story
2 | GTR JULY/AUG 2014
David Braue, EditorE: [email protected]
Editor’sLetter
As any government CIO will tell you, the biggest problem about empowering your employees to be mobile, is that they are empowered to be mobile.
Data tracking, at-rest encryption, cloud security, and even the logistics of tracking and managing a panoply of mobile devices have all joined the usual laundry list of CIO stressors as new technology's potential continues to enthral – and its byproducts continue to concern.
Our main features this month both consider these issues, with questions of mobile security leaned against some of the latest advancements in geospatial technology. These two fields both address critical operational questions, relating at once to both the challenges of building a spatially-related infrastructure and the obstacles it poses for IT.
One field that has adapted well to the change is video conferencing, which is no longer about proprietary and monstrously expensive in-room systems and more about allowing people to join multimedia collaboration sessions using whatever technology they have in their hands at the time. We run down the latest in cloud-based videoconferencing; if you're not already using one of these services, you may be making your life more complicated than it needs to be.
I must set aside a moment to mention the GTR Knowledge Series (www.gtrknowledgeseries.com.au), our ongoing series of interviews in which I've been talking with a range of IT luminaries about the challenges they face and the ways they've dealt with them.
We have posted over a dozen interviews – all of which I found quite interesting, as I'm sure you will – and there are more on the way in coming months. To give you a taste of what the GTR Knowledge Series involves, in this issue we've included part of the interview with Fran Trentley – a former US military man who came to head IT strategy at the White House Communications Agency and currently leads Akamai's engagement with the government sector.
We talked about security and the quantity of change since his time, and if you find the excerpt here interesting, I encourage you to visit the Web site to see the complete interview.
Also scattered throughout this issue are the latest industry roundtable – in which data-centre luminaries share their thoughts about the growth of the industry in the cloud era – as well as a pull-out supplier's guide to keep you in touch with the latest in the industry. And, as always, we feature interesting case studies showcasing innovative work – in this issue, the Department of Justice's FireReady app and an asset-management revitalisation project at NSW's Orange City Council.
As always, I'd love to hear what's on your radar. How are you handling the challenge of mobility?Drop me a line and let me know!
EDITOR
David Braue
NATIONAL SALES MANAGER
Yuri Mamistvalov
Tel: 03 8534 5008
ART DIRECTOR
Annette Epifanidis
Tel: 03 8534 5030
DESIGN & PRODUCTION
Nicholas Thorne
CONTRIBUTORS
Kelly Mills, Kevin Noonan, Adam Turner
MELBOURNE OFFICE
Level 8, 574 St Kilda Rd. Melbourne Vic 3004
PO Box 6137, St Kilda Rd Central 8008
Phone: 03 8534 5000 Fax: 03 9530 8911
Government Technology Review is published by
CommStrat
ABN 31 008 434 802
www.commstrat.com.au
All material in Government Technology Review is copyright.
Reproduction in whole or in part is not allowed without written
permission from the Publisher.
To subscribe to GTR magazine
phone: 03 8534 5009
email: [email protected]
or go to www.govtechreview.com.au/subscribe
SUBSCRIBE NOW
FOR INDEPTH COVERAGE IN YOUR SECTOR
Subscribe to GTR magazine at iSubscribe Go to http://bit.ly/1kIPq7n
GTR Magazine incorporates technology reviews and experience from all levels of government and includes news, case studies, opinion and
roundtable discussions.
4 | GTR JULY/AUG 2014
Ratepayers in Newcastle, NSW are expected to see an improvement in customer service and responsiveness after the City of Newcastle went live with a revamped council administration that consolidates the functionality previously provided by a range of legacy systems.
On July 1, the Council switched on a new and integrated finance, supply chain, payroll and employee self-service environment built on TechnologyOne's OneCouncil solution. The system represents an expanded commitment to the platform, which was previously used for financials, supply chain and enterprise content management alongside a range of other systems.
“We needed to shift from a best of breed approach to an enterprise solution, in order to support the internal drive for more effective service delivery,” council IT manager Greg Brent said in a statement. “We had a number of different corporate applications and a multitude of spreadsheets that were not designed to work together.”
“This meant we were constantly implementing and managing a number of interfaces to facilitate end-to-end transactions across the disparate applications. Development and maintenance of these interfaces is time consuming and expensive with a less than satisfactory outcome.”
Newcastle's new environment replaces legacy systems including Civica Authority, Chris 21 and a range of other inhouse-built systems and reflects a move back from the council's previous best-of-breed IT architecture strategy.
Brent's team will continue to expand the scope of the OneCouncil implementation, with a second phase due to add the remaining OneCouncil modules – including budgeting, asset management, business intelligence, ECM, performance planning, property & rating and customer relationship management – for go-live in July 2015.
“By spending less time on making the different systems work together, we will be able to focus on improved customer service,” Brent said.
“Once implementation is complete we have also forecast significant cost savings to the organisation by reducing licensing, ongoing management and support fees. We will use the new software as a platform to re-engineer our business processes and drive further improvements across Council.”
The City of Newcastle has been working with TechnologyOne since 1996 and was the company's first local-government customer.
NEWCASTLE CONSOLIDATES SYSTEMS FOR CUSTOMER-SERVICE BOOST
Photo credit: CC BY-SA 2.0 berichard
Growing momentum behind electronic voting systems has driven e-voting vendor Smartmatic to open a centre for excellence intended to promote the use of e-voting technologies in elections around the world.
The Smartmatic-Cybernetica Centre for Excellence (CoE) for Internet Voting has been designed with a remit to study and develop the process of voting over the Internet from social, political, organisational, procedural and technological angles.
Citing Cybernetica's early success in Estonia – where nearly a third of voters have voted online through seven general elections in the past decade – Smartmatic has recently secured wins for its
technology in Belgium and Brazil, where the company will roll out 1424 Broadband Global Area Network (BGAN) SABRE satellite terminals to deliver voting services to the country's 15 most isolated states during its October general elections.
In May, Smartmatic helped Belgian voters elect their European Parliament representatives through 3365 polling stations in a process that chose representatives for regional, federal and European parliaments and saw a voter turnout of nearly 90 percent.
To be based in Tartu, Estonia, the CoE will build on the lessons learned in these and other e-voting exercises in order to promote the cause in other countries.
“Estonia has been at the leading edge of Internet voting for years and is widely acknowledged as pioneers in the field,” Smartmatic chief strategy officer Paul Babic said in a statement.
“They are the only country in the world where all voters can choose to vote over the Internet securely. When we were looking at investing in the future of Internet voting, it made a lot of sense to go to the source of the world’s best experience.”
Despite the availability of suitable systems, e-voting has struggled to gain traction in Australia beyond the use of electronic voting in the last four ACT General Assembly elections.
SMARTMATIC-CYBERNETICA CENTRE OF EXCELLENCE PROMOTES ELECTRONIC VOTING
Photo credit: Election MG 3455 - CC BY-SA 2.0 Rama
News
Service provider CSC has boosted its investment in the ANZ region with the launch of a security operations centre (SOC) in Sydney that has filled out the company's global network of support facilities.
That network now has five locations, with more than 700 cybersecurity specialists providing a broad range of around-the-clock monitoring services including advanced threat detection, application security testing, incident response, real-time situational awareness, security information and event management, network and host intrusion detection and prevention, technical compliance monitoring, vulnerability scanning and alerting, endpoint security management, managed encryption services, data loss prevention, and forensic analysis and response.
Linkages between the Sydney centre and its four peers ensure a unified security defence and helps the company detect global trends that inform the provision of proactive global protection for CSC clients, Australian vice president and general manager Seelan Nayagam said.
“Security threats continue to evolve, making it incredibly challenging for organisations today to stay current,” he explained, “much less a step ahead unless cybersecurity is a key focus of risk and budget.”
“As attackers become more sophisticated and risks increase, no single organisation can counter today's escalating risks on their own, therefore making it imperative to work with trusted experts.”
Samuel Visner, CSC’s global cybersecurity vice president and general manager, said the new facility would support innovative cybersecurity efforts in public and private sector organisations.
“New IT architectures require evolving Cybersecurity capabilities,” he said. “In addition, cyber threats to our critical infrastructures require commercial and public sector organisations to innovate constantly. CSC’s global cybersecurity delivery infrastructure is designed to confront new threats and to innovate new technologies and practices as they become available.”
CSC OPENS AUSTRALIAN SECURITY OPERATIONS CENTRE
6 | GTR JULY/AUG 2014
The addition of three new award categories, including one recognising government organisations, has been confirmed by intelligent transport systems (ITS) peak body ITS Australia as it seeks to broaden the scope of ITS-related innovation across the country.
The new categories in the 2014 National ITS Awards program, which is accepting nominations through 30 September, offer travel to the industry's global peak event, the ITS 2015 World Congress, in Bordeaux, France.
The government category is designed to recognise entrants that have developed or deployed a significant new innovative ITS system or services over the course of the previous year. The system or service must have “fostered advanced deployment of ITS services”, the award criteria state.
The National ITS Awards Night and Dinner will be held on 28 November in Brisbane.
Visit www.its-australia.com.au for more information about the awards.
Governance-minded public-sector employees are eligible for up to $12,600 in funding under a scholarship program designed to encourage the development of governance skills in public-sector organisations.
The Chant Legacy scholarships program, which is accepting applicants until October, funds up to six courses at $2100 each at any government-accredited tertiary institution, anywhere in the world.
Scholarships are based on merit and financial need, and have been targeted to bolster governance skills that would support better management and public accountability.
Twenty-one scholarships have been awarded since the program's inception two years ago, with four of them going to public-sector recipients.
“Practical skills and knowledge in governance are critical for anyone seeking to improve the performance, transparency and accountability of their organisation, whatever sector they may be in – private, government or not-for-profit,” said Tim Sheehy, chief executive of Governance Institute of Australia in a statement.
“As public sector budgets continue to be trimmed, government bodies have become more conscious of how a robust governance framework can directly improve the organisation’s efficiency.”
Scholarship applications will be judged by governance professionals including the director of the UTS Centre for Corporate Governance, Professor Thomas Clarke; Julie Hare, higher education editor at The Australian; and Governance Institute board member, Douglas Gration.
Successful applicants will be announced in December and must undertake their study during the first semester of 2015.
Visit bit.ly/1rZSaCO for application forms and more information.
INTELLIGENT TRANSPORT SYSTEMS AWARDS RECOGNISE GOVERNMENT INNOVATION
The growing need to manage risk across organisations will see CEOs creating formal digital leadership roles within their offices by 2015 and fully one-third of large organisations will have digital risk officers (DROs) by 2017, Gartner has argued in recent research.
The transition reflects the growing risk from information-systems insecurity, with IT security teams struggling to manage digital risk as new technology and use cases test their defences in new and potentially compromising ways.
Explosion in the use of Internet of Things, operational and other IT-related technologies will force organisations to take a higher-level view of their operations, and Gartner believes digital risk management is “the next evolution in enterprise risk
and security for digital businesses” as a result.
“Digital risk officers will require a mix of business acumen and understanding with sufficient technical knowledge to assess and make recommendations for appropriately addressing digital business risk," said Paul Proctor, vice president and distinguished analyst at Gartner.
"Many traditional security officers will change their titles to digital risk and security officers, but without material change in their scope, mandate, and skills they will not fulfil this role in its entirety."
The new DRO roles will be “very different” to conventional chief security officer (CSO) positions, with DROs reporting to a senior executive outside of the IT organisation.
Rather than focusing on IT security, the broader scope of the role will see DROs managing risk at a high level across business units and collaborating with peers across legal, privacy, compliance, digital marketing, digital sales and digital operations.
Evolution of the role will see DROs forging close working relationships with CSOs as well as physical security teams, whose increasing reliance on digital technologies increasingly precludes their functioning in isolation.
“IT, OT, the Internet of Things (IoT) and physical security form a new superset of technology that challenges the ability of existing organisational structures, skill sets and tools to consistently and adequately assess, define and
manage technology risks,” Gartner advises in the report, entitled Innovation Insight: Digital Business Innovation Risk – The Rise of the Digital Risk Officer.
“Simply expanding the portfolio of the existing IT security team to include technology risk for all Internet-aware technology is not viable. New and existing technology managed outside of the IT organisation requires skills and tools beyond the competence of the IT security team in its current responsibilities.”
By 2019, the digital risk concept will become “the default approach for technology risk management,” Proctor argues, noting that DROs will influence governance, oversight and decision making related to digital business.
Digital Risk Officers to become common by 2015: Gartner
NewsWORLDWIDE SCHOLARSHIPS FOSTER PUBLIC-SECTOR GOVERNANCE SKILLS
GTR JULY/AUG 2014 | 7
WA councils will get a significantly updated system for electronic lodgement of planning documents after the Western Australia Local Government Association (WALGA) signed a deal with ICON Software to use ICON's LODGE solution as the basis of a massive overhaul of its document-lodgement system.
That system, called CouncilsOnline, went live in 2012 and has facilitated the lodgement of more than 12,000 building and planning approvals as well as more than 11,000 approvals.
The need for a technology refresh was identified in late 2013 in order to improve performance, user experience and integration between councils and other authorities. WALGA went to tender and eventually identified the ICON solution as best meeting its requirements.
Use of ICON's LODGE solution – already in use by WA councils including the Cities of Swan and Gosnells, and the Town of Victoria Park – is expected to improve accessibility by applicants to local government approval processes; reduce red tape through simplified processes, faster approvals and reduced processing costs; improve consistency between local government requirements to streamline approvals processes; and improved transparency, along with the ability to track applications at every stage in the assessment process.
WA local government agencies will be progressively transitioned from the legacy CouncilsOnline platform to a new, hosted instance of the LODGE system.
The expanding GovHack development contest this month named category, team and geography prize winners in the wake of an intense competition that saw more than 1000 participants in 10 geographies putting their heads together to find new uses for government-provided public data.
The GovHack competition (www.govhack.org) saw teams competing in all capital cities (save Darwin) as well as Ballarat, Cairns, Gold Coast and Mt Gambier. Sponsorship from Telstra, Mashery, NICTA, the Department of Communications and a host of A-grade vendors confirmed the growing interest in use of open data sets.
Data sets made available for this year's competition included the National Library of Australia's Trove database; 14 years' worth of Landsat 5 and 7 satellite imagery; API-based access to Australian Bureau of Statistics data; a year of Web-based analytics data through the ATO Web site; energy rating data for 6 million devices sold in Australia, from the Department of Industry; and other national data sets.
There were also regional data sets, including data already available through portals managed by the likes of state governments and cities including Brisbane, Melbourne, Greater Geelong, Ballarat, Gold Coast, ACT, Adelaide, Burnside, Port Adelaide Enfield, and more.
This year's challenge targeted challenges faced by data journalism, digital humanities, open science, business, social inclusion and open government.
For a complete list of winners – and details of the data sets used and the applications that were created – visit www.govhack.org/2014-winners.
An overhauled policy on use of cloud-computing services in government is likely to loosen restrictions requiring ministers to sign off on individual business cases where data is expected to be moved offshore, according to reports in the leadup to the new policy's launch.
Communications minister Malcolm Turnbull confirmed the launch was imminent at a recent IT industry event, noting that the policy would “significantly increase the take up of cloud services by federal government agencies, consistent with our policy for e-government and the digital economy.”
The federal government was spending around $6 billion annually on ICT procurement but had spent less than $5 million on cloud services in the past four years, Turnbull said.
“Of most importance are the actions we're taking to remove barriers that currently restrict, and in many cases prevent, agencies from procuring cloud services.”
Citing draft policy documents, industry journal ZDNet Australia reported that these actions were likely to include the requirement for agencies to get approval from both their portfolio minister, and from the Attorney-General, before they could move data offshore.
Instead, the documents said, that responsibility would be delegated to agency heads who “are ultimately responsible for risk within their agency, and their understanding and acceptance of any risk manifested through outsourced ICT arrangements, including Cloud.”
WA LOCAL GOVERNMENTS SIGNS FOR ELECTRONIC PLANNING LODGEMENTS
GOVHACK INTEREST GROWS AS NEW DATA SETS SPUR CREATIVITY
NEW FEDERAL GOVERNMENT CLOUD POLICY EXPECTED TO LOOSEN POLICY RESTRAINTS
8 | GTR JULY/AUG 2014
Mobile Devices
GOVERNMENTIN THE
FIELD GO MOBILE WITHOUT LOSING CONTROLBYBEVERLY HEAD
GTR JULY/AUG 2014 | 9
Clearly, government data is no longer tethered to the desk
– but is it properly protected when unleashed on mobile
devices?
When the Australian Signals Directorate updated its
executive guide regarding BYOD programmes in February
this year, it outlined the legal, financial and security implications for
public sector IT leaders.
The guide recommends that before embracing BYOD agency CIOs
give careful consideration to issues such as compliance with software
licences, the mechanics of how a freedom of information request might
be handled if relevant data was stored on a personally owned device,
and the need to ensure the security and privacy of information stored on
mobile devices.
Research suggests few have the answers yet: only a quarter of
Australian enterprises with 20 employees or more use any form of
mobile device management technology that can track devices, monitor
use patterns and – if need be – wipe a stolen or lost mobile, according
to analyst firm Telsyte.
BYOD has been embraced across the Australian economy – and
BYO apps (BYOA) is also on the rise. Telsyte’s Enterprise Mobility
Market study indicates around two thirds of Australian organisations
now have some form of BYO app used by employees and 27 per cent
of organisations allow employees to use personal mobile or cloud
applications with no restrictions.
Analyst Rodney Gedda says that BYO is widespread, with most
CIOs knowing that if they try to outlaw it, “Staff will go ahead and do it
anyway”. He says a combination of policy and technology remains the
best approach to ensure IT maintains some level of control over data
and devices.
Chris Roberts, worldwide vice president of public sector with
Good Technology, says that government has been slower to BYOD
(according to Telsyte about 44 per cent of enterprises with more than 20
employees allow BYOD).
Certainly not all public sector organisations allow BYOD. Victoria’s
Brimbank City Council, for example, does not allow any form of BYOD
according to director of corporate services Doris Cunningham.
It does, however, make use of council owned mobile devices to
support employees, which can be almost as challenging to manage.
ACRONYM SOUPIf the BYO market already feels like a big serving of acronym soup, then
gird your loins because there are also moves afoot to advance CYOD
(choose your own device) and COPE (corporate owner and personally
enabled) programmes in the public sector.
Brian Walshe, general manager of end user computing at Dimension
Data, says he is seeing a “pretty strong move away from BYOD”, which
had in the past been implemented as a “knee jerk reaction to the fact
that organisations had fallen behind in keeping technology up to date.”
Matthew Ball, Blackberry
10 | GTR JULY/AUG 2014
posed for employees. Blackberry’s BES10, and looming BES12 systems,
are able to securely wrap content on any device, ensuring its security
and also precluding that data from being cut and paste back into a
personal app on a mobile device.
Andrew Souter, presales manager for Landesk Software, says that the
key feature of any MDM is the ability to know who was using a device and
accessing data, to know what was on the device, and to track the device
and wipe it when required. Earlier this year the company bought LetMobile,
which provides secure email content management, so that nothing which
has been stored on a device can be accessed if that device is lost or stolen.
If the device is lost, it can be replaced and the employee back
up and working immediately. But Souter says that in his experience
people who BYOD are less likely to lose their device and take more
care than if it was employer-owned.
He says that although he has come across a number of
organisations which have a couple of spare 'loaner' devices
that people can use if they do lose their own machines, he says
few agencies hold more than a couple of devices lest they are
superseded.
Gedda agrees that personally owned devices are less likely to
be lost, and doubts many organisations have many spare devices
in stock, although some government agencies may be able to tap
service providers for occasional access to spare devices.
TECHNOLOGY POLICES POLICYThe most successful mobile deployments mesh policy and
technology to authenticate users, provide access, manage and
protect data, steer end user behaviour and police activity. In this way,
they manage the fine balance that exists between managing risk and
supporting flexibility and user productivity.
In NSW, a Government Mobility Solutions Framework has been
developed to help agencies define a mobility strategy appropriate
for their needs.
According to William Murphy, deputy secretary of the service
innovation and strategy branch in the Office of Finance and Services,
“Government agencies can use MDM solutions to protect their
systems and data from unauthorised access, use or disclosure.
These considerations apply irrespective of whether the device is
government issued or BYOD.”
“MDM also covers device back-up and information recovery,” he
continues. “Agencies can develop their own approach to managing
this process within the broader government policy framework.”
When devices are missing or mislaid, MDM solutions can encrypt
information, which agencies are able to scramble remotely should
the need arise. One of the benefits of implementing an MDM solution
is that it reduces the need for data to be stored locally on devices.
Ultimately, Murphy explains, “It is incumbent on each agency to set
their own terms of responsibility for personal devices within their own
agency’s BYOD policy and associated agreements with employees.
“Agencies are required to develop their own specific policy
requirements, and some agencies may assist staff to recover their
own devices – however, these will be addressed in their BYOD
agreements.”
Dimension Data’s Brian Walshe says that it is important when
deploying any form of mobile management system to ensure that
restraints on what people can and cannot do are not so tight that
“People who BYOD are lesslikely to lose their deviceand take more care than ifit was employer-owned.”
Mobile Devices
He expects to see more movement toward CYOD initiatives in
the future, where some degree of soft control is implemented as the
organisation defines a list of equipment that employees may select:
“I don’t think people, if presented with a really good list of equipment,
would want to spend their own money.”
Ultimately, however, it matters less who bought the machine, than
how the data stored on it and productivity it allows is protected.
Cunningham says that the main issues Brimbank faces with employees
using mobile devices is ensuring the security of the devices, and having
a system that allows applications to be pushed out automatically and
securely. It uses VMware’s AirWatch to track and, if necessary, delete
information that is held on devices that are stolen or misplaced.
AirWatch is one of a number of MDM systems delivering technical
support to mobile use policies. Telsyte claims that the MDM market
in Australia is fragmented, with BlackBerry the most widely deployed
followed by AirWatch, MobileIron, Good Technology and SAP.
BlackBerry has lately been reinventing itself in the MDM space
and implemented a series of solutions in the public sector, supplying
systems to the Australian Transport Safety Bureau – which provides
investigators which want one with a BlackBerry smartphone connected
to the BlackBerry Enterprise Service (BES) 10 infrastructure, and to the
Australian National Audit Office which has similarly rolled out BES10 to
support mobile management across the organisation, providing security
and content management for both BlackBerry and other mobile devices.
Managing director Matthew Ball says that ensuring data security for
government agencies was “table stakes” for allowing any form of mobile
access regardless of the lure of freedom and flexibility that mobile
William Murphy, Office of Finance and Services
GTR JULY/AUG 2014 | 11
Capture your email records
Batch profile your emails
Automated data capture
Optional PDF output
Digitisation standardsand compliance
Talk to us ! Local support
Call: 1300 EZESCAN (1300 393 722)www.ezescan.com.au
nase ce z
Save natively into yourEDRMS
they force people to develop workarounds that introduce additional
insecurities. This can perhaps lead to data on mobile devices being
invisible to central data stores and not properly backed up and
protected.
“If you went into government you would find a ridiculous amount of
their IP is on people’s C-drives and not backed up,” says Walshe.
He says a better approach is to use mobile devices for access, but
have the applications and data reside in the cloud – either public or
private.
This may come about from a broader rethink toward mobility
in the public sector. Good Technology’s Chris Roberts says that
there are now some agencies which are looking more holistically
at how mobile devices and mobile access can transform the way
governments operate, rather than being bolted onto existing
processes.
At that point, the discussion would naturally move away from
managing the mobile device, to managing the data. “We are trying to
provide security around the data,” he explains, adding that this was of
greater importance to most organisations “in a post Snowden world”.
Roberts, who visits public sector customers internationally, and
visits Australia three or four times a year, says that local agencies
have been a leader in taking “cyber security and mobility seriously,
and New Zealand isn’t far behind.”
Peter Alexander, Treasury
12 | GTR JULY/AUG 2014
SECURITY THROUGH VIRTUALITYWhile mobile device management systems are useful in providing
the technical muscle to police compliance with mobile policy,
desktop virtualisation may deliver the real key to secure mobile
access according to Treasury’s Peter Alexander.
Alexander is the group general manager of Treasury’s corporate
strategy and services group and is about to initiate a desktop
virtualisation pilot for 50 staff that will allow any device, employee
or employer owned to be used to access applications and data.
“The best way to protect content is not to have content on there
(the mobile) – just have a view of it,” says Alexander.
“I think that is the future of where we are headed, especially
for secure content,” he notes, adding that under that scenario
the ownership or type of device used becomes almost irrelevant.
However Alexander says there will still be a role for MDM, in terms
of managing devices, and being able to wipe them if required –
noting that modern MDMs allow for increasingly granular control
of mobiles such that it’s possible to wipe work content and retain
personal content if that is what an employee prefers.
Treasury had tested Good Technology’s system, which allows
content to be “containerised” and secured, but a requirement from
ASD that Treasury harden mobile devices – essentially locking
them down – before allowing them to access the agency’s secure
network rendered the approach irrelevant.
Instead, Treasury deployed AirWatch. At present the agency does
not allow BYOD; instead it’s adopted a COPE (corporate owned
personally enabled) approach, providing personnel with Apple
devices.
While users are encouraged to make the device their own, there
are limitations: Treasury has banned employees from backing up
data to iCloud in case passwords stored in certificates are rendered
vulnerable, and DropBox is also blacklisted.
Alexander acknowledges that the issue of back up remains
problematic, with users often advised to send emails to themselves of
information they do want backed up.
Mobile Devices
Jodie Rugless,
City of Charles Sturt
LOCKING DOWN BYOD AT CHARLES STURTThe City of Charles Sturt is located in Adelaide’s Western Suburbs, caters for around 107,000 residents and employs 450 people within its administrative operations.
The council developed a policy regarding employee owned devices two years ago, according to manager of information services Jodie Rugless.
Staff that sign up to that policy can access just email, contact lists and calendars at this stage. “Everyone who needs mobile beyond that needs a corporate device,” she says.
For the 40 or so employees who have opted for BYOD, there is a strict policy regarding what happens to the data on that device should it be lost or stolen. In a nutshell, anyone wishing to BYOD, must notify Rugless’ team if their device goes missing – at which point the information systems team will use the native Microsoft Exchange tools to wipe everything from that device including personal data.
According to Rugless, there has been no pushback from users about the Council deploying what amounts to a kill-switch on their personal devices. “It surprised me. But they seemed to feel that was reassuring,” she says.
Rugless adds that the council’s policy is clear: the IT department is not responsible for any support of personally owned equipment, nor will it replace employees’ lost mobile devices regardless of how useful they were for their work.
For council employees with a supplied mobile device, Rugless has deployed Soti’s MobiControl mobile device management system – which allows personal and council information to be distinguished, with only council data erased if a device is mislaid.
Rugless is planning to roll out MobiControl for BYO devices probably in 2015, and at the same time also possibly extend the range of applications that can be accessed from employee-owned mobile devices. She also plans to use the Soti tool to control where and how end users are able to save documents or data on a mobile device.
In parallel, the Council is working toward a new information infrastructure using desktop virtualisation – a pilot is planned for later this year – coupled with a choose-your-own-device initiative which will ensure that very limited content ever resides on a mobile device and employees are given more of a say in the tools that they use for work.
Rugless says that she ultimately wants more control over the data and less over the device.
“This is about personal productivity,” she says, adding that the council was keen to promote work-life blending for staff. “When I’m mobile I prefer the iPad, at my desk I prefer the laptop. If you swapped them around it would reduce my productivity.”
DigitalGovernmentConference
2015
QT Canberra | 17 & 18 March 2015
DIGITAL STRATEGIES | ICT LEADERSHIP | TECHNOLOGY SOLUTIONS
The conference will feature discussion and analysis of key challenges facing government IT professionals including:
• Digital transformation – opportunities, threats and challenges
• Driving innovation and change through technology
• Managing your IT budget and delivering cost savings through IT
• The changing role of the CIO
• Selecting best business value technologies
• Taking an integrated approach to managing technology, people and processes
• Streamlining government processes and service delivery through ICT
• eServices – innovation in service delivery
• Digital strategies – integrating cloud, analytics, mobility and social media for business outcomes
• Mobile solutions – BYOD and mobile device management and mobile applications
• Cloud computing implementation strategies and policy considerations
• Big data analytics – gaining strategic value and improving service delivery through data analytics
• Security and privacy – strategies, policies and risk mitigation
CALL FOR SPEAKERS:
Government and public sector speakers who wish to be considered for speaking program selection for the Digital Government Conference 2015, please email Kim Coverdale, Conference Convenor, at [email protected] with your proposed topic title, proposed presentation outline approx 100-150 words) and a brief bio of yourself.
The 2nd Annual Digital Government Conference 2015 will provide government IT professionals with vital information about industry trends and current and emerging technologies through the presentation of expert analysis and case studies from leading IT professionals within government as well as industry experts and thought leaders. The conference will also examine the role of specifi c technologies and processes in delivering effi ciencies and cost savings as well as improving service delivery.
EARLYBIRD REGISTRATIONS NOW AVAILABLE
Register online at www.govtechreview.com.au/digitalgovernment before 15th December 2014 and save $100 off the standard registration price.
MULTIPLE DELEGATE DISCOUNTS AVAILABLE
Register three delegates from the same organisation for the price of two delegate fees (registrations must be made at the same time. Offer excludes entry to the Conference Dinner).
www.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernmentwww.govtechreview.com.au/digitalgovernment