Skip to content
 

cjis

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: Entrust Datacard     Published Date: May 15, 2014
A proven, cost-effective strong authentication approach for law enforcement compliance in the United States
Tags : 
entrust, security, cjis, compliance, fbi, security policies
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
To help protect access to this sensitive information, a strict set of security controls is defined in the FBI’s CJIS Security Policy and must be adhered to by organizations that access CJIS information.
Tags : 
authentication, cjis, compliance, sensitive information, security, controls, fbi, policy
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.
Tags : 
cjis, compliance solutions, security control, law enforcement, courts, public safety departments, software authentication
    
Entrust Datacard
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.