AOH :: IS1220.HTM

U.S. Army gets tough with desktop software policy

U.S. Army gets tough with desktop software policy
U.S. Army gets tough with desktop software policy

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

Content-Transfer-Encoding: QUOTED-PRINTABLE

By Ellen Messmer
Network World 

Many organizations would like to keep their network users from adding 
unauthorized software to their desktops, and the U.S. Army is no 

Since early this year, the U.S. Army Information Management Support 
Center, which supports the Pentagon staff, has deployed software on 
about 11,000 desktop machines that watches for unauthorized 
applications. If one is discovered, the monitoring software reports back 
so an Army oversight group called the Configuration Control Board, which 
lets the user also know about the discovery so a decision can be made 
about whether the application should be allowed.

If there=E2=80=99s no justification for using the software, the unauthorized 
application can be automatically deleted remotely. According to John 
Brehm, senior systems engineer at Serco, a systems integration firm 
aiding the Army in this program, the goal is to identify unauthorized 
applications and enforce policy while giving users the opportunity to 
explain why the software is on their desktop.

=E2=80=9CA directive came out from the CIO in the Army because there was a lot 
of unauthorized software running,=E2=80=9D Brehm says. =E2=80=9CThis is potentially 


Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

Register now for HITBSecConf2008 - Malaysia! With 
a new triple-track conference featuring 4 keynote 
speakers and over 35 international experts, this 
is the largest network security event in Asia and 
the Middle East! 

Site design & layout copyright © 1986-2015 CodeGods