Tresys Technology CTO to Present Webinar on Mobile Security for Government

Share Article

“Creating Mobile Devices for Use in a Government Environment” webinar scheduled for June 21

Tresys Technology, a provider of technology and engineering services for customers with high security requirements, today announced that Chief Technology Officer, Karl MacMillan, will present in detail on the technical and market challenges to creating secure mobile devices, with a strong focus on customized Android devices. MacMillan will also discuss possible solutions to these challenges and will provide an overview of penetration testing and certification of complex mobile devices.

Mobile computing, including smart phones and tablets, offers a viable replacement to traditional computing environments, in addition to offering many new opportunities. The features available on mobile platforms are so compelling that half of all mobile phone users in the United States are smart phone users. However, the uptake in Government, the Department of Defense (DoD), and other security-conscious organizations has lagged the broader commercial sector, largely because of concerns around security.

The mobile environment itself presents a wide range of security challenges. First, mobile computing encourages users to bring data and communications out of physically secured environments into the broader world. In addition, the complex hardware and software stack on modern mobile platforms faces the same challenges as traditional hardware and operating systems. Lastly, mobile platforms lack provisions for enforcing the strong separation of data and protecting data-at-rest and in-transit. For the classified world, there simply is not currently a viable platform. While the popular mobile platforms include novel security features to address these challenges, they also make many of the same mistakes made when traditional operating systems were first introduced. The impact of these threats is clear—to-date dozens of mobile vulnerabilities have resulted in full compromises of devices, allowing attackers to run arbitrary applications and exfiltrate all data.

The webinar, hosted by the Armed Forces Communications and Electronic Association’s (AFCEA) journal, SIGNAL Magazine, will take place on Thursday, June 21, 2012, 1:00 pm - 2:00 pm EDT. Attendees should register at:
About Tresys Technology

Based in Columbia, Maryland, privately-held Tresys Technology has solved the most complex information security problems for a wide array of defense, intelligence, and commercial customers. Tresys provides innovative product and services solutions to hard problems in cross domain, deep content inspection, secure operating systems including SELinux, mobile devices and OSs, and software assurance. Our knowledge of the secure design, certification, and accreditation of complicated custom hardware and software solutions, combined with insight into the sophisticated requirements of our customers, allows us to deliver innovative solutions to modern security challenges. The experience gained from solving real-world problems has enabled Tresys to develop industry-leading and authoritative services. For more information, visit:

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Traci Robinson-Williams
Visit website