GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Mobile content

Unlock Compliance Success: Zimperium’s Role in Attaining NIST SP800-124 Rev 2 Compliance

Unlock Compliance Success: Zimperium’s Role in...

With 87% of businesses requiring mobile devices in the workplace, the increased reliance on these devices comes with various security challenges and compliance requirements that organizations must navigate. Adhering to…

Learn More
Cybersecurity Maturity Model Certification: The Mobile Device Requirements and How to Address Them

Cybersecurity Maturity Model Certification: The...

To comply with Cybersecurity Maturity Model Certification (CMMC) requirements, organizations need to ensure a comprehensive set of security controls are in place, and this includes protections against the risks posed…

Learn More
NIST SP800-124r2   Guidelines for Securing Mobile Devices in the Enterprise

NIST SP800-124r2 Guidelines for Securing Mobile...

The National Institute of Standards and Technology (NIST) released a Special Publication 800-124-Revision2 (NISTSP800-1242), “Guidelines for Managing the Security of Mobile Devices in the Enterprise.” This publication provides readers with…

Learn More
How to Enable Secure Mobility for Fixed Location Workplaces White Paper Annex 3

How to Enable Secure Mobility for Fixed Location...

The Future of Secure Work Base Paper outlines how the US Government (USG) has acknowledged the utility of mobile devices across environments. However, agencies that use sensitive or classified information…

Learn More
Lookout Mobile Endpoint Security Solution Brief

Lookout Mobile Endpoint Security Solution Brief

Traditional cybersecurity strategies have long been focused on protecting your fixed endpoints such as servers, laptops and desktops from cyberthreats. However, your security requirements have grown organically over time. The…

Learn More
The Future of Secure Work: How to Enable the Secure Workforce of the Future Through Secure Mobility

The Future of Secure Work: How to Enable the...

To remain relevant and effective, Secure Work must leverage, embrace and expand access to mobile communications. In legislation and strategies from the national to department levels, the Federal government has…

Learn More
The Evolution of 5G Spectrum

The Evolution of 5G Spectrum

It is clear that more capacity will be needed for the variety of potential use cases over the next decade as 5G continues to evolve beyond mobile broadband smartphone use…

Learn More
3GPP Technology Trends

3GPP Technology Trends

In the ever-evolving realm of telecommunications, the 3rd Generation Partnership Project (3GPP) plays an important role in the innovation and progress of connectivity and communication in an interconnected world. While…

Learn More
Energy Efficiency and Sustainability in Mobile Communications Networks

Energy Efficiency and Sustainability in Mobile...

This white paper analyses the key strategies and technologies to enable energy-efficient operation of mobile networks, the potential inclusion of alternative or renewable energy solutions as part of mobile infrastructure,…

Learn More
Washington D.C. Cyber Threat Landscape

Washington D.C. Cyber Threat Landscape

In the last few years, the prevalence and intensity of mobile cyber threats has increased. Mobile security is now at the forefront of conversation as federal agencies work to secure…

Learn More
5G Fund for Rural America: Current Status and Issues

5G Fund for Rural America: Current Status and...

On October 27, 2020, the Federal Communications Commission (FCC) created the 5G Fund for Rural America (5G Fund). The FCC directed that $9 billion over the next 10 years from…

Learn More
State of Mobile Network Evolution

State of Mobile Network Evolution

Mobile communications is a rapidly evolving field that encompasses various technologies, applications, and services. The main drivers of this evolution are the increasing demand for high-speed data, low-latency connectivity, ubiquitous…

Learn More
Deep Reinforcement Learning-based Task Assignment for Cooperative Mobile Edge Computing

Deep Reinforcement Learning-based Task Assignment...

Mobile edge computing (MEC) integrates computing resources in wireless access networks to process computational tasks in close proximity to mobile users with low latency. This paper investigates the task assignment…

Learn More
Guidelines for Managing the  Security of Mobile Devices in the Enterprise

Guidelines for Managing the Security of Mobile...

Mobile devices were initially personal consumer communication devices, but they are now permanent fixtures in enterprises and are used to access modern networks and systems to process sensitive data. This…

Learn More
Mobile VPN enables a new nomadic workforce

Mobile VPN enables a new nomadic workforce

The enterprise market has been developing and shaped by the need to support a mobile workforce that needs to access both the company’s intranet as well as the internet in…

Learn More