[ISN] U.S. Army gets tough with desktop software policy

From: InfoSec News <alerts_at_private>
Date: Wed, 8 Oct 2008 03:06:54 -0500 (CDT)

By Ellen Messmer
Network World 

Many organizations would like to keep their network users from adding 
unauthorized software to their desktops, and the U.S. Army is no 

Since early this year, the U.S. Army Information Management Support 
Center, which supports the Pentagon staff, has deployed software on 
about 11,000 desktop machines that watches for unauthorized 
applications. If one is discovered, the monitoring software reports back 
so an Army oversight group called the Configuration Control Board, which 
lets the user also know about the discovery so a decision can be made 
about whether the application should be allowed.

If there’s no justification for using the software, the unauthorized 
application can be automatically deleted remotely. According to John 
Brehm, senior systems engineer at Serco, a systems integration firm 
aiding the Army in this program, the goal is to identify unauthorized 
applications and enforce policy while giving users the opportunity to 
explain why the software is on their desktop.

“A directive came out from the CIO in the Army because there was a lot 
of unauthorized software running,” Brehm says. “This is potentially 


Register now for HITBSecConf2008 - Malaysia! With 
a new triple-track conference featuring 4 keynote 
speakers and over 35 international experts, this 
is the largest network security event in Asia and 
the Middle East! 
Received on Wed Oct 08 2008 - 01:06:54 PDT

This archive was generated by hypermail 2.2.0 : Wed Oct 08 2008 - 01:12:52 PDT