Flexible working

Technology that enables more flexible ways of working, typically away from the organisation’s offices or usual locations.
Showing 18 results
Sort by: A-Z|Date
  • Android End User Device Security

    Guidance17 Apr 2018TopicsFlexible working, End user device

    Guidance for organisations considering deploying an Android platform as part of a remote working solution

  • End User Device Security Collection

    Guidance17 Apr 2018TopicsFlexible working, End user device

    Guidance for organisations deploying a range of end user device platforms as part of a remote working solution

  • End user devices: factory reset and reprovisioning

    Guidance31 Jan 2018TopicsFlexible working, End user technology, End user device

    The methods described here are not guaranteed data sanitisation methods; they may not completely erase data so it cannot be recovered. For more information about how to sanitise affordably, please refer to the NCSC guidance on Secure sanitisation of storage media.

    Guidance for organisations deploying or redeploying mobile devices onto their networks.

  • Agile and Security

    CyberUK In Practice Track 4: Securing Agile Delivery

    Blog post11 Mar 2017AuthorIan MTopicsCyber strategy, Flexible working

    Ian M tells us what we can look forward to at the fourth track of CyberUK In Practice.

  • Like a car, which MDM tool is best?

    NCSC IT: MDM products - which one is best?

    Blog post08 Mar 2017AuthorAndrew ATopicsFlexible working, End user device, Assurance

    In part 3, we discuss why there is no one right answer to "What is the best MDM product?", as we found when building our own IT system.

  • End User Devices Security Guidance: Apple iOS 6 Application Development

    Guidance11 Aug 2016TopicsFlexible working, End user technology, End user device

    Due to updates in the platforms, this document is no longer current. It is kept here for reference purposes.

  • Apple End User Device Security

    Guidance11 Aug 2016TopicsFlexible working, End user device

    Guidance for organisations considering deploying an Apple platform as part of a remote working solution

  • Windows End User Device Security

    Guidance11 Aug 2016TopicsFlexible working, End user device

    Guidance for organisations considering deploying a Microsoft Windows or Windows Mobile platform as part of a remote working solution

  • Data at Rest Encryption - Always-on Mobile Devices (CC Mapping): CPA SC

    Document08 Aug 2016TopicsFlexible working, End user device, Assurance

    These security products aim to maintain the confidentiality of data stored on an ‘always-on’ mobile device by encrypting the data and providing controlled access to it. This protects the data if the mobile device is lost or stolen.

  • 10 Steps: Home and Mobile Working

    Guidance08 Aug 2016TopicsFlexible working, Cyber attacks

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Home and Mobile Working.

  • Security Procedures Cisco AnyConnect v3.1

    Document01 Aug 2016TopicsFlexible working, IT infrastructure, Network security

    These Security Procedures provide guidance in the secure operation of Cisco AnyConnect Secure Mobility Client v3.1 in relation to acting as an IPsec VPN software client.

  • Security Procedures Cryptify Call

    Document01 Aug 2016TopicsFlexible working, Cryptography, Secure communications

    These Security Procedures provide guidance in the secure operation of Cryptify Call.

  • Security Procedures Becrypt Disk Protect Foundation Grade

    Document01 Aug 2016TopicsFlexible working, Identity and passwords, Secure communications, Assurance

    These security procedures provide guidance on the secure operation of Becrypt Disk Protect.

  • Security Procedures Becrypt Disk Protect Augmented Grade

    Document01 Aug 2016TopicsFlexible working, Cryptography, Identity and passwords, Assurance

    These Security Procedures provide guidance on the secure operation of Becrypt Disk Protect.

  • IPsec VPN Client: CPA SC

    Document14 Jun 2016TopicsFlexible working, Network security, Assurance

    Provides secure corporate network connectivity over a less-trusted network

  • IPsec VPN Gateway: CPA SC

    Document14 Jun 2016TopicsFlexible working, IT infrastructure, Network security, Assurance

    Provides an endpoint for an IPsec Virtual Private Network (VPN) tunnel, from either a VPN client or another security gateway.

  • Secure Real-Time Communications Client: CPA SC

    Document08 Feb 2016TopicsFlexible working, IT infrastructure, Network security, Assurance

    Secure real-time communications clients are used to secure voice and/or video links over an untrusted network. The client aims to provide an encrypted and mutually authenticated channel for real-time communications media to be transferred between mobile or fixed devices.

  • Mobile Device Management (CC Mapping): CPA SC

    Document08 Feb 2016TopicsFlexible working, End user device, Assurance

    Management Solutions capable of remotely administering, configuring, and auditing mobile devices deployed by an enterprise.