Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation.
Users must ensure sensitive data is properly protected in compliance with all VA regulations. Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 61 VA Directives 6004, 6513, and 6517 and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). The implementation of mobile technology applications that operate on a Mobile Operating System must be reviewed and approved by the Mobile Technology and Endpoint Security Engineering Team: See Category tab/Comparable for the corresponding Mobile entry. This entry only covers the Desktop Edition of this technology. More information on the proper use of the TRM can be found on theĬisco An圜onnect Secure Mobility Client (formerly Cisco An圜onnect VPN Client) provides endpoint security, policy enforcement, and encrypted network connectivity for a variety of platforms to allow corporate network access.
Technologies must be operated and maintained in accordance with Federal and Department security and