This site provides some external hyperlinks to other websites. The Coalition of Apple Engineers does not constitute an endorsement or an approval of any of the products, services or information on these linked websites. These links are meant to be informative and helpful, but the Coalition of Apple Engineers is not responsible for the accuracy, legality or content of the external site..

Upcoming Events

home

 10/24/2017 - 07:00
CAE Events Icon

Jamf, the leader in Apple device management, today announced the venue and opened registration for its eighth annual Jamf Nation User Conference (JNUC) – the largest gathering of Apple


 05/07/2017 (All day)

Conference and Exhibitions
7-9 May 2017
Brighton, UK

 03/28/2017 (All day)

The ATARC Federal Mobile Computing Summit will be held on March 28, 2017 at the Marriott Metro Center in Washington, D.C.

 02/24/2017 - 15:30

Cupertino, California — Apple today announced its 28th annual Worldwide Developers Conference (WWDC) — hosting the world’s most talented developer...

Current News

home


Reader G. Murray needs to restart his Mac at times when it’s not within arm’s reach—or even with walking legs’ reach. He’s wondering what options are available with modern Macs. His Mac is located on a network created by a Time Machine, so it has a privately assigned IP address using NAT (Network Address Translation).



From a new file system to powerful graphics improvements, to how to perform an installation, here’s all you need to know about Apple’s new desktop OS.

Rachel is trying to sell her Mac, but…

My friend was wiping my Mac so I could sell it and I’m pretty sure they’ve deleted the start up disk? It’s not letting me reinstall the OS on a recovery startup.

I’m glad to see a positive security trend: more companies have software available for hosted backups and cloud-based storage access that incorporates user-owned encryption. With these products and services, you are the only person or entity that controls the encryption key or passphrase that unlocks the key.

At WWDC, Apple introduced new features that address the more egregious problems that plague users.

Developers coding for iOS 11 will be able to create apps that can read NFC tags, opening the door for the wireless exchange of information between an iPhone and various connected devices in a user's environment.

Apple is already putting an end to 32-bit apps on iOS devices with iOS 11, and soon the company will make the same changes on its macOS operating system.

Apple Technologies in the Government

home

Secure Host Baseline (SHB) products

Secure Host Baseline (SHB) products provide pre-built content to easily deploy hardened Operating System (OS) and application software to Department of Defense (DoD) mission systems.  SHB products adhere to the latest standards and policies, thereby providing a consistent operating picture for common software components. SHB products for Apple OS X are located on the Defense Information Systems Agency (DISA) Information Assurance Support Environment (IASE) website at http://iase.disa.mil/Pages/index.aspx under the DoD Baseline Configuration Repository link...

 



Security Content Automation Protocol (SCAP) Compliance Checker (SCC) is a SCAP 1.0 Validated Scanner, with support for SCAP  versions 1.1 and 1.2, and an Open Vulnerability Assessment Language (OVAL) adopter, capable of performing compliance verification using SCAP content, and authenticated vulnerability scanning using OVAL content.

 

NIST announced the completion of Special Publication 800-57 Part 1 Revision 4, Recommendation for Key Management, Part 1: General and is now available.  Also,  NIST has released NISTIR 7511 Revision 4, Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements.

SRGs provide general security compliance guidelines. They serve as source guidance documents for STIGs. STIGs document applicable DoD policies and security requirements for specific technical products, as well as best practices and configuration guidelines. SRGs, STIGs, benchmarks, and other information security-related resources are all available at DISA's Information Assurance Support Environment (IASE) website. Each SRG or STIG will provide instructions on how to use and apply the guidance it contains.

Event Calendar

home
S M T W T F S
 
 
 
 
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
10
 
11
 
12
 
13
 
14
 
15
 
16
 
17
 
18
 
19
 
20
 
21
 
22
 
23
 
24
 
25
 
26
 
27
 
28
 
29
 
30
 
 

Software

home

Information on numerous third party software solutions that supports one or more of the current Apple technologies that is being utilized within the Federal Government. Listed below are recently posted software updates and information.
-----------------------------------------


Symantec Corporation

Federal Government Solutions
Phone: (650)527-8000

Symantec Encryption for Apple devices:

Thursby Products

Thursby Products
www.thursby.com/products
sales@thursby.com
(817) 478-5070