A person holding a smartphone displaying a webpage with a dark mode interface while sitting on a couch.
| |

The Ultimate Guide to A365 and Army MAM for Secure Mobile Access

There Are Limited Seats to Army MAM, Sign Up Now

BLUF

The United States Army Network Enterprise Technology Command, or NETCOM, lifted the check fire on Army MAM onboarding today and there are limited seats available. This secure mobile solution is centered around the A365 suite (the Army’s Microsoft 365). We will have more information to follow, but we suggest you sign up before all the seats are gone!

Where Can I Sign Up for Army MAM (Intune)?

Follow this link, but you must be on NIPR or AVD: Army MAM Onboarding (NIPR + CAC). Oh, and if there was ever a time in your life to read the manual, this would be it.

What is Mobile Application Management (MAM) and Its Role in The Army Enterprise?

Mobile Application Management (MAM) is a technology that allows organizations to manage and secure applications on employees’ mobile devices. In the Army enterprise, MAM plays a crucial role in ensuring the security of digital assets and data by providing centralized control over mobile applications and their usage. Note that this is application management and not device management. The key difference is that on government-funded equipment (GFE), the Department of Defense owns all the data and activity on the phone meaning you should only use the equipment for work purposes. For application management, the DoD only regulates the application you are using the the government cloud.

Government cloud: This service is also known as GCC High or DoD. This instance is a data center that’s physically separate from the commercial instances. The data center is locked down and is only used by government customers who purchase the appropriate license (Ohlinger, et al. 2024).

Diagram comparing Microsoft Clouds: Commercial Service (for public tenants) offering Azure AD, Information Protection, Office 365, Intune; Government Cloud (IL4/IL5 tenants) with similar services but separate instances. Includes A365 onboarding for seamless integration into Army MAM systems.

In the case of Army MAM, only the Microsoft 365 suite is locked to your organization, offering a unique balance of a productive working environment without having to sign for, or carry, additional equipment.

How Does A365 Impact Army Operations and Why the Transition to Secure Alternatives Is Necessary?

Many of you reached out to us around 11 June asking why your access to webmail disappeared. NETCOM made the decision to shut down Flow 3 which provided access over commercial internet (non-NIPR). The Army 365 (A365) services, including webmail, Teams, SharePoint Online, and OneDrive, are essential tools for communication and collaboration within the Army. However, with the increasing threat of cybersecurity breaches, the transition to secure alternatives like AVD or Hypori is necessary to protect sensitive information and maintain operational readiness.

What Are the Benefits of Using AVD or Hypori as Secure Mobile Solutions for Soldiers?

AVD (Azure Virtual Desktop) and Hypori are both secure mobile solutions that provide encrypted access to Army 365 services and other applications. By utilizing these platforms, Soldiers can ensure the confidentiality and integrity of their data while maintaining productivity and seamless communication within the Army enterprise. AVD and Hypori are virtual environments hosted on your device. To ensure a secure environment, you cannot download or upload documents and files between your personal desktop and the virtual one. The benefit of having a virtual environment is that government data remains in a secure environment. Unlike when a NASA employee loses their government laptop with social security numbers, if you were to lose or damage your laptop, you could login using another computer with CAC capability.

The key difference between the AVD/Hypori virtual environments and the Army MAM (Intune) options is that the latter uses a dedicated device, and the information is stored on your mobile device. There is no virtualization. NETCOM employs several security measures to ensure data becomes inaccessible if needed.

How can Soldiers Effectively Manage Mobile Applications Using MAM In the Army?

Soldiers can effectively manage mobile applications in the Army by adhering to the guidelines and protocols set forth by the Mobile Application Management (MAM) policy. This includes installing only authorized applications (MS Authenticator, Defender, Outlook, Microsoft 365, MS Teams, and Intune Company Portal), updating software regularly, and following best practices for mobile device security to minimize the risk of cyber threats.

Can The Army See My Personal Information?

First, if you have Facebook, X, Instagram, or TikTok on your phone, stop reading. Most of you have bigger issues feeding those applications with calendar and contact sync, location services, and access to your camera and microphone. Army MAM is isolated to keep your data safe and to ensure DoD systems remain secure.

Conclusion: An Upgraded Alternative for Army Mobile Productivity

The Army’s adoption of Mobile Application Management (MAM) solutions, such as AVD and Hypori, demonstrates its commitment to safeguarding digital assets and enhancing cybersecurity measures within the Army enterprise. By transitioning to secure alternatives and embracing the principles of MAM, Soldiers can contribute to a more secure and resilient digital ecosystem for effective mission accomplishment.


Sources / Credit

Similar Posts