recommended reading

Apple iPhone Unlikely to Attract Feds' Interest


By Daniel Pulliam June 27, 2007

recent posts

Despite receiving rave reviews from major technology reviewers (here, here and here), Apple's cell phone/music player/video player/web browser device dubbed the iPhone will not likely make its way into federal markets anytime soon.

Federal information technology shops have provided mobile e-mail devices that double as cell phones to thousands of officials in the last few years, but the drawbacks of adopting Apple's new technology device will make agency chief information officers hesitant about rushing to the nearest Apple or AT&T store to purchase the much hyped device.

According to a MacWorld report, the analyst firm Gartner will tell IT decision-makers to avoid the iPhone and to keep it off their networks because it lacks support for services like Microsoft Exchange and does not have security functions like a firewall.

“We’re telling IT executives to not support it because Apple has no intentions of supporting (iPhone use in) the enterprise,” Gartner analyst Ken Dulaney says. “This is basically a cellular iPod with some other capabilities and it’s important that it be recognized as such.” …

“You’ll have e-mail in a place that’s unsecured. There are no firewalls on the device. There’s no ability to wipe (data from) the device if it’s lost,” Dulaney says.

Businesses have little, if any interest in the iPhone and Apple isn’t marketing it to the business sector anyway, says Randy Giusto, who leads IDC’s analysis of mobile devices, computing and computer markets.

“The iPhone is not positioned at all for the IT world,” he says. “It’s a very personal device. Most corporations are probably not going to support the iPhone on their networks.”

In addition to the technical challenge, an agency official looking to procure the device for government use will not likely be able to use the General Services Administration's schedules program.

A GSA spokeswoman said the agency doesn't initiate iPhone approval for sale on the multiple award schedule 70, a popular IT acquisition vehicle. The contractor, in this case Apple or AT&T, initiates the approval for sale on MAS 70, the spokeswoman said. As of a week ago, "no one has indicated customer demand but then again the phone isn't out yet."

As for Apple's plans, an Apple spokeswoman told Tech Insider last week that all the public information the company can provide on the iPhone can be found at or She did not say whether Apple would attempt to place the product on GSA's schedules.


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.