Category : Standard

Mobile Management Policy – The Essentials

Mobile-Device-Management-43-0

May it be mobile device management (MDM) software or the integration of MDM as a part of enterprise mobility management (EMM) two goals remain : protecting company data and optimizing technology for your company’s needs. Here are 7 Essentials to you mobile device management deployment.

  1. Square One – When it comes to technology it is nearly impossible to create a 5 year plan that even stands a chance. Technology just moves too quickly. Rather you need to constantly evaluate your information technology strategy for the needs and goals of your business. Instead of pinpointing one item in particular and getting bogged down by the details, such as mobile integration, think about how mobile integration can help aid your business goals. And if you can’t get the answer to that question on your own, enlist the help of a trusted Information technology company to help you see the light at the end of your businesses tunnel.
  2. All Aboard – All relevant departments should be represented in strategy sessions, so that all departments can be supported with a unified strategy whether that be for mobile, desktop, applications, web interfaces. Each department will have their own specific concerns and needs which can be better mitigated with a unified discussion and plan. This does not mean you have to enforce a plan that fits all, but rather a plan that brings all together on a similar page, the plan itself can be tailored to fit the needs of each employee or department, depending on user roles and requirements. For example, accounting and sales. Each will deal with different daily tasks, but can share the need of a digital interface to make such daily tasks easier and more efficient. Each department will most certainly use different applications and software, but the mitigation and support for each should be a unified plan.
  3. Put it in Writing – A compliance policy document is the easiest was to eliminate uncertainty and educate the members of your organization. Make sure to spell out eligibility, supported devices, as well as user rules and responsibilities. These can include but as not limited to, reporting a broken, lost, or stolen device, performing regular system and application upgrades. It is extremely important to relay to employees that information technology responsibility is shared between the organization and the members of that organization. This is also a great place to educate your staff on secure practices to keep company data secure.
  4. Teach Your Team – This may seem obvious, but do not roll out a bunch of brand new software without teaching your people how to navigate responsibly. This means taking the time to establish security compliance in combination with procedures and training. Stress the importance of separating personal and company data as well as regular back ups. If a configured network-attached storage (NAS)  is in your company plan for cloud storage, teach your members how to use the cloud rather than Dropbox. If employees are working around secure procedures, it is important to find out why, what interface is causing trouble so much so that employees are avoiding company policy. Then proceed to fix this problem.
  5. Be Well Supported – Trying to support every users on every device brings chaos. Roll out with a limited program with a subset of employees and devices and if you do it right, you should be able to scale to a larger population. Another smart idea is to limit the applications on your mobiles, you can set up you own in house app store for your company’s mobile devices that allows you to pick and choose which third-party applications are available. This should help manage security on all devices, as malware is increasingly present in applications.
  6. Find the Right User Experience – The size of your business is a large factor in how much you will be able to provide and control. Perhaps your small business does not have the resources to set up an in house app store. this should not stop you from find security means to protect your company. You can create your own website with a responsively designed user experience for assorted small screens. You can also convert browser-based apps to native ones.
  7. Who, What, Where are still Important – Mobile device management platforms offer geofencing capability that adds a new dimension to mobile security, by automatically taking action or requiring a different level of sign-on security if a device is taken further than a set distance form the company headquarters. You can even restrict operations this way.

 

The key to viable mobile device management is to develop a unified plan that can be presented to members  in a way that explains their responsibility to the protection of company data. As always, a good IT company is your best friend for safe and secure management of multiple devices.

 

 

 

 

 


 

 

If you would like to educate yourself in more detail about the information presented in this blog post please visit : www.pcmag.com

200 petaflop supercomputer from IBM – coming early 2018

summit_highlight_update

 

The Department of Energy’s Oak Ridge National Laboratory is expected to take delivery of a new IBM system, Summit, in early 2018. Summit will be capable of 200 peak petaflops, making it twice as fast as Sunway TaihuLight, China’s new system announced this past Monday. As of now, TaihuLight is listed in the TOP 500 list of fastest supercomputers in world. TaihuLight packs a Linpack benchmark score of 93 petaflops and a claimed peak of 124.5 petaflops. Linpack benchmark has become the perferred yardstick for measuring performance of supercomputers, as it doesn’t record overall performance but rather performance of the system when solving dense systems of linear equations. This gives the best approximation of real-world performance. The Summit however, will emply IBM power 9 and Nvidia Volta GPUs. Using about 3,400 nodes, Summit will deliver five times the computational performance of Titan’s 18,688 nodes. Over half a terabyte of coherent memory in each node, as well as 800GB of non-volatile RAM, serving as a burst buffer or extended memory.  Cray also announced this week that it’s XC systems are now available with the latest Intel Xeon Phi (Knights Landing) processors. The XC systems should deliver a 100% performance boost over prior generations, with an adaptive design that supports multiple processor and storage technologies in the same architecture. Cray also revealed the Sonexion 3000 Lustre storage system, which will deliver speeds of almost 100 GB/sec in a single rack.

 

 

 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: IBM to deliver 200-petaflop supercomputer by early 2018; Cray moves to Intel Xeon Phi

Robots take 60,000 jobs – and we’re happy about it

dfox

 

Main Apple supplier and the largest electronics manufacturer in the world, Foxconn, has automated 60,000 jobs, the goal of their long pursued automation integration. Now, that being said, we must take into account the abilities and resources of the organization. The company itself has taken a great leap into the robotics market, even predicting HUGE increases in robotic manufacturing on their product line. Foxconn also has a significant stake in SoftBank Robotics Holdings. If you don’t already know SoftBank makes the emotionally intelligent robot, Pepper.

Foxconn CEO relays that the company will be applying robotics engineering to replace repetitive tasks previously done by employees. The company wishes to move their employees into more research and development roles and other higher end value positions that have to do with the manufacturing process. The company still has jobs for their over 1.2 million employees even with the automation of 60,000 positions. I find it hard to believe that Foxconn will do anything other than continue to innovate and invest in the robotics market for both their own company and the innovation of other markets. Foxconn CEO states that they expect to keep a significant workforce in China, even with automation.

To be honest, nothing about this is surprising to me. Foxconn is a huge company as both a manufacturing powerhouse and a significant contributor to the robotic market. It is only in their best interest that they employ some of the technology they help put together. Not only will this increased innovation make for a more efficient production line, but will most certainly set the standard for other companies to come.

 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: Apple supplier Foxconn automates 60,000 jobs, but says quality, productivity will improve

Two-Factor Authentication Evaluation Guide

Two-factor Authentication is a type of multi-factor authentication that provides identification of users using a combination of two different components. These components are often something the user knows, possesses, or something that is inseparable from the user. This Guide has been adapted from Duo Security, and illustrates what to consider when deciding upon a vendor for Two-factor Authentication for your company.WP17

Security

 

In order to enforce this extra layer of protection it is important to consider the factors involved. Security and ease of implementation should be of first priority. The vendor in which provides your two-factor authentication should be secure by design. The cloud based service should use multiple, independent PCI DSS Level 1 and ISO 27001-certified, SAS 70 Type II-audited service providers and is split across multiple geographic regions, service providers and power grids for seamless failover. This ensures that you have a reliable vendor that has an infrastructure that is fully scalable and elastic enough to be able to accommodate any number of users. You should be able to add users as you need them without issue. The vendor should also be backed by a strong service level agreement and the service should offer 24/7 operational coverage.

Cloud-based authentication services are easy to use and tend not to require installation of hardware. Selecting a vendor with drop-in integrations for all major VPNs, Unix, and MS remote access points. Something to look for is deployment. The two-factor authentication process is best implemented when it leverages a platform users already have, such as cell phones. Make sure the service you employ works with landlines and tokens to save your IT administrator from having to manage tokens.

Usability

Usability and convenience are a major part of making two-factor authentication a productive solution. A vendor that keeps a lot of “clutter” such as extra steps gets in the way of the login path and makes for a large and unneeded distraction. Allowing users to easily enroll themselves and set their preferred devices to use for authentication makes the login process easier. This should be met by a vendor that supports a wide range of authentication methods including push to mobiles app, passcode and phone call back.

Administration

When choosing the ideal vendor, make sure the administrative needs are met. For instance, consider if the solution allows for visibility insight into user access of your network. Authentication logs should be provided for auditing and reporting. Systems that provide a centralized admin interface give a consolidated view of how the two-factor authentication is working, and allows for better maintenance. It would be best if the system managed the physical tokens rather than forcing you to manage such items. In addition if you are looking for a cost effective solution, cloud hosted vendors have the lowest costs and least amount of hassle because the infrastructure, upgrades and maintenance are all managed by the vendor.

 

 

If you would like to educate yourself in more detail about material presented in this blog post please visit:

http://hosteddocs.emediausa.com/duo-security-twofactor-evaluation-guide.pdf