Tag : tools

Mobile Management Policy – The Essentials

Mobile-Device-Management-43-0

May it be mobile device management (MDM) software or the integration of MDM as a part of enterprise mobility management (EMM) two goals remain : protecting company data and optimizing technology for your company’s needs. Here are 7 Essentials to you mobile device management deployment.

  1. Square One – When it comes to technology it is nearly impossible to create a 5 year plan that even stands a chance. Technology just moves too quickly. Rather you need to constantly evaluate your information technology strategy for the needs and goals of your business. Instead of pinpointing one item in particular and getting bogged down by the details, such as mobile integration, think about how mobile integration can help aid your business goals. And if you can’t get the answer to that question on your own, enlist the help of a trusted Information technology company to help you see the light at the end of your businesses tunnel.
  2. All Aboard – All relevant departments should be represented in strategy sessions, so that all departments can be supported with a unified strategy whether that be for mobile, desktop, applications, web interfaces. Each department will have their own specific concerns and needs which can be better mitigated with a unified discussion and plan. This does not mean you have to enforce a plan that fits all, but rather a plan that brings all together on a similar page, the plan itself can be tailored to fit the needs of each employee or department, depending on user roles and requirements. For example, accounting and sales. Each will deal with different daily tasks, but can share the need of a digital interface to make such daily tasks easier and more efficient. Each department will most certainly use different applications and software, but the mitigation and support for each should be a unified plan.
  3. Put it in Writing – A compliance policy document is the easiest was to eliminate uncertainty and educate the members of your organization. Make sure to spell out eligibility, supported devices, as well as user rules and responsibilities. These can include but as not limited to, reporting a broken, lost, or stolen device, performing regular system and application upgrades. It is extremely important to relay to employees that information technology responsibility is shared between the organization and the members of that organization. This is also a great place to educate your staff on secure practices to keep company data secure.
  4. Teach Your Team – This may seem obvious, but do not roll out a bunch of brand new software without teaching your people how to navigate responsibly. This means taking the time to establish security compliance in combination with procedures and training. Stress the importance of separating personal and company data as well as regular back ups. If a configured network-attached storage (NAS)  is in your company plan for cloud storage, teach your members how to use the cloud rather than Dropbox. If employees are working around secure procedures, it is important to find out why, what interface is causing trouble so much so that employees are avoiding company policy. Then proceed to fix this problem.
  5. Be Well Supported – Trying to support every users on every device brings chaos. Roll out with a limited program with a subset of employees and devices and if you do it right, you should be able to scale to a larger population. Another smart idea is to limit the applications on your mobiles, you can set up you own in house app store for your company’s mobile devices that allows you to pick and choose which third-party applications are available. This should help manage security on all devices, as malware is increasingly present in applications.
  6. Find the Right User Experience – The size of your business is a large factor in how much you will be able to provide and control. Perhaps your small business does not have the resources to set up an in house app store. this should not stop you from find security means to protect your company. You can create your own website with a responsively designed user experience for assorted small screens. You can also convert browser-based apps to native ones.
  7. Who, What, Where are still Important – Mobile device management platforms offer geofencing capability that adds a new dimension to mobile security, by automatically taking action or requiring a different level of sign-on security if a device is taken further than a set distance form the company headquarters. You can even restrict operations this way.

 

The key to viable mobile device management is to develop a unified plan that can be presented to members  in a way that explains their responsibility to the protection of company data. As always, a good IT company is your best friend for safe and secure management of multiple devices.

 

 

 

 

 


 

 

If you would like to educate yourself in more detail about the information presented in this blog post please visit : www.pcmag.com

5 New Tech Tested Products for Your Business

Ever wondered what the best in tech products are at this very moment? The experts at Network World weigh in and give us a little glimpse of the newest innovations on the market.

Vidder PrecisionAccess – By rendering applications invisible to unauthorized users PrecisionAccess does a fantastic job at preventing application hacking. Even with stolen credentials hackers can’t access protected applications with unauthorized devices.precision-vpn_clip_image002

VeloCloud SD-WAN – VeloCloud provides a hybrid WAN solution that works with MPLS private links as well as ATT-U-Verse with cable or any broadband DSL links. One tech pro reported an increase from almost zero network visibility to nearly 100% network visibility. A great tool for IT management across multiple locations without staff needing to be onsite at all times. Facilitates communication and network visibility.  velocloudlogo

Cisco Identity Services Engine (ISE) – With so many features that help with managing user-facing ports and devices, whats not to love about Cisco ISE. One huge factor reported by tech pros is the integration of TACACS within Cisco ISE, making it easy to run Cisco ISE as a Radius server or TACACS server for network devices. In addition to this, Cisco ISE significantly improves management of devices especially restricting machines from devices and sites they are not permitted to visit.Cisco_ISE

 

 

 

 

 

 

 

 

Intermedia SecuriSync – For backup and file sharing SecuriSync is the way to go. As a two-in-one tool for consolidated file backup and management of continuous file backups, Intermedia SecuriSync makes relevant files easier to access as they are all stored in a secured shared folder. If you have team members spread across different locations, this tool is very helpful in making sure the data is always backed up and kept secure. One platform with a master source keeps project collaboration as safe as it can be.securisync-logo-247x300

OpenSpan Transformation Platform – OpenSpan collects all employee desktop activities both productive and nonproductive, including time away from the computer. This platform allows businesses to evaluate from employee activities how employees work best and what can be improved upon in order to drive down operational costs and maximize revenue. Providing data about employee activities takes away the need for manual employee logs. Lack of employee logs that need to be analyzed by supervisors for key performance indicators (KPIs), such as call volumes, proves to be a huge time saver. OpenSpan Transformation Platform takes working smarter to a higher level.

yKVWo9CQ_400x400


If you would like to educate yourself in more detail about the information presented in this blog post please visit: Fave Raves: 29 tech pros share their favorite IT products 

Toolbox for Windows 8 App

Toolbox for Windows 8
Toolbox is a productivity app found in the Microsoft Store that helps users customize their workspace with essential tools to help work and play better.

Toolbox allows you to view and play with up to 6 different tools at once, giving you the power and flexibility to customize your workspace for maximum productivity.

There are currently 11 included tools, with many more on the way!

Included Tools:
Web Browser
Calculator
Unit Converter
Facebook
Voice Notes
Notifier
World Clock
Weather
Doodle
Stopwatch
Notes

Windows Intune – Optimistic View

BVA has been in the cloud for sometime.  Obviously being in the cloud means alot of different things to alot of different people.  Everyone seems to have their own spin on the term.  For some time now we have wondered if Microsoft would come out with System Center for the cloud (BPOS). The overall BPOS solution has been fairly stable and successful yet there have been a few pitfalls but have worked through them with support.

As its core, Windows Intune is a cloud-based version of the desktop management capabilities customers could previously get by deploying Microsoft System Center technologies. For those that do not know that Microsoft System Center, it’s basically a bunch of older product put together via a large suite of applications.  That being said the applications contributed are valid and great products.  It’s basically the old SMS desktop management system and basically MOM.  These are tried and tested application that BVA has deployed for several years, yet all required their own on-premise servers.  Therefore, Window Intune, rather than hosting a System Center server on-premises and managing desktops from the server, administrators using Windows Intune load a client onto the desktops.  Administrators can access, via a browser, the management software and tools in the cloud and manage and secure those desktops through the cloud. In addition to the product features, the monthly subscription will include upgrade rights to Windows 7 Enterprise for every covered desktop and an option to buy the otherwise hard-to-get Microsoft Desktop Optimization Pack (MDOP).

When the first limited beta of Windows Intune arrived in April, Microsoft described it almost exclusively as a midmarket IT-focused offering, with a slightly lower-end core audience than the System Center suite of products reaches. Core capabilities of Windows Intune include the ability to centrally manage the deployment of updates and service packs to PCs, to manage protection of PCs through the Microsoft Malware Protection Engine, to receive alerts that help administrators proactively monitor PCs, provide remote assistance, track hardware and software inventory, and set security policies.  For users familiar with Microsoft’s other product families, Windows Intune combines a Web-based management console with the desktop malware protection and reporting of the Microsoft Forefront Protection Suite and the update management, inventory and software deployment of Microsoft System Center Configuration manager 2007 or Microsoft System Center Essentials. Windows Intune also has the operating system distribution capabilities of Configuration Manager.

After reviewing all the facts it seems that this will be a great offering for our client base.  We are going to try this out at a client next month and we are looking forward to really seeing the real-world applications and cost savings.  I think it is fair to say that I am a little apprehensive about the security associated in imaging desktops through the cloud, but time will tell.  As a collective unit, BVA is staying positive with the security and ease of use.