Category Archives: Mobility

Quick look at Windows 8


The long anticipated release of Windows 8 happened, and the launch was done in true Microsoft style on 26th October in New York City, and is quoted by Mr. Ballmer as being “the best Windows release ever”.  It takes Windows to the next level in regards to user experiences as it is a brand new interface to the Windows platform.  For Windows Phone users, the ’tiles’ are now extended to the Windows OS, and have received a colour palette uplift – the earlier versions of the Windows Mobile OS was primarily blue.

Users who prefer to go back to the classic Windows OS mode can certainly chose to do so.  Not too sure what classic Windows means; for me classic means Windows 3.1 or Windows 95 look ‘n ‘feel, but that would likely be considered ancient by most.

One of the key questions repeatedly asked is, what will Windows 8 offer organisations and what is the upgrade path?

Continue reading

Leave a comment

Filed under Microsoft, Mobility, Portable Devices, Review

Protecting Your Digital Identity


Digital or Online Identity applies to everybody, once you navigate and use the Internet.  It’s basically data that uniquely describes an individual or entity (e.g. company) and this data holds information such as relationships, services, images, resumes, client details, etc.  All that information is very useful for the people who need to access this in order to conduct business or communicate with you, but once this gets into the wrong hands it can cause severe problems.  Whether you are reading this as a company or individual, navigating on the internet needs to done with caution and there are some basic guide lines that should be considered.   It might be common sense, but unfortunately not all Internet users consider this when surfing the cyber waves.

There are people who thrive on hacking into systems for various reasons, but many times they don’t consider the impact this might have on the individual or the business.  At the same time, these hackers often “break” into system because they can and because the systems that penetrate weaker security measures implemented.  Some hackers may even conducts these attacks simply because they like a username in Twitter, as Mat Honan found out the hard way.

Continue reading

Leave a comment

Filed under Mobility, Projects, Security, Zenprise

Safe browsing


Children are, because of easy access to the internet through home computers and smart phones, migrating to the internet much earlier.  It normally starts with innocent free online games, then they join some social networks, get their first internet iPod Touch with internet access and then they take possession of the family computer for homework and projects.  Before you know it, your kids have more social networks than us parents.  What’s even scarier is the fact that they probably know more about these social networks than us, but with less interest in preserving their privacy, which then opens serious security concerns for your kids and for the family.

It’s becoming more and more important that parents have the serious conversation with our kids about online security and best practices.  How many parents have even had this conversation with their kids and how many have helped their kids implementing safer policies on their Facebook account?

For some kids, taking a photo with their smart phone and posting on their Facebook page is fairly innocent.  But some of these photos should not be shared with the World and may actually cause harm to some individuals, especially if these images are circulated among groups making fun of people – hence the term cyber bullying.

Continue reading

Leave a comment

Filed under 2012, Microsoft, Mobility, Security, Social Media

The Zenprise MDM app


Zenprise has released an iOS application, that works both on iPhone and iPad devices.  This is a self-service app that allows the user to connect/add their iOS device to the Zenprise MDM solution.

Please note, depending on the security policies deployed within the MDM solution, these will be applied to the device.

Core features

  • Fast access to corporate Email, Calendar and Address Book
  • Always up-to-date with any IT changes
  • Find, locate and lock your lost Device
  • Access corporate intranet services via VPN

iTunes Link – http://itunes.apple.com/us/app/zp-mdm/id434682528?mt=8

Leave a comment

Filed under Mobility, Review, Services, Zenprise

Zenprise and BYOD


The basics of Zenprise

The Zenprise MDM solution is a device management platform that allows the administrator to manage the various devices deployed and that access corporate information.  The capabilities of the platform allows IT organisations to manage the devices; device provisioning, lock ‘n wipe, enforce security policies and application deployment.  Furthermore, the Zenprise solution supports all major platforms such as iOS, Android, BlackBerry, Symbian, and Windows Mobile.  It’s an enterprise end-to-end solution, assisting IT organisations to manage and safeguard access to corporate data.

Deploying the Zenprise solution within your organisation will assist your approach and strategy embracing the BYOD initiative, and allowing personal and corporate-owned mobile devices to access sensitive corporate data securely.  All this, while maintain compliance with your security policies, corporate directives, local legislation and data privacy.

Zenprise also includes an application management features that will aid you in securing what applications can be used on the managed devices, securely of course.  On top of that, you can push these applications out to “your” managed fleet of devices ensuring that these applications are fully up-to-date.  You can even blacklist and whitelist application, thereby enabling a corporate application store.

Core Zenprise MDM Features

  • Platform iOS, Android, Windows Mobile, BlackBerry, and Symbian
  • Architecture the entire device can be managed
  • Security device-levels, secure “tunnels” for apps to communicate
  • App sources enterprise deploys from packages or users can download from public stores – if allowed
  • App stores apps can be pushed according to role
  • Provisioning invite users by sending them a link
  • MDM capabilities password policy, two factor authentication, auto wipe, block jailbroken devices, remote wipe, set network access profiles

Zenprise can support your BYOD strategy

Zenprise enables and enhances the BYOD initiative, by supporting multiple platforms, thereby allowing more devices (and employees) to add their device and get access to corporate data.  Despite this openness, it is still important that devices are secured consistently across all devices, and organisations need to tweak the implementation to meet their requirements.

Employees, who sign up to and have their devices added to the Zenprise MDM solution, must surrender some control of their device.  This has to be clearly documented and communicated with the employee, and the reason for this control is to secure the environment.  The level of control is to be agreed within the organisation, and employees signs up.  If employees are happy with this trade-off, they can always opt out, but they will not be able to get e.g. corporate  mail delivered to their device.  This element is more relevant to the BYOD approach.  If it’s a pure corporate solution, where all devices are owned and managed by the organisation, then this becomes much easier.

Contact us to talk directly to talk to one of our specialists.  Alternatively, we can set-up a presentation of the Zenprise products.

Dublin 01439 6803 salesdub@hetg.ie
Waterford 051 339900 saleswat@hetg.ie
Cork 021 4520044 salescork@hetg.ie
Kildare 045 531262 saleskil@hetg.ie

2 Comments

Filed under Mobility, Review, Services, Zenprise

What is BYOD


For some years now, organisations have been looking at ways to reduce the overall IT budget and spend.  Sometimes, such initiatives are pushed from the employees, onto the organisations, as new technologies are released to the markets.

Given the large amount of smartphone offerings in the market, and people’s desire to own these devices, smartphones started to become a gadget that everybody could own.  As a result of employees started bringing in their own devices, they placed requests with the local IT teams to provide access to corporate emails and other data on these smartphones.  This poses a challenge for the IT departments as they now have to develop systems and process for securing these unsupported devices.  Organisations quickly realised that this could be done by enabling certain solutions within the infrastructure.  However, the challenge of managing these devices was still a challenge.

Bring Your Own Device or ‘BYOD’, and was “born” as a direct outcome of staff bringing in their own devices.  Organisations have to embrace this new movement and work on catching up with their systems and processes.

One of the benefits of allowing the BYOD initiative was that staff would be more productive, also when away from the office, as they have access to e.g. email all the time.  However, there are obviously certain risks associated with this and not all staff could get access to their email for a number of reasons – I’m not going into too much detail on these reasons in this post.

What is BYOD?

The best way of describing BYOD is that employees are allowed to bring in their personal smartphones, and connect these with corporate services – currently primarily email.  Some organisations will allow more access and others will restrict access, but both models will allow these devices to access corporate data.

Another term that some users might be familiar with is BYOT, which broadens the scope slightly, and allows employees to Bring Your Own Technology.   This would cover the likes of computers, iPads and other systems.

One of the appealing factors for implementing either BYOD or BYOT is that the responsibility and maintenance of the device falls with the employee, and no longer becomes a device that the local IT team has to support.  Maintenance, support and warranty is managed by the person, and their relationship with the e.g. smartphone provider.

What organisations need to manage and support is the integration points with email.  Some stats suggests that 90% of employees are already using their own technology at work, for e.g. LinkedIn activities, Twitter, internet browsing, etc.  These services are using 3rd party networks, such as Vodafone, BT or O2 data networks.  Again, these are links that the organisation doesn’t (need to) support.

However, to safeguard corporate and client data, organisations can’t just allow devices access their data without some level of security.  Data could potentially be stored on these devices and if stolen or lost, confidential data could be accessed and used by external parties – parties that should not have access to this data and that might use it for malicious. purposes.

Because of the importance of these issues, HiberniaEvros has decided to enter this market, not with our own device, but with a MDM (mobile device management) solution from Zenprise – a world leader in addressing the challenges brought about by the BYOD / BYOT concept.

The above just scratches the surface and complexity of BYOD, we’re happy to discuss this technology in more detail and work on a solution that meets your requirements and supports your business strategy.

Contact us to talk directly to one of our specialists.

Dublin 01 439 6803 salesdub@hetg.ie
Waterford 051 339900 saleswat@hetg.ie
Cork 021 4520044 salescork@hetg.ie
Kildare 045 531262 saleskil@hetg.ie

Leave a comment

Filed under 2012, Meet Us, Mobility, Portable Devices, Services