Tag Archives: Documentation

The Zenprise MDM app

Zenprise has released an iOS application, that works both on iPhone and iPad devices.  This is a self-service app that allows the user to connect/add their iOS device to the Zenprise MDM solution.

Please note, depending on the security policies deployed within the MDM solution, these will be applied to the device.

Core features

  • Fast access to corporate Email, Calendar and Address Book
  • Always up-to-date with any IT changes
  • Find, locate and lock your lost Device
  • Access corporate intranet services via VPN

iTunes Link – http://itunes.apple.com/us/app/zp-mdm/id434682528?mt=8


Leave a comment

Filed under Mobility, Review, Services, Zenprise

Mobile Device Management

In short, Mobile Device Management (MDM) is a software solutions that allows for the management of mobile devices, primarily aimed at mobile phones and iPad/tablets – irrespectively of mobile operator/carrier.  It’s an ideal tool to be deployed within organisations that supports either BYOD or company owned device management.

MDM solutions attempts to secure, monitor, manage and support mobile devices deployed, and that have been granted access to the corporate infrastructure such as mail.  Devices can be added manually, user initiated requests and/or using over the air technology – where the MDM solution sends an invitation to a known device to join the MDM infrastructure.

Once an MDM solution is deployed within an organisation, it can assist reduce support costs and also manage business risks by enabling security features, and enables corporate IT departments to manage the many mobile devices used across the enterprise.  The core objective of any MDM solution is the central remote management, where devices can be secured over the air and wiped if lost/stolen.

With the increase of BYOD and company owned initiatives. it’s important that our clients have access to the best products and solutions to assist with.  As a result, HiberniaEvros has decided to enter this market, not with our own device, but with a MDM (mobile device management) solution from Zenprise – a world leader in addressing the challenges brought about by the BYOD and company owned concepts.

The above just scratches the surface and complexity of MDM, we’re happy to discuss this technology in more detail and work on a solution that meets your requirements and supports your business strategy.

Contact us to talk directly to one of our specialists.

Dublin 01 439 6803 salesdub@hetg.ie
Waterford 051 339900 saleswat@hetg.ie
Cork 021 4520044 salescork@hetg.ie
Kildare 045 531262 saleskil@hetg.ie

1 Comment

Filed under 2012, Review, Services, Zenprise

Zenprise and BYOD

The basics of Zenprise

The Zenprise MDM solution is a device management platform that allows the administrator to manage the various devices deployed and that access corporate information.  The capabilities of the platform allows IT organisations to manage the devices; device provisioning, lock ‘n wipe, enforce security policies and application deployment.  Furthermore, the Zenprise solution supports all major platforms such as iOS, Android, BlackBerry, Symbian, and Windows Mobile.  It’s an enterprise end-to-end solution, assisting IT organisations to manage and safeguard access to corporate data.

Deploying the Zenprise solution within your organisation will assist your approach and strategy embracing the BYOD initiative, and allowing personal and corporate-owned mobile devices to access sensitive corporate data securely.  All this, while maintain compliance with your security policies, corporate directives, local legislation and data privacy.

Zenprise also includes an application management features that will aid you in securing what applications can be used on the managed devices, securely of course.  On top of that, you can push these applications out to “your” managed fleet of devices ensuring that these applications are fully up-to-date.  You can even blacklist and whitelist application, thereby enabling a corporate application store.

Core Zenprise MDM Features

  • Platform iOS, Android, Windows Mobile, BlackBerry, and Symbian
  • Architecture the entire device can be managed
  • Security device-levels, secure “tunnels” for apps to communicate
  • App sources enterprise deploys from packages or users can download from public stores – if allowed
  • App stores apps can be pushed according to role
  • Provisioning invite users by sending them a link
  • MDM capabilities password policy, two factor authentication, auto wipe, block jailbroken devices, remote wipe, set network access profiles

Zenprise can support your BYOD strategy

Zenprise enables and enhances the BYOD initiative, by supporting multiple platforms, thereby allowing more devices (and employees) to add their device and get access to corporate data.  Despite this openness, it is still important that devices are secured consistently across all devices, and organisations need to tweak the implementation to meet their requirements.

Employees, who sign up to and have their devices added to the Zenprise MDM solution, must surrender some control of their device.  This has to be clearly documented and communicated with the employee, and the reason for this control is to secure the environment.  The level of control is to be agreed within the organisation, and employees signs up.  If employees are happy with this trade-off, they can always opt out, but they will not be able to get e.g. corporate  mail delivered to their device.  This element is more relevant to the BYOD approach.  If it’s a pure corporate solution, where all devices are owned and managed by the organisation, then this becomes much easier.

Contact us to talk directly to talk to one of our specialists.  Alternatively, we can set-up a presentation of the Zenprise products.

Dublin 01439 6803 salesdub@hetg.ie
Waterford 051 339900 saleswat@hetg.ie
Cork 021 4520044 salescork@hetg.ie
Kildare 045 531262 saleskil@hetg.ie


Filed under Mobility, Review, Services, Zenprise

It all starts with a password

There have been many stories of major company sites, such as Playstation (Sony), being successfully targeted by hackers.  They managed to collect thousands of passwords, credit card information and other personal information.  This data is used to either sell to a criminal organisation or perhaps engage in criminal activities by the hackers themselves.  If these black hat hackers can steal this information relatively easy (if you know what you are doing), then how can we make sure our data is safe.

The same goes for companies, large and small.  They too have to protect their data and client information.  So, security of the data starts with the employees, right?

Well, that obviously assumes that organizations have enabled the necessary security settings on their infrastructure and also communicated these clearly to their staff.

Continue reading

Leave a comment

Filed under Review, Security

Security is Key – Staying Safe

Documenting safety and security procedures has always been one of the least attractive duties.  And, why do you need to document these policies anyway?  Does anybody actually bother to read them?

Personally, security policies are a bit like insurances.  You only really need them when something happens – which you obviously are not planning to happen.  To help you get started with some of your documentation or perhaps re-visit your existing documentation, I’ll be sharing some of our experiences from working with clients and from seeing what could happen if these things are not in place.

The key to security documentation is make sure staff are aware of what to do and how to behave, and at the same time make sure that the company is safe from various events.  The last thing you want to do is having to have serious personal chats if some person has sent out an offensive email.  You should rather write and communicate the policy to all staff, so they know how to use the corporate email system – and what’s acceptable or not.

Today’s procedure is covering emergency procedures.  Remember, this is just our interpretation of what should be communicated to staff.  The method of communication could be anything from an email, to printed documents, intranet portal and awareness campaign.  Keep it simple and within your budget.

Please note, below procedure could be copied and pasted free by you, but you still need to update it to reflect your company’s information.

If you need any assistance in regards to creating or updating your security documentation, please contact us.

Emergency Procedure

It is your responsibility to familiarize yourself with the documented emergency procedure, participating in the various drills and accustom yourself with the emergency exists.  You should also know where to find the first-aid kit, in case required, and know how to contact the emergency services; Gardai, Medical and Fire departments.

Severe Weather Procedure (normally heavy snow or rain storms)

During severe weather conditions, it might be impossible for the company to conduct business, due to events outside the control of the company; power outages, traffic disruption due to sudden and heavy snowfall (which has happened a few times in the past 18 months).  When there has been severe weather occurrences, you need to take following actions

  1. Check your voicemail
  2. Check your email
  3. Contact your manager or colleagues

If you check your email and/or voicemail, and there’s no message indicating that the office is closed, then you should make your way to the office, as it’s business as usual.  However, because some staff travel on different routes, some of these might be affected by e.g. severe snow and therefore make it impossible for them to travel securely to the office.  If that’s the case, you should contact the company or your manage.

Storm / Hurricane Procedure

The same actions as outlined above applies to this scenario too.  In addition to those steps, and whether you are in the office or at home, you should take some measures to ensure your safety.  These might seem logical and perhaps even common sense, nevertheless, you should attempt to follow these simple steps.  Obviosuly, these steps are only relevant if the building is being damaged and may cause flying debris.

  1. Place light and moveable items inside cabinets and drawer units
  2. Back up your computer to either the network or external USB storage device
  3. Move your desktop computer, laptop and/or monitor to safety
  4. Remove paper files from surfaces and store these securely in the cabinets
  5. Close doors in the build to avoid strong winds tearing through the building
  6. Turn off lights and electrical devices
  7. Leave the building and move to a secure location in the house or building

It’s important to note, unless the company management communicates that the office is closed, then you should assume it’s business as usual.

1 Comment

Filed under Security, Services