Wavelink Blog

Category: Mobile Device Management

New Wavelink Video

We uploaded a new video to our “under construction” YouTube page and we wanted to get your feedback. In the coming months, we’ll be releasing several new product and company videos to get the word out about Wavelink. Why? Well, we have reason to believe that’s what the world wants, of course.

Check it out and tell us what you think. If you have a video demonstrating Wavelink products, send it along and we’ll make sure to post it!

Happy Tuesday everyone!

Avalanche 5

As many of you know, we announced the release of Avalanche 5 today. Just wanted to post an entry linking everyone to the various pieces of information that are available.

We’ll soon be releasing some short feature videos of the product and we just announced the dates for the next installments of the Wavelink Webinar Series, which are Avalanche 5 based.

The product page has a ton of information and some snazzy screen shots of the product, and in case you missed it, here is a link to the Network Products Guide award announcement. For Partners with Partner Portal Access, a download and data sheet are also available.

Enjoy!

Is Data More Expensive in the US?

According to the Ponemon Institute, data breaches cost US companies much more than their European counterparts. This brief highlights much of the findings and also raises some interesting questions about the effect federal regulations have on that cost.

Check it out and tell us how you feel about federal regulations and their potential effects on the total cost of a data breach.

Interesting Commentary from Gartner Wireless Summit

After reading this article, I wish I had a chance to attend the Gartner Wireless Summit in San Diego. The article highlights the closing keynote address and the way Gartner sees the Wireless ecosystem evolving over the next few years. Of particular interest is the “three generations of wireless context” and how we are full swing into the second generation. It really highlights what we are also seeing throughout our space, and is further evidence of the importance on maintaining a keen eye to the evolution of the industry.

Take a look for yourself and tell us what strikes you about the article.

Five Trends Driving Networking Growth

Annnnnnnnd, we’re back. Those of you who follow us on Facebook and Twitter knew that we were away last week attending our International Sales Conference, so there wasn’t much blogging around these parts. If you don’t follow us, we’ll give you a couple minutes to do so now.

Ok, great. Now that we have that out of the way, I came across this article out of South Africa while waiting in the airport for my home-bound flight. It discusses five trends that are driving networking growth. The trends are based on research by IDC, and I think most of you will find the trends interesting. One item of interest is that you can see how these industry themes are not just limited to the US, but instead are global themes that companies are facing across the world. Finally, the article also hits on virtualization, a topic which we’ve discussed here and here.

Enjoy!

The Sopranos and Wireless Security?

I came across this little tidbit from Computerworld regarding the FBI’s Top 10 posts in cyber criminal operations. I have to admit, that while aware of the security risks presently facing companies, it seems that every other day more information is presented that makes me think “These people will stop at nothing.” But, that’s exactly the point.

It’s a completely accurate assessment and when you read reports like this, it becomes even more apparent. It’s probably safe to assume that when cyber criminal rings start delegating specific jobs/positions as most legit organizations do, they aren’t just going to back down when they see opportunities that might take a few more resources to compromise than usual.

My mind keeps racing to a smokey backroom, reminiscent of something out of the Sopranos, but instead of a pool table and stacks of stolen merchandise, we see a complex set-up of computers, servers and hackers searching for their next cyber targets. Now, to my best knowledge, I know of no HBO pilot in the works about a ring of cyber thugs who prey on poorly secured wireless networks and mobile devices, but it is nonetheless some scary stuff. Just another reminder that you can never be too tight with your security policies, I guess.

Datalogic/Avalanche Video via POS of America

Just came across this Datalogic/Avalanche video via POS of America. Thought everyone might like it… enjoy!

Some Information Nuggets From the Road

We are on the road much of this week attending some conferences, but I wanted to respond to a question that we routinely were asked during our Avalanche 5.0 Webinars last week. So, in between sips of coffee and this fine, fine hotel bagel, I’ll answer a question we had with regards to the mapping tool.

Mapping feature available in Avalanche 5.0

Enhanced WWAN capabilities via new Mapping Feature

Several people wanted to know if  customers or end-users have to purchase a license through a 3rd party mapping solution, or if the feature is hosted/built in to the Avalanche 5 cost. The answer is rather short, but there is no additional charge for the mapping functionality and there are no 3rd parties involved at all.

Anyway, you can preview Avalanche 5 and also learn more on the mapping feature if you missed the Webinars. We’ll be back later in the week with a new Tech Tip, since you all seemed to like the last one so much (highest views for a post yet). If you have any questions that you’d like asked, let us know!

Good Webcast From VDC Research

We sat in on a webcast from VDC research the other day, and I think you’ll find it very informative and interesting. The webcast, titled “Will Market Interest in Mobile Managed Services Convert to Customer Contracts for Mobile Managed Services in 2010?”, explores the topic of mobile managed services and you can download the slides, or view the recorded webcast here. Check it out and tell us what you think.

Wavelink Tech Tip: Localizing CESecure with a Universal yet Local Server Test.

We ran into an interesting challenge recently, trying to configure Wavelink Avalanche’s CESecure, for a large national retailer. Just to review, CESecure provides device side security to Mobile Devices by requiring user authentication to gain access to the Mobile Device, as well as providing the ability to lock a device that is lost or stolen, and even encrypting or deleting sensitive data after the device has been locked.

The retailer wanted the CESecure client to use a local “Server test” to determine whether or not to lock the device, but they didn’t want to have to maintain a different configuration for every one of their stores, which number in the hundreds. We came up with a pretty ingenious solution using a wildcard in the configuration of the server address and it turned out that this wildcard syntax was already supported in the product… click here to continue reading the entry.