Category: Wireless Infrastructure Management
Posted by Brandon Hill
The supply chain of most companies is long and complex. It’s often difficult to get a complete picture of your company’s supply chain, which involves not only direct suppliers, but also the suppliers that supply your suppliers. And so on down the chain.
But even though this lack of knowledge is common and, in many cases, unavoidable, it’s still cause for concern. Many companies share sensitive corporate data with those in the supply chain, such as intellectual property information, customer data or employee info. This information, some of it crucial for business to move forward, some of it not, is often shared without any regard for the information security practices of the company receiving the info.
It’s a risky move. On the one hand, the vendor you’re sharing info with and everyone they’re sharing info with might have great security in place. Their systems might be as tight as a drum. On the other hand, just because your systems are secure doesn’t mean those of the companies you work with are equally secure, and data might be leaking from your organization like a sieve. (more…)
Posted by Brandon Hill
The following comes from Jason Mitchell, Director of Engineering at LANDesk.
This blog has an ambitious title, but I think it is accurate. Let me explain why. The recent definition of Mobile Application Management (MAM) focuses on delivering and securing native apps on mobile devices. These features typically include app wrapping and app distribution. While that’s as extensive as many smart device operation systems allow, Wavelink has a far more comprehensive and compelling feature set.
For more than 20 years, Wavelink has developed products and technologies that have enabled companies to deliver their operational applications to the ever-evolving set of mobile devices that are optimally designed for the task at hand. Let me give an example.
For high transaction processes like picking or sorting in a supply chain logistics operations, companies have host-based applications that need to be displayed on a variety of mobile devices. They do not want to have to add custom logic to the application to handle the different form factors or device drivers needed to access peripherals such as bar code scanners, radios, or printers. This is the market where Wavelink application management solutions exist. The solutions are built for telnet based applications, web applications, and native console applications executing on the server. They take these applications and expose them on any mobile device taking into account form factors, driver integration, security, session persistence, latency, unstable wireless networks, and a variety of others issues the application developer doesn’t want to know about and certainty doesn’t want to handle differently for each device. Wavelink solutions are designed to handle these problems without modifying the original application. This enabling of applications across the mobile devices is unique to the MAM solution Wavelink provides.
In summary, a comprehensive Mobile Application Management solution needs to deliver, secure, and enable applications across any mobile device platform or form factor without modifying the original application. This is why Wavelink is the world’s foremost Mobile Application Management Company.
Posted by Brandon Hill
When LANDesk and Wavelink came together in 2012, Steve Daly, the CEO of LANDesk Software, talked about the goals on the horizon for the newly unified team. In the announcement he established the groundwork for the new endeavor. “Together, we will redefine mobility management and provide the market with unrivaled end-to-end mobile management solutions. From the boardroom to the back office, we will enable mobility for people with a job to do.” This has been our directive since the day of the acquisition and we have been working together to provide our customers with MDM solutions that encompass both use cases. As one can imagine, there are a few differences between the boardroom and the back office but when it comes to mobility there are not as many as you may think. Let’s examine MDM from both perspectives.
Unique and Common Mobility Needs
- Mobility Growth: Both the boardroom set and the line of business team are experiencing an explosion of mobile device demands. On the boardroom side theses devices fall into both the BYOD device realm as well as assigned devices. They both share a need to keep up with the expanding wireless ecosystem with effective and powerful mobile device and wireless infrastructure management. As the expectations of users begin to mirror their experiences as consumers, the pressure will be on IT to deliver a seamless user experience for both groups of users.
- Remote Service: “Allow me to take over your computer please.” This is something users are hearing more and more from the IT team on both sides of the enterprise. While this used to be an in network exercise, it has expanded to include mobile devices wherever they may be. How do you compare the mobile service demands of an executive on a business trip to Germany with a delivery driver that needs service on a line of business device? In the end, you would not want either one to be without remote service. On the line of business side, Avalanche Remote Control, a mobile help desk solution, provides administrators with an exact replica of what end-users are experiencing. Remote Control allows administrators to support device users in the field remotely, without actually having to be in the field with the physical device. (more…)
Posted by Brandon Hill
The following comes from Robert DeStefano, Product Marketing Manager for Wavelink/LANDesk:
In-house estimates suggest that roughly 140 companies claim to offer Mobile Device Management (MDM). Most of them lead their messaging by waving the iOS flag and images of Andy the Android to highlight their ability to support consumer operating systems in the face of BYOD initiatives. What’s interesting is that when it comes to mobile device management, drawing attention to the iOS and Android platforms makes most MDM solutions indistinguishable from one another. Apple, for example, doesn’t allow MDM clients to take control over the device remotely. Therefore, all these MDM solutions have the same limitation. Give or take a few specification bullet points, 140 solutions provide about the same capabilities when it comes to managing a smartphone.
According to Gartner, 65% of enterprises will adopt an MDM solution for corporate-liable users over the next four years, and 90% of enterprises will be supporting two or more mobile operating systems in their environment. With so much attention drawn to the BYOD-specific needs (not to suggest these aren’t important) of a Mobile Device Management solution, there is something even larger that enterprises should be taking into consideration: Managing productivity throughout the enterprise.
Posted by Brandon Hill
The following comes from Mike Temple, Product Manager for Wavelink.
We recently introduced our latest mobile device and wireless infrastructure management solution, designed to solve the challenges associated with managing today’s wireless ecosystem. While this newest solution, Avalanche 5.4, performs the vital functions that we’ll mention later in this blog post, we believe it’s important to call out some trends and industry movement we’ve noticed and our customers have reiterated in discussions with them about their current needs and pain points. In fact, these customer discussions and industry movements were inspiration behind the new features available with Avalanche 5.4.
- Integration of iPads and other consumer devices on factory or retail floors: You might have noticed while you were doing your holiday shopping a couple months back that there was a noticeably greater amount of iPads ringing you up, in place of the traditional POS systems or cash registers. Organizations are looking to reap the productivity and employee satisfaction benefits associated with mobility. While many field tasks still require special ruggedized devices, some companies are choosing tablets that their employees might be more familiar with. For this reason and because of the conversations we’ve had with customers beginning iPad or Android-based device deployments in 2013, we knew it was important to optimize the support for iOS6 and Android platforms for the new version of Avalanche. (more…)
Securing the First Responders: With today’s critical infrastructure threats, how can you ensure your city’s response team’s rugged devices are secure?
Posted by Gemma Randazzo
In an emergency first responders need to be focused on their number one priority – be it saving lives, protecting citizens and preventing crimes. Worrying about the security of the technology they have with them shouldn’t be of concern. In fact keeping onboard laptops and smartdevices that are the make-up of numerous fleet vehicles, such as police and fire vehicles secure shouldn’t even be a secondary thought. It should be simple and should just run in the background. With technology changing rapidly it is vital to ensure information that is sent to public servants, law enforcement officials and military personnel is secure. But while technology is changing rapidly it doesn’t mean that budgets are increasing to account for all these new devices or the changing climate of new threats.
Simple to use, simple to manage device management that protects the infrastructure of every city’s government is possible and in most cases requires very little in way of investment.
What should a city or government entity look for in a mobile device solution?
- 802.11 provisioning with industry standard encryption and authentication protocols
- Access Point (AP) detection and reporting with various IDS-oriented enhancements to assist with identification, alerting, monitoring and reporting of potential threats and a holistic view into the state of the agency’s security
- Ability to remotely manage configurations and updates of all Access Points across a city from one location
- Encryption of all communication channels and database encryption
- Device location mapping; enabling the lock down and wiping of devices when needed
- Push down all device software updates over the air without the need to physically bring in critical devices that are needed 24/7. Industrial laptops are powerful tools but they can be rendered virtually useless in an emergency if they are not kept up-to-date. Push down a security patch from a central location and save critical time and money
- Device management that doesn’t take up valuable bandwidth. Send out a software package in seconds without it hindering GPRS that is being used not only to update software applications but basic data communications with officers and firefighters out in the field
- Security for all wireless data transmissions that includes a seamless handoff between the various wireless network infrastructures in operation
Remember you don’t need to buy the latest and greatest device with the pretense that because it’s newer it’s going to be more secure. By making simple IT infrastructure changes using existing devices it is more than possible to stick to the budget without sacrificing security. A simple to use centralized mobile device management solution that plans, deploys, secures, monitors and maintains enhances the reliability and security of the tools first responders need to use.
Posted by Gemma Randazzo
I recently read that logistics are as essential to the “holiday season as the Christmas tree and the Menorah.” I don’t think I need to do too much convincing at this time of the year for you to appreciate just how true that is. Just open your inbox and you are immediately reminded that if you want your holiday packages delivered before the festivities you better get a move on. As I write this an array of “final hours” emails bombard my inbox.
According to eMarketer “online shoppers in the United States will spend $54.47 billion this holiday season, up 16.8% from $46.63 billion last year.” That is a staggering number and only accounts for one country. It is easy to see why companies like Amazon are expanding fulfillment centers and opening a new 1-million square foot facility (yes, 1 million square feet) in Washington State. With the trend of online shopping only growing, fulfillment centers around the globe will continue to see their business models change to reflect that of the online consumer. Today’s online consumer appreciates the diverse number of stores they can purchase from without leaving home and driving several miles, but it also means that the instant in-store gratification is no longer there. Just because it isn’t there doesn’t mean consumers don’t still want it and for instant gratification you need logistics.
Transportation and logistics companies get items where they need to be as quickly as possible. To minimize hiccups a vital part of this process is managing the hand-held devices that get the packages to your doorstep. From the warehouse where the items are picked, packaged and shipping labels are then printed, to the logistics company picking up the package, scanning the label and then flying and/or driving it to where it needs to go. The whole time this package is tracked using a hand-held device so you can monitor its progress. If a device goes down or experiences a malfunction you aren’t going to care because you just want your package. But to businesses managing these devices is a critical component of their job after all customer satisfaction is number one. A total mobile device management effectively keeps these devices secure and up and running from anywhere in the world. In any given day there are many different “fires” for businesses to put out and with a reliable device management solution, managing and tracking all their hand-held devices is one less “fire” they need to worry about.
And with that I must go – someone changed their mind on which of the latest video games they wanted and to avoid rush-shipping charges I need to hit purchase.
Posted by Brandon Hill
I came across an interesting read from Forbes that was posted over the summer about the growing threat of mobile device security. It has some fascinating figures on mobile device usage and the inherent risks associated with our growing demand on mobile technologies. It’s becoming such an issue, that the White House and other leaders are entering the discussion.
Some of the more interesting (and/or frightening) highlights include that “six out of every 10 cyber-security breaches occur as a result of a mobile device.” Why is that an issue? Well, consider the following that the author, Kevin Johnson points out:
We’ve reached an inflection point where the lightning-fast adoption of powerful, smart devices is outpacing our ability to secure our mobile lives. In a world of 7 billion people, there are now 5.9 billion mobile-phone subscribers. Here in the U.S., we have more mobile-phone subscriptions than people. The mobile Internet that we’ve come to rely on ― for everything from financial transactions to business operations to emergency-response procedures ― is increasingly vulnerable.
Think about that. In the US, we have more mobile-phone subscriptions than people. Take into account that many, if not most, are accessing some combination of personal and corporately-liable informations, and you can see why the issue is being trust onto center stage. Take a look at the article and let us know what strikes you the most about it. It’s a good read.
Posted by Brandon Hill
Good afternoon! We’re excited to share our new Facebook App that helps customers and partners understand the mobile ecosystem, and how Wavelink solutions fit into each piece.
We invite you to check it out today!