Wavelink Blog

Tag: Wireless Infrastructure Management

Securing the First Responders: With today’s critical infrastructure threats, how can you ensure your city’s response team’s rugged devices are secure?

In an emergency first responders need to be focused on their number one priority – be it saving lives, protecting citizens and preventing crimes. Worrying about the security of the technology they have with them shouldn’t be of concern. In fact keeping onboardPolice Car laptops and smartdevices that are the make-up of numerous fleet vehicles, such as police and fire vehicles secure shouldn’t even be a secondary thought. It should be simple and should just run in the background. With technology changing rapidly it is vital to ensure information that is sent to public servants, law enforcement officials and military personnel is secure. But while technology is changing rapidly it doesn’t mean that budgets are increasing to account for all these new devices or the changing climate of new threats.

Simple to use, simple to manage device management that protects the infrastructure of every city’s government is possible and in most cases requires very little in way of investment.

What should a city or government entity look for in a mobile device solution?

  1. 802.11 provisioning with industry standard encryption and authentication protocols
  2. Access Point (AP) detection and reporting with various IDS-oriented enhancements to assist with identification, alerting, monitoring and reporting of potential threats and a holistic view into the state of the agency’s security
  3. Ability to remotely manage configurations and updates of all Access Points across a city from one location
  4. Encryption of all communication channels and database encryption
  5. Device location mapping; enabling the lock down and wiping of devices when needed
  6. Push down all device software updates over the air without the need to physically bring in critical devices that are needed 24/7. Industrial laptops are powerful tools but they can be rendered virtually useless in an emergency if they are not kept up-to-date. Push down a security patch from a central location and save critical time and money
  7. Device management that doesn’t take up valuable bandwidth. Send out a software package in seconds without it hindering GPRS that is being used not only to update software applications but basic data communications with officers and firefighters out in the field
  8. Security for all wireless data transmissions that includes a seamless handoff between the various wireless network infrastructures in operation

Remember you don’t need to buy the latest and greatest device with the pretense that because it’s newer it’s going to be more secure. By making simple IT infrastructure changes using existing devices it is more than possible to stick to the budget without sacrificing security. A simple to use centralized mobile device management solution that plans, deploys, secures, monitors and maintains enhances the reliability and security of the tools first responders need to use.

What Are the Costs of Unsecured Data?

I came across an interesting read from Forbes that was posted over the summer about the growing threat of mobile device security. It has some fascinating figures on mobile device usage and the inherent risks associated with our growing demand on mobile technologies. It’s becoming such an issue, that the White House and other leaders are entering the discussion. 

Some of the more interesting (and/or frightening) highlights include that “six out of every 10 cyber-security breaches occur as a result of a mobile device.” Why is that an issue? Well, consider the following that the author, Kevin Johnson points out:

We’ve reached an inflection point where the lightning-fast adoption of powerful, smart devices is outpacing our ability to secure our mobile lives. In a world of 7 billion people, there are now 5.9 billion mobile-phone subscribers. Here in the U.S., we have more mobile-phone subscriptions than people. The mobile Internet that we’ve come to rely on ― for everything from financial transactions to business operations to emergency-response procedures ― is increasingly vulnerable.

Think about that. In the US, we have more mobile-phone subscriptions than people. Take into account that many, if not most, are accessing some combination of personal and corporately-liable informations, and you can see why the issue is being trust onto center stage. Take a look at the article and let us know what strikes you the most about it. It’s a good read.

100th Post! WLAN Revenues Up Almost 30%

Welcome to our 100th post here on the Wavelink Blog. We’ve been increasing page views every week since we started this blog, almost two years ago. Thanks for your continued interest in our topics and news here!

Today’s post looks at the rise in revenue in the WLAN market during 2010. Companies like Cisco, Meru, Aruba, HP, etc. saw excellent growth in 2010, and as the article states, is largely due to the rise in smartphones and tablets. Here’s a look at some of the numbers;

IDC analysts [Sept. 1] said that in the second quarter, WLAN revenue grew 29.7 percent over the same period in 2010, jumping to $1.52 billion, with the enterprise WLAN segment growing 43.4 percent to almost $725 million in that interval.

That’s great news and highlights that while focus has shifted to wireless wide-area networks, wireless LAN infrastructure is still very much alive in the mobile enterprise. Coupled with the growth that’s expected to continue with smartphones and tablets in the wireless ecosystem, WLAN vendors seem prime for good revenue.

A Look at Managing Mobility and More…

We’re halfway through the week, and my goodness have the last few months been flying by! I was checking out some posts on Twitter and came across a good read from Network World about successful wireless initiatives. One of the aspects I found particularly interesting was the part about BlackBerries, and I’d be curious to hear if any of you have the same or different opinion.

One of the other items I was drawn to was the bit on security. It talks about security needs and what to do about lost and stolen devices. The reason I was so interested is because we recently joined in on a conversation on “Device Wiping” on the Enterprise Mobility Forum (which we’ve mention before), so I found the timing to be spot on. They also have a good discussion on why you need a mobile help desk.

Finally, in lieu of Veterans Day, Wavelink would like to extend a big thanks to all the Veterans out there!

New Avalanche Video & Announcing Remote Control 4.0

Good afternoon! As you may have seen, today we announced the release of Remote Control 4.0. Remote Control 4.0 for Avalanche features a new web-based interface with the ability to remotely connect to any device over the WLAN or WWAN from any standard web browser. This allows administrators to troubleshoot and remedy device and application problems and provide end-user support and training remotely. You can read more about the release here.

We’ve also released our newest Avalanche product video. The video covers the various benefits of Avalanche and has some great footage. I hope you take a few minutes and check it out and leave a comment! The video is available on our YouTube page, located here.

New Avalanche Video

Quick post to let you know that we’ve released the first, of what will be many, Avalanche “Features Spotlight” videos. The idea is that we take one feature of the product and highlight it in two minutes or so. Hopefully, this provides a quick way to learn more about the product for end-users and partners alike. Stay tuned for a look at scan-to-configure and Remote Control in the coming weeks.

Check it out and tell us what you think!

Industrial vs. Consumer Grade Access Points

Back in January, we had a brief discussion about ruggedized versus consumer grade Mobile Devices. Shortly after that, I was making customer calls with one of Wavelink’s Platinum Reseller Partners, and an IT manager at a large multi-national retailer told me he was considering purchasing Consumer Grade APs for several of his new store roll outs in the coming year. His motive was to save money by purchasing the lower cost access points and wanted to know if he could still manage the APs with Avalanche.

There is a fair amount of unbiased material available on the web that compares the various features and benefits of Industrial or Enterprise grade APs vs. Consumer grade APs, such as the Best Practices article from BizTech Magazine or this recent Wavelink Technology Tidbit. What I wanted to do here was share my answer to his question about AP management. (more…)

Avalanche 5.0 Wins Network Products Guide Award

As we’ve previously blogged about, we are coming closer and closer to the public release of Avalanche 5.0. It’s nice to see that all the hard work is already beginning to pay off with the announcement that Avalanche 5.0 won the Wireless Broadband Mobility Innovation Award from Network Products Guide. You can read our announcement here, and also read the full review here.

Thanks Network Products Guide!

Also, this is shaping up to be a busy week, so make sure you are subscribed to receive email alerts when we add new posts. You can sign-up to the right of this post. We’ll be back later and try to add some pictures from the Motorola Channel Partner Expo.