January 28th, 2015

Verteks Consulting is proud to sponsor Angelbeat.  Come join us at one of our events – Tampa on Feb 3rd, Orlando on Feb 4th, and Jacksonville on Feb 6th.

The Angelbeat seminar “experience” is unique because of its focus on meeting the educational needs of the attendee. CEO Ron Gerber, a widely respected analyst/blogger (see postings below, click here to watch his youtube video on the Angelbeat experience), selects expert speakers who deliver concise, technical and complementary talks on security/compliance, cloud/virtualization/sdn, storage/backup/infrastructure, network/mobility/voip and big data/hadoop. Sales/marketing “fluff” and redundant content are eliminated, enabling attendees to learn about multiple subjects in a short period of time. There are lengthy breaks and live product demonstrations. CPE/CISSP credits are provided. Click on a city/date listed to the right to see the agenda, get full event details and register to attend.

Here is feedback from a Fortune 100 IT Director: “Thanks for hosting a very informative meeting with vendors that tied in well… it was an integrated picture of technologies that work together to create a complete infrastructure solution for the workplace.”

Event Details and registration:

November 21st, 2014

After only seven months on the market, WatchGuard’s APT Blocker was voted Advanced Persistent Threat Solution of the Year, competing against products such as FireEye, Fortinet’s FortiSandbox, and Palo Alto’s WildFire.

WatchGuard Wins Award

APT Blocker takes over where AV protection leaves off. It delivers real-time threat visibility and protection in minutes, not hours, focusing on behavioral analysis to determine if a file is malicious.

New! APT Blocker Promotion –  Now our customers can trade in a competitor’s security product for a one-year or three-year UTM or Next Generation Firewall Bundle (Model 330 and higher) and receive one-year of APT Blocker for FREE. This is a terrific opportunity for our customers to have award-winning protection from advanced malware without spending a penny more.

Read more about the APT Solution of the Year award.

August 18th, 2014

ShoreTel Mobility 8 empowers everyone with simple, seamless mobile-enabled video conferencing to ensure employees can always stay connected with their colleagues wherever they may be working. ShoreTel Mobility 8 has integration with the ShoreTel Communicator desktop call-control suite, and the new software introduces a virtualized ShoreTel Mobility Router so IT departments can easily mobile-enable the company workforce to encourage collaboration and productivity.

ShoreTel Mobility 8 makes it easy to communicate via video between iOS and Android smartphones and tablets using the ShoreTel Mobility Client, with single touch video calling from the keypad. With ShoreTel Mobility 8, users can participate in multi-party video sessions from mobile devices to room-based video communication systems. ShoreTel Mobility 8 also supports video communication from the user’s Windows desktop using ShoreTel Communicator.

ShoreTel Mobility 8 has the ultimate deployment flexibility for on-premises customers with the virtualization of the ShoreTel Mobility Router. The Virtual ShoreTel Mobility Router (vSMR) deployment option lowers costs for hardware and IT staff and improves overall TCO for deployments. Customers can leverage existing ShoreTel appliances or deploy ShoreTel Mobility software on VMWare platforms.

See some screenshots from our live system below – me and Matt Nye on a recent video call from my Mobility on iPhone to Matt’s desktop computer.

ShoreTel Mobility 8 Video on iPhone

ShoreTel Mobility 8 with Call Controls




July 31st, 2014

Verteks Consulting is proud to be an AirWatch partner and we’re excited about AirWatch’s leading position in the Gartner Magic Quadrant for Enterprise Mobility Management.  Every year, Gartner evaluates enterprise mobility management providers based on their ability to execute and completeness of vision. Vendors are then placed on a quadrant to represent their position in the market. Of the more than 100 companies in the EMM space, only five vendors were recognized in the Leaders quadrant. This is the fourth consecutive year we are recognized as a LEADER, receiving the HIGHEST position for our ability to execute for the second consecutive year.

The Gartner Magic Quadrant for Enterprise Mobility Management was called the Gartner Magic Quadrant for Mobile Device Management Software from 2011-2013. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.


AirWatch Tops Gartner Magic Quadrant

July 30th, 2014

Please join me in congratulating our engineer, Chris Whitfield, on becoming a WatchGuard Certified System Professional.

The WatchGuard Certified System Professional-XTM (WCSP-XTM) exam certifies that individuals who pass the test are competent in the installation, configuration, management, and monitoring of a WatchGuard XTM device with Fireware XTM OS. The courseware and exam reference WatchGuard System Manager management software.

Individuals that take this test also confirm their knowledge of the fundamentals of network security, WatchGuard System Manager management software, and Fireware XTM configuration tools.

Congratulations to Chris for learning this material, taking the test and earning his certification!

Chris Whitfield WatchGuard Certified System Professional

July 23rd, 2014

ShoreTel has a great Microsoft Outlook integration capability that allows you to easily manage your voicemail inside your Outlook email interface – but many people have asked me about how to get the most out of ShoreTel Communicator for managing these messages, without using Outlook.  In this brief overview, I’m going to show you how to use the built-in capabilities inside ShoreTel Communicator to more easily manage and control your voicemail.

I’ve included some screenshots to illustrate how I use ShoreTel Communicator for this and I’ve made notes on each image so you can follow along on your own system.  I encourage you to experiment with these tools and find what works best for you – and share that knowledge with your teammates and coworkers as well.

As always, if you need some extra training, or want some live interaction with one of our experts on how to get the most out of ShoreTel Communicator, I encourage you to register for one of our bi-weekly live training sessions, or view our recorded sessions which we’ve posted on our site here – follow this link for training recordings.

ShoreTel Communicator Voicemail Management Images

February 20th, 2012

Thinking of adopting a "bring your own device", or BYOD, policy at work? Learn more about what it is, why it's becoming popular – and what you need to consider before rolling it out.

You may have noticed more and more of your employees or colleagues bringing their own computing devices to work—be it their mobile phone, tablet, or laptop. Or perhaps in your company or in other companies you may have seen, they have let people decide which device they prefer because they are used to it at home. You may not realize it, but this is all part of a large trend called the "consumerization" of IT, in which the influence of consumer technology is being increasingly felt in the workplace. With the wide availability of cheap but powerful mobile devices and online services, a growing number of people are being exposed to the latest technology at home first—adopting them at a rate faster than most businesses are able to manage. This flips on its head the old paradigm in which traditionally new technologies would be rolled out to businesses first, before they would find their way to consumers.

This trend, plus the increasing sophistication of young workers today and their frustration with the tools available to them at the office, is pushing some companies to adopt a "bring your own device" or BYOD policy at work. They are not alone. According to research by technology analyst group Gartner, end users, not the IT department, will soon be responsible for 50 percent of business IT procurement decisions—ultimately bringing and running their own systems on company networks. Meanwhile, according to management consultants Accenture, around one-third of today's younger generation of workers (a group called "millenials") not only wants to use the computer of their choice at work, but also wants control of the applications they use too.

The benefits companies cite to adopting a BYOD policy are many, among them:

  • Savings on capital expenses and training costs in using company equipment—compensating employees instead via other means such as flexible work hours, subsidized purchases, insurance, and other benefits.
  • Less management headache—effectively letting employees decide what to use releases the company from some overhead and management responsibilities.
  • Improved employee satisfaction—by giving employees the freedom to use devices and applications that they prefer.
However, before you consider letting employees bring their own personal technology to the work place, be aware that there are also disadvantages, and sometimes very real dangers in doing so. These include:
  • Non-standardization of hardware, operating systems, and applications. If your business operations require that some equipment is integrated with others, then BYOD can in the long run actually increase IT management costs and decrease efficiency.
  • Exposing your network to malware or security vulnerabilities and breaches. When your employees bring their own devices to work, you lose important control over their security. Consumer devices often don't employ comparable bullet-proof security technologies mandated by businesses.
  • Leakage of confidential or proprietary information. Employees will naturally do what they want with the data on their devices, even if it doesn't belong to them, or it's against company policies. Employees can also lose precious company data when they misplace or damage their personal devices.
  • Lower economies of scale in procurement. Essentially because everyone is buying devices on their own, you miss out on the chance to consolidate purchases and lower purchase costs for everybody.
Have you adopted a BYOD policy at work? Thinking about it? Worried about this trend? If you need to understand BYOD better so you can define a policy for your staff, contact us and see how we can help.
Published with permission from Source.

January 9th, 2012

A worldwide shortage of hard drives is expected in the near future as many of the Thai-based factories continue to struggle with flooding.

In the same way the massive earthquake and tsunami damaged Japan’s electronics industry, the flood crisis in Thailand is causing concern for companies that require hard drives for production.

The majority of the world's hard drives are produced in factories located in Thailand, where the flood crisis has put a damper on many industries, hard drive producers included.

According to reports, the shortage is already driving hard drive costs up and may just be the beginning of that trend. As companies like Hewlett Packard respond to the situation, the outlook remains unclear. PC sales could be affected well into 2012 and beyond. With flooding still an issue for some producers the shortage could expand.

As of now, there is still no concrete solution in sight for the problem with the supply of hard drives in the world, and while reconstruction efforts in Thailand are ongoing, getting the hard drive industry on its feet will take a while. As for the effects on the computing world as a whole, PC prices will likely rise as pre-flood inventories are sold out and replacement stock is delayed.

Published with permission from Source.

Topic General Tech
December 23rd, 2011

ShoreTel’s new Mobility solution is the holy grail of Unified Communication, allowing you to use your smartphone as the primary endpoint on your company’s pbx. That’s right – now you can use your iPhone, Blackberry or Droid cell phone as your primary extension on your company’s phone system, while retaining your own personal cell phone “identity” as well.

The solution is comprised of two parts: a hardware router that sits on the host side and a software application for the mobile device. Depending upon the manufacturer, ShoreTel either replaces or modifies the mobile device’s dialer to add pbx style functionality like a display of the user’s pbx extension and options for transfers and conferencing.

In areas where WiFi coverage is available, the ShoreTel Roam Anywhere Dialer (RAD) uses the WiFi connection to make a PBX call. The software is constantly monitoring for WiFi connections and automatially creates a VPN tunnel back to the Mobility Router – no user intervention is required.

This technology can result in massive cost savings in International roaming scenarios, because instead of connecting via the cellular network and incurring exorbitant international roaming charges, road warriors can connect via WiFi at a hotel or coffee shop and place and receive calls over a standard data connection. The technology also feature a virtually seamless handoff to 3G and 4G data networks; should the user move out of the WiFi coverage, the software automatically moves the call over to the cellular data network if there is sufficient coverage/bandwidth. After a delay of 4-5 seconds during the hand-off, the call continues uninterrupted.

In terms of useability, users can dial internal four digit extensions and the app is smart enought to know to place the call in pbx mode, which shows the user’s company caller ID. Likewise, users can flag certain contacts as personal so calls placed to those contacts go out via the regular cell phone, thus showing the caller’s cell phone caller ID.

The ShoreTel Mobility Solution doesn’t miss a beat when it comes to user presence; ShoreTel users on smart phones can display their presence just as they do on regular desktop handsets.

The best part about the ShoreTel Mobility Solution? You don’t have to have a ShoreTel system in place to take advantage of it – it works with all of the major PBX manufacturers!

December 19th, 2011

Employees using their own mobile devices for work may seem like a good idea at first it's less expense for you, the employer, and they can also make employees more productive. However, it also means that you are allowing potentially unsecure devices to access your company's data. The solution? An effective IT security policy that balances personal freedom to use these devices and your need to secure important business information.

As technology continues to become more affordable and accessible to consumers, it's an inevitable fact that employers will see more and more of their employees using their own personal devices such as laptops and mobile phones to access the company's IT system.

This can be a dangerous thing. Since these devices aren't company owned and regulated, you have limited access and control over how they are used. Employees could download all sorts of malware and viruses on their devices and pass the infection along to your IT system when they access it.

The solution: a comprehensive IT security policy. It's important that you find a compromise between the freedom of the employee to use the device as desired and your need to keep your IT system safe from viruses and other threats to your data's security. Steps such as having employees run mobile device management (MDM) software on their devices is one of many actions you can take to lessen the risk of security breaches. You may also want to implement applications and software that check and screen for malware, both for laptops and mobile devices. And don't forget that while Android seems to have a bigger problem with malicious software, Apple isn't exactly virus-free, either.

Employees have a right to use their personal devices as they see fit, but not at the expense of important company information stored in your IT system. Running a tight ship in terms of security is an effective way to protect your business interests and your sensitive company data. If you are interested in knowing more about developing a concrete and effective IT security policy for personal device use as well as general system access, please don't hesitate to give us a call so we can sit down with you and discuss a custom security blueprint that's just right for you.

Published with permission from Source.