Blog

July 31st, 2014

Verteks Consulting is proud to be an AirWatch partner and we’re excited about AirWatch’s leading position in the Gartner Magic Quadrant for Enterprise Mobility Management.  Every year, Gartner evaluates enterprise mobility management providers based on their ability to execute and completeness of vision. Vendors are then placed on a quadrant to represent their position in the market. Of the more than 100 companies in the EMM space, only five vendors were recognized in the Leaders quadrant. This is the fourth consecutive year we are recognized as a LEADER, receiving the HIGHEST position for our ability to execute for the second consecutive year.

The Gartner Magic Quadrant for Enterprise Mobility Management was called the Gartner Magic Quadrant for Mobile Device Management Software from 2011-2013. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

 

AirWatch Tops Gartner Magic Quadrant

July 30th, 2014

Please join me in congratulating our engineer, Chris Whitfield, on becoming a WatchGuard Certified System Professional.

The WatchGuard Certified System Professional-XTM (WCSP-XTM) exam certifies that individuals who pass the test are competent in the installation, configuration, management, and monitoring of a WatchGuard XTM device with Fireware XTM OS. The courseware and exam reference WatchGuard System Manager management software.

Individuals that take this test also confirm their knowledge of the fundamentals of network security, WatchGuard System Manager management software, and Fireware XTM configuration tools.

Congratulations to Chris for learning this material, taking the test and earning his certification!

Chris Whitfield WatchGuard Certified System Professional

July 23rd, 2014

ShoreTel has a great Microsoft Outlook integration capability that allows you to easily manage your voicemail inside your Outlook email interface – but many people have asked me about how to get the most out of ShoreTel Communicator for managing these messages, without using Outlook.  In this brief overview, I’m going to show you how to use the built-in capabilities inside ShoreTel Communicator to more easily manage and control your voicemail.

I’ve included some screenshots to illustrate how I use ShoreTel Communicator for this and I’ve made notes on each image so you can follow along on your own system.  I encourage you to experiment with these tools and find what works best for you – and share that knowledge with your teammates and coworkers as well.

As always, if you need some extra training, or want some live interaction with one of our experts on how to get the most out of ShoreTel Communicator, I encourage you to register for one of our bi-weekly live training sessions, or view our recorded sessions which we’ve posted on our site here – follow this link for training recordings.

ShoreTel Communicator Voicemail Management Images

February 20th, 2012

Thinking of adopting a "bring your own device", or BYOD, policy at work? Learn more about what it is, why it's becoming popular – and what you need to consider before rolling it out.

You may have noticed more and more of your employees or colleagues bringing their own computing devices to work—be it their mobile phone, tablet, or laptop. Or perhaps in your company or in other companies you may have seen, they have let people decide which device they prefer because they are used to it at home. You may not realize it, but this is all part of a large trend called the "consumerization" of IT, in which the influence of consumer technology is being increasingly felt in the workplace. With the wide availability of cheap but powerful mobile devices and online services, a growing number of people are being exposed to the latest technology at home first—adopting them at a rate faster than most businesses are able to manage. This flips on its head the old paradigm in which traditionally new technologies would be rolled out to businesses first, before they would find their way to consumers.

This trend, plus the increasing sophistication of young workers today and their frustration with the tools available to them at the office, is pushing some companies to adopt a "bring your own device" or BYOD policy at work. They are not alone. According to research by technology analyst group Gartner, end users, not the IT department, will soon be responsible for 50 percent of business IT procurement decisions—ultimately bringing and running their own systems on company networks. Meanwhile, according to management consultants Accenture, around one-third of today's younger generation of workers (a group called "millenials") not only wants to use the computer of their choice at work, but also wants control of the applications they use too.

The benefits companies cite to adopting a BYOD policy are many, among them:

  • Savings on capital expenses and training costs in using company equipment—compensating employees instead via other means such as flexible work hours, subsidized purchases, insurance, and other benefits.
  • Less management headache—effectively letting employees decide what to use releases the company from some overhead and management responsibilities.
  • Improved employee satisfaction—by giving employees the freedom to use devices and applications that they prefer.
However, before you consider letting employees bring their own personal technology to the work place, be aware that there are also disadvantages, and sometimes very real dangers in doing so. These include:
  • Non-standardization of hardware, operating systems, and applications. If your business operations require that some equipment is integrated with others, then BYOD can in the long run actually increase IT management costs and decrease efficiency.
  • Exposing your network to malware or security vulnerabilities and breaches. When your employees bring their own devices to work, you lose important control over their security. Consumer devices often don't employ comparable bullet-proof security technologies mandated by businesses.
  • Leakage of confidential or proprietary information. Employees will naturally do what they want with the data on their devices, even if it doesn't belong to them, or it's against company policies. Employees can also lose precious company data when they misplace or damage their personal devices.
  • Lower economies of scale in procurement. Essentially because everyone is buying devices on their own, you miss out on the chance to consolidate purchases and lower purchase costs for everybody.
Have you adopted a BYOD policy at work? Thinking about it? Worried about this trend? If you need to understand BYOD better so you can define a policy for your staff, contact us and see how we can help.
Published with permission from TechAdvisory.org. Source.

January 9th, 2012

A worldwide shortage of hard drives is expected in the near future as many of the Thai-based factories continue to struggle with flooding.

In the same way the massive earthquake and tsunami damaged Japan’s electronics industry, the flood crisis in Thailand is causing concern for companies that require hard drives for production.

The majority of the world's hard drives are produced in factories located in Thailand, where the flood crisis has put a damper on many industries, hard drive producers included.

According to reports, the shortage is already driving hard drive costs up and may just be the beginning of that trend. As companies like Hewlett Packard respond to the situation, the outlook remains unclear. PC sales could be affected well into 2012 and beyond. With flooding still an issue for some producers the shortage could expand.

As of now, there is still no concrete solution in sight for the problem with the supply of hard drives in the world, and while reconstruction efforts in Thailand are ongoing, getting the hard drive industry on its feet will take a while. As for the effects on the computing world as a whole, PC prices will likely rise as pre-flood inventories are sold out and replacement stock is delayed.

Published with permission from TechAdvisory.org. Source.

Topic General Tech
December 23rd, 2011

ShoreTel’s new Mobility solution is the holy grail of Unified Communication, allowing you to use your smartphone as the primary endpoint on your company’s pbx. That’s right – now you can use your iPhone, Blackberry or Droid cell phone as your primary extension on your company’s phone system, while retaining your own personal cell phone “identity” as well.

The solution is comprised of two parts: a hardware router that sits on the host side and a software application for the mobile device. Depending upon the manufacturer, ShoreTel either replaces or modifies the mobile device’s dialer to add pbx style functionality like a display of the user’s pbx extension and options for transfers and conferencing.

In areas where WiFi coverage is available, the ShoreTel Roam Anywhere Dialer (RAD) uses the WiFi connection to make a PBX call. The software is constantly monitoring for WiFi connections and automatially creates a VPN tunnel back to the Mobility Router – no user intervention is required.

This technology can result in massive cost savings in International roaming scenarios, because instead of connecting via the cellular network and incurring exorbitant international roaming charges, road warriors can connect via WiFi at a hotel or coffee shop and place and receive calls over a standard data connection. The technology also feature a virtually seamless handoff to 3G and 4G data networks; should the user move out of the WiFi coverage, the software automatically moves the call over to the cellular data network if there is sufficient coverage/bandwidth. After a delay of 4-5 seconds during the hand-off, the call continues uninterrupted.

In terms of useability, users can dial internal four digit extensions and the app is smart enought to know to place the call in pbx mode, which shows the user’s company caller ID. Likewise, users can flag certain contacts as personal so calls placed to those contacts go out via the regular cell phone, thus showing the caller’s cell phone caller ID.

The ShoreTel Mobility Solution doesn’t miss a beat when it comes to user presence; ShoreTel users on smart phones can display their presence just as they do on regular desktop handsets.

The best part about the ShoreTel Mobility Solution? You don’t have to have a ShoreTel system in place to take advantage of it – it works with all of the major PBX manufacturers!

December 19th, 2011

Employees using their own mobile devices for work may seem like a good idea at first it's less expense for you, the employer, and they can also make employees more productive. However, it also means that you are allowing potentially unsecure devices to access your company's data. The solution? An effective IT security policy that balances personal freedom to use these devices and your need to secure important business information.

As technology continues to become more affordable and accessible to consumers, it's an inevitable fact that employers will see more and more of their employees using their own personal devices such as laptops and mobile phones to access the company's IT system.

This can be a dangerous thing. Since these devices aren't company owned and regulated, you have limited access and control over how they are used. Employees could download all sorts of malware and viruses on their devices and pass the infection along to your IT system when they access it.

The solution: a comprehensive IT security policy. It's important that you find a compromise between the freedom of the employee to use the device as desired and your need to keep your IT system safe from viruses and other threats to your data's security. Steps such as having employees run mobile device management (MDM) software on their devices is one of many actions you can take to lessen the risk of security breaches. You may also want to implement applications and software that check and screen for malware, both for laptops and mobile devices. And don't forget that while Android seems to have a bigger problem with malicious software, Apple isn't exactly virus-free, either.

Employees have a right to use their personal devices as they see fit, but not at the expense of important company information stored in your IT system. Running a tight ship in terms of security is an effective way to protect your business interests and your sensitive company data. If you are interested in knowing more about developing a concrete and effective IT security policy for personal device use as well as general system access, please don't hesitate to give us a call so we can sit down with you and discuss a custom security blueprint that's just right for you.

Published with permission from TechAdvisory.org. Source.

December 12th, 2011

Fact: all it takes is one security breach to destroy a company. But few - especially small businesses - seem to realize it, according to a recent survey released by StaySafeOnline.org. Results show that few small businesses see themselves as a target of online thieves or hackers, resulting in many having only token security policies in place.

StaySafeOnline.org, a website of the National Cyber Security Alliance, has recently released a study that chronicles the cyber security practices and attitudes of small businesses. Conducted in partnership with Visa, the study shows some interesting, if not disturbing, results.

It turns out that many small businesses (about 65% of the respondents) are highly dependent on their computer / IT / data systems, where they store important information, from sensitive company financial records to personal client information such as credit card info, addresses and phone numbers, and more. However, as many as 85% believe that they will not be targeted by hackers and online thieves, and less than half have data security systems in which they are confident. In general, small businesses have, at best, a mediocre security system.

Few realize, though, that it only takes one breach to compromise a company's finances and relationships with clients. And if you have less than stellar security, stealing from you is easier. You might not have as many online assets as big businesses, but hackers can make a hefty profit by victimizing several easy marks as opposed to bigger and riskier efforts with more secure systems of larger firms.

Don't take a risk with important data, and don't compromise the relationships and reputation you've built with your clients over the years. Good security is always worth it. If you're interested in knowing more about beefing up your security through company policies, software, and user education, please don't hesitate to contact us. We'd be happy to sit down with you and discuss a security blueprint that's cost effective and custom built to meet your specific needs.

Reference: National Small Business Study

Published with permission from TechAdvisory.org. Source.

Topic General Tech
November 28th, 2011

A word of caution for Facebook users: Hackers and scam artists are now using promotions and all other sorts of come-ons to victimize users into falling for phishing traps or giving up personal information. It is important to know what to do to avoid becoming a victim as well as securing your system to prevent any unwanted data breaches.

As more and more people continue to use Facebook both for personal and business purposes it seems to follow that all sorts of unscrupulous individuals and groups will find ways to exploit this popularity for their own illicit benefit.

In the same way people are phished through email, hackers and scammers use similar techniques to fool Facebook users into falling for their tricks. The combination of curiosity and trust is what hackers rely on to make users fill in contact details for non-existent promotions, visit suspicious websites, or download fake software, all through Facebook. While Facebook has instituted some additional security measures to counter this threat, the consensus is that it is a generally lukewarm, or even cursory response to the issue.

What makes it worse is that you aren't usually the first victim – those links and whatnot appear on your News Feed courtesy of a contact who has fallen into the same trap. So always be wary of events or promos your contacts invite you to join.

The most important thing is to have both the right knowledge and software to prevent getting scammed not only on Facebook, but anywhere else on the Web. Facebook is just a new medium for scammers and hackers to steal information and data and they'll do the same thing once the next big thing on the Web comes along.

If you want to know more about Facebook scams and how you can better protect yourself both through training and the right software solutions – please feel free to give us a call so we can help you set up a more secure system for your business that's custom-built to meet your specific needs.

Published with permission from TechAdvisory.org. Source.

Topic General Tech
November 21st, 2011

I’ve been looking for a reliable, easy-to-use application to access my PC and network from my iPad, and after trying several apps, I can recommend iTap RDP. I use this app almost every day and it’s extremely reliable and useful. With a few seconds of quick setup, you can easily access a Terminal Server in your network, or directly access your desktop. It’s easy to pan and zoom, easy to use a keyboard, or even issue a CTRL+ALT+DEL.

I use iTap RDP and I highly recommend it to anyone looking for an easy way to use an iPad to access the corporate Windows network or Windows PC. You can download a trial version on the app store, or learn more on the website: http://itap-mobile.com/itap-rdp