Monthly Archives: June 2013

BYOD and New Network Requirements

Adopting BYOD increases the bandwidth usage, deteriorating the performance of other devices and applications in the network. This becomes definitely a pain instead of the expected advantage.

According to BT and Cisco’s research, the companies implementing BYOD practices should reinforce their networks, their security and obtain complete control of all the devices in them whether they are mobiles or not, to accomplish their planned productivity.

According to research based in 2,200 surveys to executives and companies in 13 countries along the different regions, the growth of mobiles devices is exponential and has increased the bandwidth usage in 84%. Actually, 56% of IT managers have detected a lower performance in the network and certain applications as a result of the increased bandwidth consumption. This impacts the devices’ maintenance processes and updates as well.

These negative effects are perceived by the employees; 46% of the employees with Wi-Fi access have detected delays in connecting to the network, in the applications deployment and performance, and in their devices updating, briefing, their systems whether mobiles or not have become slower in every mean. 76% of the professionals that responded to the survey think that companies should take the needed measures to increase the productivity, security, and performance. From the surveyed TI professionals, 33% suggested working with more applications based in Cloud, 32% suggested using specialized software, and 32% suggested increasing support to mobile devices users.

BYOD RMM

 

This is clearly one of the most common pains produced by the innovative mobile revolution. Now read this:

Even though having a Wi-Fi access is fundamental to a BYOD development, 45% of the employees do not have Wi-Fi access to their corporate networks. Of this number 68% thinks that having this access would turn into a positive impact on their work, 30% said it would increase their flexibility at work, and 26% said it would ease their contact within the company.

Network capacity is definitely not the only challenge to consider when adopting BYOD. Actually, 84% of the surveyed IT professionals said that BYOD could be a competitive advantage only if the necessary processes, tools, and policies are adopted; 26% think that employees understand the requirements to get the access and permissions for their mobile devices.

RMM and MDM are definitely one of these requirements; a properly applied continuous RMM/MDM policy allows the IT professionals to control the installation, deployment and performance of each application and device whether it is BYOD or not. RMM/MDM tolls also control the corporate information security and access in the network help

ing it to improve its performance. Additionally, the regular RMM/MDM processes reinforce security policies along the network, devices and corporate information.

Gordon Thompson, EMEA Enterprise Network Director in Cisco, stated that they already have a BYOD model. They started in 2009 only with smart phones, achieving savings of 25% on cost-per-employee. They recently added 82% more devices to their base increasing the number of users by28%. He added that companies intending to implement BYOD definitely have to consider a BYOD comprehensive plan beyond the operating system; they have to consider the device support and maintenance, , the end user experience and the increased productivity.

John Timko, Marketing Director at LabTech Software, explained that RMM/MDM services, IT networks and application performance work hand-in-hand. RMM certainly improves the network and devices’ performance.

Timko added that in a nutshell, the appropriate RMM and MDM services together with high performing network hardware and software can deliver any IT support and management task or process that needs to be accomplished remotely, efficiently and non-intrusively, giving the support and performance needed to achieve the desired productivity, and end-user experience and at the same time reinforcing security and information availability.

The smart phones and tablets trend is to continue growing, and companies need to develop BYOD plans, so they imminently need a cost-effective RMM and of course MDM solution. The market is there, opened and in need, waiting for experienced RMM and MDM services and solutions provider to help them achieve their performance goals.

Monica Paul, Marcomtec Group

 

The Panda Security Renewal Fee Program (RFP) is a new scheme further rewarding our loyal partners for their Panda Security product sales and installations.

When a client you initially provided a Panda Security product to renews through the Panda website (www.pandasecurity.com) you will receive a percentage Fee of the net renewal value.

How do I know how much Renewal Fee I have earned?
The main dashboard of the RFP portal will give an overview of the numbers of codes registered, activated and the Renewal Fee you have earned to date.

Panda Renwal Share

More detailed reports are also available.

When can I claim my Renewal Fee?Your renewal Fee can be issued once your balance exceeds £250, you can email sales@uk.pandasecurity.com and request payment. All we need are your bank details.

How do I register?
Simply complete the registration form at https://channel.pandasecurity.com/app/Pages/Partner%20Program.aspx Ensure you select “I want to take part on the Renewal Fee Program”
Once approved you will be provided with your RFP login credentials by email along with instructions on the use of the RFP portal. If you are an existing member of the Panda Business Partner program
then please contact us and your account can be upgraded to include access to the RFP.

How do I Register my Panda stock for Renewal Fee?
The RFC sticker is on the bottom or reverse of each retail product of the new 2013 range. Note: For ease the RFC codes can be scanned using EPOS or popular smartphone barcode scanning programs. Enter the RFP portal by visiting https://channel.pandasecurity.com/app/Pages/default.aspx and clicking the RFP button.

Are you moving into Managed Services? If your business provides IT support as a managed service you can bundle security software from Trend Micro as part of your service offering. All Trend Micro products are available including Worry Free. By Partnering with Trend Micro on their xSP programme you will have access to the following:Trend Micro xSP

  • Quarterly pay-as-you-go billing
  • Industry-unique self-provisioning licence portal (LMP)
  • Industry-unique web-based management console (WFRM)
  • Integrate with leading RMM and PSA tools (such as Autotask and ConnectWise)
  • State-of-the-art solutions that use the cloud, eliminating costly installation and setup work

For more information visit http://www1.bluesolutions.co.uk/vendors/trend-micro/msp-solutions.aspx

Apply online at https://www.rissp.com/Register.aspx

BYOD is definitely a pain but also an advantage to companies; an advantage because at first sight it represents huge savings since they don’t have to invest or spend?... in smartphones for their executives and employees. However, the security gaps become real threats.

The owned smartphone use for work purposes continues to expand, and the governance, risk and compliance implications of the trend are beginning to take the companies attention. According to a recent survey by Search basic_security_iconCompliance, "security risk" was cited by 96% of respondents as being among their top concerns regarding BYOD (bring your own device) initiatives in their organizations.

"Compliance" was the second-ranked top BYOD concern in the survey, taken by 773 IT professionals during SearchCompliance's April 24 virtual conference, The State of Cyber Security 2013.

All these new mobile technologies are changing the way business is done -- often in positive ways. 41% of the survey responders stated that these technologies ‘make workers more productive’. However CIOs also consider that these small mobile devices with vast capabilities force them to re-engineer the business processes and implement security and management tools to offset mobile device security risks.

It professionals work is not to say 'no,' -- their job is to explain the senior leaders the risks and the rewards of bringing this technology into the organization, and to provide the correct tools to have the network, processes, and corporate information safe.

“BYOD in today’s world is very popular however the amount of personal mobile devices linked to corporate systems provide a security nightmare for any IT admin. The MDM plugin in LabTech offers advanced control over iPhone and android which allow you to remotely wipe/destroy the data on the device should it become lost/stolen.” Explained  Matt Towell, Network Administrator, DataFortress & LabTech Technical Engineer at Blue Solutions.

There are compelling arguments for mobile technology use in the workplace, but the IT leaders need to have discussions with the C-suite about these mobile device security controls. Of course they need to include RMM and BYOD projects as an integrated part of the regular security and network management and optimization budgets.

IT Professionals have to have their eyes wide open and say, 'Look, if we are using these new mobile technologies, we need to have the controls and tools to manage them and secure them as well as our information and network.

Yes BYOD is a pain but also a benefit, the pain may be healed with the adequate RMM tool, then the benefits may increase exponentially, same as the savings and the IT staff time optimization.

Monica Paul, Marcomtec Group

StorageCraftStorageCraft have relaxed their requirements for Managed Service Providers on the MSP programme.

  • Minimum contract term has been reduced from two years to one year
  • Minimum monthly spend has been reduced from £135+vat to £100+Vat
  • Consumption billing for the first three months, you only pay for what you use

StorageCraft continue to be the leader on disk based backups using snapshot technology to image an entire system. As a Microsoft certified VSS partner you can be assured of the highest quality solution. Clearly a reason many providers choose to white label the StorageCraft agent technology.

The recent acquisition of N-able has created uncertainty in the remote monitoring and management (RMM) industry. Will the focus of the company shift? Where is the vision headed? How will N-able’s software change without an RMM pioneer at the helm?

If you’re uncertain, choose the RMM platform that is committed to MSPs. LabTech is the only RMM platform designed by a managed service provider (MSP) for the way MSPs work. And because they came from the MSP space, be assured that we will remain loyal and committed to their partners.
With LabTech, you’ll get the strongest and most powerful RMM platform on the market, as well as the features and functionality you need to harness the power of automation and drive IT service excellence into your IT business, including:

  • Seamless integration into industry-leading professional services automation (PSA) software
  • Asset discovery
  • Device and network monitoring
  • Asset lifecycle management
  • Powerful and customizable scripting
  • Valuable reporting
  • Plus much more

The MSP landscape is changing. Don’t get caught in the winds of change. LabTech’s future is clear. They are here to stay and their focus remains on you – the MSP!

Small Business Server 2011After many years of faithful service to the channel, Microsoft will be retiring Microsoft Small Business Server 2011 on June 30th 2013 within the Open Licensing Program. Retail and OEM SKUs will continue to be available until December 2013.

Windows Server 2012 Essentials will be the only replacement within the Microsoft portfolio. This can be deployed on a server with up to 2 processors and supports up to 25 users and 50 devices. No CALs are required and there are no virtualisation rights.

Alternatively customers can opt for Windows Server 2012.

With Cloud providers maturing all the time this may now be the time to move to the cloud. Hosted Exchange is a mature technology and with employees demanding access to their data from many devices including mobile devices, a hosted solution may be the correct way forwards. Hosted solutions remove the cost of the hardware along with the ongoing support and maintenance costs. Security and backup are typically bundled for free. Employees will benefit from greater uptime and the ability to access their data and applications from any device, as long as they have access to an Internet connection. Solutions may also provide synching functionality for offline work.

Blue Solutions has just launched a hosted Desktop offering which enables users to have a virtual Windows 7 Desktop with cloud storage, Microsoft Office Applications, along with Exchange mailboxes. There are also upgrade options for dedicated virtual servers to host line of business applications.

Would you like to offer your customers an alternative to Office 365. Blue Solutions are pleased to announce a new Cloud delivery platform that you can brand as your own.

Desktop + Office bundle
Provide a hosted Windows 7 desktop
Includes Office 2010 or 2013
Includes Exchange 2010 hosted mailbox with 25GB

Choose either
Windows 7 + Mailbox + Office Standard Bundle £55
Windows 7 + Mailbox + Office Pro Bundle £59

• Hosted in UK Tier 3 Datacentres with ISO27001
• End User Single Sign-on
• Reseller management control panel
• One Bill
• Backup built in with 30 Day Retention

Optional bolt-ons:
Microsoft CRM 2011
Microsoft Sharepoint 2010

Terms
Flexible contracts
Volume pricing available
All price per user per mth
All prices exclude VAT