MobileWorxs Joins the SOTI Reseller Community

MobileWorxs Joins the SOTI Reseller Community

Worcester, UK – MobileWorxs announced today that it has joined forces with SOTI to resell the award winning Enterprise Mobility Management software, SOTI® MobiControl®

MobileWorxs Joins the SOTI Reseller CommunityMobiControl allows companies to manage, support and secure their mobile field force using a web-based management console.  With MobiControl, enterprises can control, access and secure mobile devices remotely, saving time, labour and money. Mobile administrators can locate, gather and track information and lockdown GPS enabled devices, enable security protocols and provide mobile application and document management capabilities. The system tracks hardware and software assets effortlessly.

Read the Press Release

MobileWorxs Joins the SOTI Reseller Community

Get in touch to learn more about how mobile device management can have a positive impact on your enterprise mobility deployment.

 

Mobile Application Development Platform 8 New Features

Mobile Application Development Platform 8 New Features

Mobile Application Development Platform 8 New Features
All your Enterprise App Ingredients in One Place

MobileFrame have released a new version of their mobile application development platform with 8 new features.

The product continues to set the bar for excellence and continues to help future proof enterprise mobile deployments and ensure existing investments in application deployment are protected against obsolescence.

Customers continue to ask us for a mobile application development platform that can deploy apps across the entire enterprise on any device. v5.2 offers a compelling return on investment ROI  proposition allowing us or our customers to create apps that increase productivity whilst being compliant with the processes of their business. It also allows for apps to be designed and deployed quickly along with excellent integration with legacy ERP and CRM systems and provides the basis for an in house BYOD approach.

Mobile Application Development Platform 8 New Features

  1. You can now View/Freshen Projects from the App Library. You can still View/Freshen from the My Project screen as well.
  2. The Create PDF workflow now has an option to leave the PDF document open in order to print additional content to the same document.
  3. Change Photo workflow now provides an option as to how you’d like the image resized. You can now choose to zoom the image or stretch the image when resizing.
  4. The Unused Steps list now includes a search bar that allows you to filter down the list of unused steps based on the step name, prompt, or input type. This should make it easier to find a particular step.
  5. For web layouts you can now specify a minimum size for resizable forms. The resizing of the layout will not go smaller than this amount if set. This will allow your screen layouts to look acceptable regardless of the browser size.
  6. Dynamic data definitions will automatically create a description tailored to the configuration.
  7. Simulator files for the Test Site have been updated to a more modern look. A new simulation file for Generic Desktop Browser has been added.
  8. Zoom has been introduced into the Test Site so it will make it easier to test on devices where the simulation file produces a large screen.

Get in touch to book a webinar or to take a look at our pre-built apps for your enterprise mobility project.  For Soup fans here are 10 great recipes.

Mobile Application Development Platform

 

Enterprise Mobile Device Security – Part 3

Enterprise Mobile Device Security – Part 3

Enterprise Mobile Device Security - Part 3

Having covered the software side of enterprise mobile device security in Parts 1 & 2, this blog will cover the hardware options to make your device and data secure.

If you are thinking “adding an SSL or Mobile VPN and device management software seems expensive why not cut out the data over the air and just use local Wi-Fi or docked Ethernet when in the office”. Limiting data transfer to within the four walls makes it very difficult for “eavesdroppers” to listen in. Jobs for the day can be synchronized to the device over night, the user can complete the jobs throughout the day and then return the unit to a cradle when the shift has finished.

This obviously limits what the mobile system can do. No new jobs can be sent to the user, no changes to the jobs, jobs cannot be assigned to a different user, no remote support or monitoring no results sent back in real-time so orders cannot be processed until the next working day. Overall when going mobile the pro’s of using a secure connection and device management outweigh the con’s.

With hardware, how can a log in confirm the user is psychicaly present? Using a biometric finger print scanner is one option. The user can slide their finger over the scanner which will confirm it against the device or against the backend server. It makes the device very secure as only that specific user can login. Application can also asked for user name and password is the finger print scanner becomes damaged or too dirty. You will find a bio metric scanner on some laptops and rugged PDAs such as the Motorola ES400, or an attachment for the MC75a.

Instead of finger print sensors, an alternative option is a smart card. Just like a security card is using to access through a door, a user can touch a smart card to a sensor. The card can then be validated over the network and the user granted access. The issue with this is that a user can still lose the card. If available for your chosen device like a rugged handheld  the initial purchase and card replacements will not be cheap though.

The last hardware piece to cover is a TPM (Trusted Platform Module). These chips are installed on the motherboard, which store certificates, passwords, but primarily encryption keys. Threat of hacking (software or accessible hardware) or physical device theft is reduced, and device authentication must pass via this chip. Currently these chips are only found in desktops, laptops like the XRW and tablets but could be installed to all devices.

So in three parts we have looked at device security out of the box, the potential problems if not secure and the options available to further secure you device, data and network.

Key point: Think about mobile device security in the planning stage and before your project gets off the ground!

Enterprise Mobile Device Security - Part 3Do not get spooked by potential enterprise mobile device security problems call us to discuss how we can help your project to address your key business issues.

 

Enterprise Mobile Device Security – Part 2

Enterprise Mobile Device Security – Part 2

Enterprise Mobile Device Security Part 1 covered the basics of locking down a device using the in built features. These are a good start to locking down a device/applications but more can be done to be ensure device and data integrity.

Enterprise Mobile Device Security – Part 2A mobile application normally always require a login ideally with an admin console back in the office where the passwords can be easily controlled by an administrator. Linking the password to Active Directory is another security feature some applications can use meaning the credentials will be confirmed against the business network.

This means password polices can be enforced, and user only needs one login to access the network from PC or mobile device.

Passing login data and and other sensitive data over the Internet in plain text is never a wise option. “Eavesdroppers” can essentially pick out the data travelling from device the server. The quickest and cheapest option is the add a SSL (Secure Sockets Layer) certificate on the server. This certificate provides encryption (usually 128-bit encryption and above) meaning only the device and server can de-crypt the data. An SSL certificate is also recommended when using web applications. You’ll commonly see an SSL certificate when entering payment details for online shopping.

A step above SSL is to use a Mobile VPN. There quite a few Mobile VPNs available from service providers but also available as software to purchase. An example is Mobility XE. Software such as this allows remote workers secure, and robust access to network resources. They offer FIPS 140-2 (Federal Information Processing Standard Publication 140-2) encryption which is a US government standard for non-classified information. Needless to say it is highly secure with very strong encryption levels. This level of encryption is becoming more and more popular with large organisations and local government.

When the communications is secure the next step is to lock down and control a device. There are a few different options for this. First is a simple lock down tool on the device, the master device is locked down, allowing access to specific applications and settings such as Bluetooth settings. This master file can then be deployed to rest of the device pool. The next level above this and a method of mass file deployment is a device management platform. SOTI MobiControl is a very popular product for just this.

MobiControl has lots of enterprise mobile device security features including configurable device lock down, remote control and help desk, location tracking, deploy files/software, allow/deny access for resources, enforce security policies and importantly manage a number of differing OS devices in the same pool, and kill the device if stolen. Killing device means the device will become inoperable by the thief.

Limiting and allowing access to specific websites can also increase productivity if the user cannot surf the web or access games on the device. There are other similar offerings, but SOTI is probably the most popular now, especially as Motorola now recommend SOTI as the remote management tool of choice.

Some application software can provide lockdown and remote control out of the box, but it very much depends on how many units the customer has and the level of remote support/control the customer wants to provide its users.

There are many software solutions for security, of which the more popular have been covered. Security of your data is down to the customer and the sensitivity of the data. The more sensitive the data, or desirable to a third party you feel it is, the more secure the data should be.

The final part in this series next week will look at security hardware for your mobile device.

Enterprise Mobile Device Security - Part 2

Do not get spooked by potential enterprise mobile device security problems call us to discuss how we can help your project to address your key business issues.

Enterprise Mobile Device Security – Part 1

Enterprise Mobile Device Security – Part 1

Enterprise Mobile Device SecurityThe level of security required very much depends on the type of application you are running and the confidentiality of the data.  So out of the box what enterprise mobile device security can you expect?

As standard a device can use a PIN code, password or pattern to unlock. Some require a simply swipe of the screen. But these are not set off the shelf. Users/Admin have to setup up the PIN/Password. If the device is lost/stolen the data can be accessed instantly.

Tablets PC’s with Windows 7/8 have the ability to easily add another PIN/password in the BIOS start-up.

If the user must set their own PIN this can create another issue for BYOD Bring Your Own Device deployments. What if the user hasn’t set a PIN and the phone is constantly unlocked? Does the application require a password? Does the application lock after X minutes on standby?

Using an application which can lock automatically after X minute standby is a very useful feature. Not only does it stop prying eyes and keeps confidential data safe, it also means if lost/stolen the thief can’t complete bogus work orders, delete/add/edit or steal customer data etc. It also stops application being opened accidentally, buttons tapped or emergency services accidentally dialed while in the users pocket.

Where is the data held, and is the data encrypted? A feature of Windows Mobile 6.5 is an application to quickly encrypt the SD card. This prevents data from being read if removed and inserted into a PC. This is not the case on Android.

If an application is accessed over the Internet this removes the need for some device security as long as the web application requires a log in each time it is accessed.

Key Point; These methods of locking down a device are VERY basic and there are still vulnerabilities to the device and data. Remember that it is the data your worker is carrying around that has the value not the unit itself. What happens when a device IS stolen? How to track a device or kill a device? What about the highly sensitive data being transferred over the Internet? Remote control of a device? Secure Logins using Active Directory or Smart Cards and Biometrics?

Tune in for Part 2 next week.

Enterprise Mobile Device SecurityDo not get spooked by potential security problems call us to discuss how we can help your enterprise mobility project to address your key business issues.

Enterprise Mobile Device Security - Part 1 1 Subscribe to our Blog in a reader Or by Email

Security Risks for Enterprise Mobility and Best Practice to Deal with Them

Security Risks for Enterprise Mobility and Best Practice to Deal with Them

Guest Blog from the guys at Digital Defence. Security Risks for Enterprise Mobility and Best Practice to Deal with Them.

Security Risks for Enterprise Mobility and Best Practice to Deal with Them 2Digital Defence develop world class data and device protection solutions for mobile devices. Mobile device management solutions protect selected data and centrally enforce security policies on mobile devices – a true enabler for mobility.

Does your enterprise organisation allow your employees and IT users to connect their handheld computers, mobiles and Smartphones to your company-wide network solutions?

If so, you probably already know that you need to be aware of the data and security risks associated with mobile deployments. Have you developed a strategy which outlines the appropriate policies for dealing with these issues effectively and efficiently?

This article covers 6 best practices and policies for handheld device security. All of which can have a significant impact on the Return on Investment ROI of your project.

Potential Security Risks

  1. Physical Security

Simply put, handheld devices are prone to loss, theft or compromise simply because they are portable by nature. It’s relatively easy, whether by intention or accident, for an unauthorised person to gain access to a handheld devices, including the resident data.

Some people share their devices with family members or friends. Opportunistic thieves aim for easy targets and those they know are likely to have high value devices in their possession; anyone from couriers to travelling business people to service engineers are all at risk.

Identity theft is now a highly organised crime and high profile or enterprise level organisations that hold personal data about their customers or clients are attractive targets for data theft.

There were over 102,300 recorded cases of Identity theft in 2009 – Source CIFA 2010

Identity fraud cost the economy £1.2 billion in one year – Identity Fraud Steering Committee figures, 2008

If your handheld devices are configured to access corporate email or to connect to your Enterprise software through your Virtual Private Network (VPN), you already have a significant security risk.

Solution: One simple measure that is worth adopting early is to require your users to protect their devices with passwords or PINs. Selected passwords should be required to access the operating system whenever the handheld is switched on as well as to unlock the device in the first place.

Read the whole article from Digital Defence on Security Risks for Enterprise Mobility and Best Practice to Deal with Them.

Get in touch to see how MobileWorxs can help you with your enterprise mobility requirements for rugged handhelds a rugged tablet pc or software for mobile application development

Andrew CahillAndrew Cahill MobileWorxs MD has 20 years of experience in the use of enterprise mobility solutions and applications to improve the performance of real life business processes.

Andrew has worked on some of the largest Enterprise Mobility projects in the UK Eastern Europe the Middle East and Africa. He has user and project experience in helping companies think through and develop mobile strategies to get the most out of a deployment.

Security Risks for Enterprise Mobility and Best Practice to Deal with Them 3 Subscribe to our Blog in a reader
Or by Email

 

Yes, We Are Open !

MobileWorxs are accepting and processing orders. Sales service and logistics teams are ready to assist you. Use the chat function to get in touch or send an email to sales@mobileworxs.com. Some products may have extended lead times during this period.