WEBINAR: Learn how to monitor BYOD on your network effectively

Forrester’s latest report on mobile adoption in the enterprise found that 66% of employees now use two or more devices every day, including desktops, laptops, smartphones and tablets. A smaller, but notable 12% percent said they now use tablets at work. That’s still far fewer than the 50% who report only using a desktop, or the 82% who use a desktop alone or alongside other devices.

66% of employees now use two or more devices every day

66% of employees now use two or more devices every day

"She won't take much more of this."

“She won’t take much more of this.”

Meanwhile, 55% of organizations stated that supporting a larger number of smartphones was a high or critical priority over the next 12 months, while 52% said the same of supporting tablets like Apple’s iPad.

We invite you to join a webinar presented by Darragh Delaney Head of technical Services at NetFort which will show you how to monitor BYOD activity on your network.

Getting this visibility into exactly what your network users are doing will help you ensure that you network does not suffer due to user actions.

Find out how BYOD is affecting your network on Friday, January 18, 2013 14:00 – 15:00 GMT

Register for this Webinar today: https://www1.gotomeeting.com/register/432130121

About NetFort LANGuardian

LANGuardian captures and analyses the traffic flowing through your network switch, stores it in a database, and displays the details in a web browser.

Read more T4B blog posts on Netfort here

For more information on NetFort LANGuardian and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on ourlatest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

WEBINAR: Find out what users are doing on your Network

Users interact with the network in many different ways during an average day. They visit websites, send and receive email, download files from the Internet, upload photos and videos, perform online backups, and more. They can also — usually unwittingly — expose the network and themselves to intrusions, malware, viruses, phishing attacks, and other security risks.

Good visibility into user activity on your network can help you to troubleshoot problems when they arise; in many cases, it can help you to anticipate problems and prevent them from arising.

Join NetFort  on December 6th at 15:00 GMT for a webinar presented by Head of Technical Services at NetFort, Darragh Delaney that will give you valuable insight into exactly what users could be doing on your network.

During the webinar, NetFort will show you how to monitor different areas of the network including:

  • Sources of user data
  • Network traffic on the LAN and WAN
  • Internet activity
  • File shares
  • Mobile devices

Register today to reserve your seat.

About LANGuardian

LANGuardian captures and analyzes the traffic flowing through your network switch, stores it in a database, and displays the details in a web browser.

Offering a depth of insight into network activity that is unmatched by products costing ten times as much, LANGuardian helps network administrators troubleshoot bandwidth issues right across the network, perform network forensics on past events, investigate activity on Windows file shares, and keep track of user activity on the Internet.

The list of things you can do with LANGuardian is endless. Every customer finds unique ways to use it, solving problems they cannot solve with other tools.

You can deploy LANGuardian on any size of network, from a small office to a global enterprise.

LANGuardian deployment with multiple core switches

For more information on NetFort LANGuardian and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on ourlatest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Leading Industry Analyst Firm Includes Kerio Control in its Magic Quadrant for Unified Threat Management

Kerio Technologies has been placed in Gartner, Inc.’s March 2012 Unified Threat Management Magic Quadrant. The global analyst firm defines the UTM market as devices that provide small and midsize businesses with multiple network security functions in a single appliance.

Kerio Control 7.3 is ideal for organisations that demand robust network protection, traffic analysis, and user-based reporting. The Kerio Control UTM is available in a wide range of form factors, including two hardware firewall appliances, a bootable ISO software appliance, virtual appliances for VMware and Parallels, or an application on Windows Server software.

“As a rising vendor in the security space, we are delighted to be included in the Magic Quadrant report,” said Scott Schreiman, CEO Kerio Technologies. “Strong growth in our customer base and partner network will solidify Kerio Control as a viable alternative to some of the more difficult to use in the space.”

Gartner’s Magic Quadrant report researches and evaluates UTM vendors in terms of their “completeness of vision” and “ability to execute.” The Magic Quadrant aims to provide a qualitative analysis into a market and its direction, maturity and participants. 14 vendors were included in the UTM Magic Quadrant report.

For more information on Kerio products and promotions as well as other technology solutions for business, including where you can purchase from, request information here

Free Technical Webinar Alert! Contains information about managing physical, virtual and mobile devices

Attend this month’s Novell Technical Training Webinar for information about managing physical, virtual and mobile devices, BrainStorm GroupWise training, and Novell Vibe 3.3.

The March webinar will be:

Date: March 20, 2012
Time: 11:00 am to 2:00 pm Eastern (GMT -4)
Link to register: http://www.grouplink.com/event/128

The agenda will be as follows. You have the choice to attend one, two, or all of the sessions:

11:00- 11:45 am “Delivering the Dynamic Workplace” – Darryl Burns & Bryan Huls, Matrix42

12:00- 12:45pm “10 Things You Should Be Using in GroupWise” – Alex Evans, BrainStorm

1:00- 1:45 pm “Preview of Novell Vibe 3.3” – Tracy Smith, Novell

If you cannot attend during these times, you can still register and we will send you a recorded copy of the sessions.

With the overwhelming response for the last webinar, we anticipate this webinar to fill up fast, so register now!

Promotion Alert! Available in Europe (EMEA) Only

We are pleased to announce the immediate availability of the Value Pack for Novell GroupWise, a joint initiative of Novell, GWAVA and SKyPRO.

Value Pack for Novell GroupWise 2012

With the Value Pack, GWAVA and SKyPRO offer an add-on for Novell customers who have purchased Priority Maintenance for GroupWise:

The Value Pack for Novell GroupWise is combining GWAVA “Vertigo” a leading eMail management product, and SKyPRO GWTalk – Basic, integrated solution offering SMS, Instant Messaging and Skype functionalities, all integrated in the GroupWise mailbox… and it is free-of-charge!!!

For more information on Novell products and promotions as well as other technology solutions for business, including where you can purchase from, request information here

SMBs still need to improve when it comes to offsite data backup

Local SMBs are feeling more confident than ever about their ability to backup and recover data after a disaster, but one-third still aren’t employing an offsite backup strategy, despite experiencing a year marred by flooding and cyclones.

According to the Acronis Global Disaster Recovery Index 2012, while Australian SMBs confidence about their ability to recover data after a disaster remains below average, it more than doubled in 2011, growing 136 percent.

This report may be on Australian SMB’s but these figures don’t differ much across the globe. 

Underlying this rise is perceived improvements about having the right resources and the technologies to recover data. Confidence in these two criteria more than doubled over the past 12 months.

Another contributing factor to the increase is that 66 percent of SMBs now check their backup and disaster recovery plans more regularly, possibly as a result of the natural disasters which hit many regions in 2011, including destructive flooding in Australia, Brazil and Thailand, deadly earthquakes in New Zealand and Turkey, storms across the United States and the devastating tsunami in Japan.

The survey also found downtime as a result of disaster-related data loss costs a business an average of US$366,363 per year – which can mean the difference between a business’ survival and closure in many cases.

 

For more information on Acronis and other technology solutions for business, including where you can purchase from, request a call today: http://bitly.com/AAtB94

An encrypted file sharing solution eases the pain for IT administrators without blowing the budget

That’s the headline that every IT administrator wants to hear, but is it possible? Yes if your organisation is using Cryptshare.

With Cryptshare anyone within your organisation can exchange large files of up to 2GB with anybody they need to and between many kinds of devices enhancing mobility and taking pressure off your e-mail system.

All you require is Internet access, a browser and an e-mail account.  In addition Cryptshare provide a simplified solution for Microsoft Outlook and IBM Lotus Notes e-mail client users.

All transfers are strongly encrypted and can as an option be made even more secure with authentication using passwords.

Cryptshare is also a two way street, where You can allow access for your customers, clients and business partners enabling them to transfer files back to you into your e-mail domain without creating user accounts or complex encryption algorithms.

Since Cryptshare is part of your IT infrastructure, you’re in control of all file transfers and the policies used to administer these.

The user interface that your team see can be customised with your company branding using a simple configurator so you can easily integrate Cryptshare into your web site or intranet making it widely available.

With policy settings you can define who can use the system and in which way. For example you can allow all of your employees to be able to send to the world or only to certain recipients. It is up to you and your policies.

The below video is of an interview with Angus Macrae, Information Security Manager of Cornwall County Council, where they have implemented Cryptshare successfully.  Angus explains the reasons for looking for solutions in this area and their experience with Cryptshare.

If this sounds like a solution worth considering you can gain access to a trial version and speak to someone about the options.

For more information on Cryptshare and other technology solutions for business, including where you can purchase from, request information here: http://bitly.com/AAtB94

Webinar Alert – Kerio Operator Version 1.2 gives businesses control of telephony costs

The next version of the award-winning IP PBX phone system, Kerio Operator, is now available. Kerio Operator 1.2 lets you control telephony costs with an easy-to-use system.

Join Kerio for a live webinar about the new features in Kerio Operator and the benefits of using a VoIP system.

The webinar will include:

  • VoIP vs. Traditional Telephony
  • A new feature overview and Live Demo of Kerio Operator 1.2, including:
  • Call pickup across office “zones”
  • Busy Lamp Field support
  • Auto-provisioning supporting Cisco, Linksys, Polycom and Snom
  • Upgrade to Asterisk 1.8

Worldwide Edition
Wednesday, February 8th | 10:00 a.m. PST
REGISTER

APAC Edition
Thursday, February 9th | 10:00 a.m. AEDT
REGISTER

European Edition
Wednesday, February 15th | 2:00 p.m. GMT
REGISTER

To request information on Kerio and other technology solutions for business, including where you can purchase from,  get in touch with us today: http://bitly.com/AAtB94

Kerio Launches Connect 7.3, a Complete, Platform Agnostic, and Mobile Aware Messaging Server

An Alternative Email Solution to Microsoft Exchange and Google Apps, Kerio Connect 7.3 Provides Flexibility to the Midsize Organisations

Kerio Technologies, Inc. announced Kerio Connect 7.3, the latest release of its messaging and collaboration server that provides email, contacts and calendar management to more than 50,000 organisations worldwide. With deployment options for Windows, Mac OS X, Linux, VMware and Parallels, Kerio Connect is ready to run in virtually any in-house or private cloud customer environment.

Scott Schreiman, CEO of Kerio Technologies said of the release “Kerio Connect 7.3 is designed for the messaging needs and IT budgets of organisations, with 50-500 employees”

Kerio Connect 7.3 Overview Video

Kerio Connect 7.3 is an alternative that gives organisations everything they need for secure business communication. Not only does the product give employees the freedom to access their email via any smartphone or email programme they want, but it allows businesses to choose where they are most comfortable storing their email.

Kerio Connect 7.3 comes with built-in anti-spam, backup, and archiving and available integrated ant-virus. Kerio Connect starts at £310 for five users, additional users start at £17.

For more information on Kerio and other technology solutions for business, including where you can purchase from, request information here: http://bitly.com/AAtB94