Search This Blog

Monday, 14 October 2013

Monitoring a small business IT infrastructure

By 
Keep an eye on the infrastructure


Monitoring a small business IT infrastructure

Monitoring and management tools are becoming more complex to deal with increasingly sophisticated applications. But many small businesses have neither the time nor resources to devote to properly managing their IT infrastructure.
For SMBs, this increasing complexity provides a challenge. Even the smaller firms may have several desktops and laptops, handheld devices, servers, a network and applications to manage, often with no dedicated IT staff. The person looking after the IT infrastructure may often have other responsibilities that could be prioritised ahead of IT.
If things are not properly managed a business can suffer from outages, security threats and data loss. With the right tools, however, it's possible to manage and monitor the infrastructure to reduce the frequency and impact of outages and other incidents that can affect a network.

Basic function

The most basic function of a monitoring tool is to show whether or not a device (such as a router, switch, server or database) is operational. Used correctly, this will allow you to find problems before your users do so, but this requires a proactive approach to ensure the network stays up and calls to the helpdesk stay down.
If you don't know what's on the network, chances are you won't know of any inherent problems. Mapping out the infrastructure topology will help in identifying weaknesses and choke points, and help in redesigning the infrastructure and implement best practice on it. It will also provide opportunities to improve the layout, and clues to why outages have happened, which will help in fixing them.
When using monitoring tools, you can't always be glued to the screen waiting for problems to happen. Setting up alerts for specific incidents is a good way to stay on top of problems while dealing with other work. Functions for this can be found in monitoring tools and can be set up to email or message an IT administrator in the event of a problem.

Utilisation uptick

With a growing business, there will be an uptick in the utilisation of the infrastructure, and you need to plan for any extra devices the growing demand for bandwidth. Monitoring will allow you to see when and where you are close to capacity and react to prevent services slowing down.
Once you have a map of the network and all the devices using it, you will be able to focus on individual devices and check their status (such as availability, packet loss, response time, traffic and error rates). This can help in detecting network problems before they get out of hand.
Many monitoring tools can keep a historical record of devices on the network that can show up intermittent problems and help in fixing them.
With careful monitoring and timely reactions it is possible to prevent problems with an IT infrastructure getting out of hand. This will save a lot of time for whoever is looking over the network and those using it, and more importantly assure your customers that you are open for business.

Friday, 23 August 2013

How to make your IT infrastructure more efficient

You need to look at applications and processes.


By 

How to make your IT infrastructure more efficient
So this is how you win some applause.
Making your small business's IT infrastructure more efficient can involve one of two things: you can try to run your network and systems for the cheapest price possible, or you can maximise the usage of those systems to wring every last drop of performance out of them.
It is not only about making sure the servers, storage and networking are up to scratch though; you also need to look at applications and processes.

Increase server utilisation

If your business uses a data centre or you have a server room, you can improve its efficiency by using virtualisation. This allows you to move many workloads onto fewer, more powerful servers.
Unnecessary old servers can be retired and you will be able to obtain advantages in flexibility, scalability and data centre automation.

Cut storage costs

The need to store data is growing and shows no sign of abating any time soon, and this will increase the expense of storing content.
Consolidating storage in a virtualised storage area network can allow firms to break away from server-attached storage. Then then speeds up backup, retrieval and archiving, because tasks don't compete for system resources with a server.
Storage virtualisation provides a way to combine all storage in the infrastructure into one centrally managed resource, which can lead to time and money savings.
Deduplication eliminates redundant data and can significantly reduce storage requirements – fewer disks are required and this can help to cut costs. It can also increase bandwidth efficiency and improve disaster recovery as there is less data to transfer. Backup and archive data usually includes a lot of duplicate data.

Reduce software costs

Efficiency can be improved and costs cut by identifying and eradicating unused or under-used software.
Firms often buy more software than they need so they can get volume licensing discounts, and to make sure they are licence-compliant. But they often end up paying for unnecessary software, support upgrades and asset management.
Organisations need to have in place a process for IT asset lifecycle management to ensure that software costs are at a bare minimum while maintaining compliance. A focus on software costs, workload analysis, negotiations and contracts can save more than 30% of the relevant spending.

Outsource IT tasks

In your organisation, is the IT team really making the best use of its time on tasks such as security or communications? It can be more efficient to outsource such tasks to a managed service provider.
Such providers will have capabilities that your company needs but may lack, and can ensure that routine but crucial tasks are done without you spending time or money cultivating that expertise in-house. Outsourcing also allows employees to focus on work related to the organisation's core competencies.

Create a long term plan

Replacing technology can disrupt the productivity of your workers. If you plan out your business objectives carefully and align technology to those objectives this will streamline your infrastructure and increase business performance.

Wednesday, 21 August 2013

How tools for targeted ads also boost targeted attacks

Matt Huang, Special for CyberTruth7:43 p.m. EDT August 19, 2013



Most of people are familiar with online ads. You see it everyday on webpages you browse. Most people also know that these ads are "targeted."
For example if you're shopping for a car and browsing related sites, you seem to start seeing more car-related ads, and sometimes the exact manufacturer that you are interested in.
Google, Yahoo! and ad networks have spent billions of dollars and years to develop these targeting technologies so ads can be served to "target" their audience.
However, protecting ad network infrastructure is a hard problem to solve. The ad ecosystem is so big with such sophistication that it's hard to pin point which party in the ad serving chain is ultimately responsible for the malicious ad.
In most cases, the website that displays the ad and the end user who sees the ad have no control over what ads will be displayed. This becomes a perfect playground for attackers. The technology is readily available, the cost is cheap, and the impact is not only great, but can be precisely targeted.
Most of the more security-aware have heard of the very hot term "targeted attacks", or "advanced persistent threats" as we call it in the industry. It is a new generation of attack where the attacker target individuals and organizations that they want to breach or infect. This is more powerful than infecting the general public; the attackers may be seeking specific information, source code, or intellectual property from a company or a government organization.
This is where advanced threats and online ads intersect, and the key word is "targeted."
Attackers have learned to leverage the advanced, ready made, and cheap technologies of the online ad ecosystem to serve their attacks. When they do so, the attacks can easily be targeted at a geographic location; at a certain time; or to a specific industry or community. They can turn the ad campaigns on and off, and they can see the click rate to determine success.
The attackers' ecosystem is built to differentiate humans versus automated crawlers and makes sure content is served to humans only. This makes it difficult for automated security scanners to "see" the malicious ads, and block them.
Industry initiatives such as the anti-malvertising working group at the Online Trust Alliance (OTA) are starting to look at the issue, and security vendors like Symantec and Armorize have started to provide solutions and technologies that monitors for malvertisements on websites and in ad networks. But it's still very early, and there are many more battles to come.

Why online and mobile ads are ripe for hacking

Byron Acohido, USA TODAY6:16 p.m. EDT August 19, 2013



SEATTLE — The multibillion-dollar Internet ad industry last week got a big wake-up call, courtesy of the Syrian Electronic Army.
The hacking group with ties to Syrian President Bashar al-Assad cracked into Outbrain, a third-party recommendation service, by fooling one of its employees to click on a viral Web link sent via e-mail.
That toehold inside the company's network enabled the hackers to change the widget settings Outbrain uses to recommend content from its big media partners and thereby gain access to the networks of The Washington PostTime and CNN.
As hacking goes, nothing too complicated, really. Yet that headline-grabbing caper punctuated a series of recent disclosures showing just how porous the burgeoning online ad industry really is.
Those online ads you see that sometimes seem to sense your whims don't happen by accident. They are the result of media and tech giants furiously collaborating across the Internet with third-party app developers and ad brokers to send you ads that match your surfing habits.
The more we use online collaboration tools, social media sites and mobile devices, the more the ad industry can track our surfing habits to cash in. This entire enterprise by design has been made cheap and easy for third-party entrepreneurs to participate, and thousands do so. The unhappy corollary: The system is also ripe for spies, hacktivists and scammers to manipulate.
"The ad networks have been exposed and brittle for as long as they have existed," says Gunter Ollmann, network security firm IOActive's chief technology officer. "Some of the most successful criminal gangs rely heavily upon usurping ad networks to pimp their fake antivirus software and credit-checking services."
At the Black Hat conference in Las Vegas last month, researchers from website security firm WhiteHat Security demonstrated how it's possible to simply spend a few dollars to circulate innocuous ads that can commandeer Web browsers and use them to launch denial-of-service attacks against other websites.
To date, such denial-of-services attacks have been launched by botnets — large networks of thousands of infected PCs or Web servers under command of an attacker. WhiteHat's demonstration showed how anyone willing to spend less than $100 can circulate a simple ad that could manipulate the ad networks to perform much like an attacking botnet.
WhiteHat CTO Jeremiah Grossman and senior researcher Matt Johansen showed why it is so difficult for the top ad networks, operated by Google, Yahoo, AOL and Microsoft, to filter infectious ads. The bad guys are expert at manipulating ad networks to serve viral ads in a rotation based on location, time and surfing habits of the individual consumer. Meanwhile, hundreds of smaller ad networks don't do much security checking at all, and any one of them will display an ad for dirt cheap.
WhiteHat researchers showed how easy it would be to circulate an innocuous paid ad that didn't do anything overtly malicious. For instance, the ad could upload an image from a targeted website, a routine task.
However, the attacker could tweak the ad to upload the image 10 or 15 times, and then pay to have an ad network circulate the ad on thousands of Web pages, which may cost only a few dollars. Grossman and Johansen estimate that to knock down anything but the top-tier Web properties, which have substantive DDoS (distributed denial-of-service) protection in place, would cost no more than $20 per hour.
Each person who simply viewed, not even clicked, on a Web page carrying this ad would thereby ping the targeted website with potentially hundreds of image requests each minute. Multiply that by hundreds, thousands or millions of people viewing thousands of ads on Web pages and it wouldn't take long to shut down the website.
"The bad guys will use whatever means is available to them, and they've been using advertising networks to distribute malicious software for years now," Grossman says. "It's easy, inexpensive and gets them in front of millions of people."
Meanwhile, researchers at Taipei-based network security firm Armorize Technologies have documented in detail how hacking groups seed viral ads on popular websites in a way so as to avoid detection from search-engine filters, while also being targeted to appear only in certain regions of the world at pre-set times of the day.
And then there's the budding criminal enterprise of corrupting mobile ad networks so that they deliver malicious software to mobile device users. Researchers at Palo Alto Networks recently discovered this sort of attack unfolding in a novel way that exploits how popular Web apps are intricately hooked into mobile ad networks.
The nasty bit of coding that got circulated was not detected by antivirus software. It took over the infected device's SMS texting function so that the attacker could send text messages from the mobile device, as well as intercept messages coming into the device.
Mobile apps have hooks built into them to reach out to the appropriate ad network to fetch ads and update them so that the app developer gets paid, says Palo Alto Networks senior security analyst Wade Williamson. To do this, the developer needs to embed software from the ad network into the mobile app.
Bad guys are locating ad networks that aren't well protected and seeding malicious software on those networks. So any legit Android app that hooks into that particular ad network begins spreading their malware.
"A legit app developer can unknowingly partner with a corrupted ad network so that when his app reaches out to serve an ad from that network, now malware gets delivered to the mobile device user," Williamson says.
Paul Ferguson, director of threat intelligence at network monitoring firm Internet Identity, says the low barriers meant to encourage bloggers, app developers and anyone who wants to run an ad network into joining the online advertising ecosystem ensures bad guys will continue to take advantage.
"From a technical perspective, it is difficult to nail down malicious ads because of how they are served up to visitors in a rotation," Ferguson says. "And the ad may be targeted based on any number of criteria, such as geo-location or previously visited sites."

Friday, 28 June 2013

Complex industry going up the cloud

By Corrie Salientes-Narisma in San Jose, California/Philippine Daily Inquirer | Asia News Network – Sun, Jun 23, 2013

San Jose, California (Philippine Daily Inquirer/ANN) - Manufacturing companies may not be able to move their actual production lines into the cloud but they sure can manage there their shop floors, supply chain and inventory, financials and a lot of other tasks crucial in running a manufacturing business.
And what better way to enable manufacturers to focus on their core business¿making products¿than by lightening up their load on noncore but equally important aspects of their operations by bringing them to the cloud.
For a company to survive and stay competitive in an ever-changing market environment, going to the cloud and keeping connected may be the best way to go. The same goes for brick-and-mortar businesses.
Huge multinational manufacturing companies may not have a problem dealing with the complexities of modern times. With the resources they have, they can establish their own on-premise infrastructure and systems. But others, especially those that do not have the resources to build the systems that will help them become more productive and efficient, may not stand a chance.
It is here where NetSuite Inc., a leading cloud-based business solutions provider, comes into the picture. Its cloud manufacturing solutions were launched at the SuiteWorld 2013¿a gathering of NetSuite customers, partners and developers¿in San Jose, California last May.
NetSuite chief executive officer Zach Nelson says manufacturing is a complex business. But NetSuite, after years of research and development, is able to come up with a wide range of cloud-based capabilities for people and companies that actually build things.
With NetSuite¿s next-generation cloud-based solution, which appeared to be totally unviable before due to the complexity of the production process, Nelson says he now expects a sea of change in the manufacturing industry.
The manufacturing solution is a result of the evolution of NetSuite¿s offerings, Nelson says.
"For distributors, we have rich inventory capabilities and all things related to managing items. We saw that some of the distributors were also manufacturers in the sense that they assemble things. So we had, about four years ago, introduced a functionality called white manufacturing, which is really assembly," he explains.
"Prior to the launch, our products were great for outsource manufacturers¿those who do not really make things. They send their materials to somebody else who will build the products and get the finished products for distribution."
That served as a starting point for the cloud manufacturing solution which was built on top of the existing NetSuite platform, Nelson says in an interview with Philippine and Hong Kong journalists in San Jose.
The manufacturing suite includes a number of functionalities that will allow companies to fully run their businesses end-to-end. These include availability to promise or ATP, standard costs, work-in-process tracking and routings.
ATP is a system that provides visibility to inventory and supply chain, allows direct reservation of sales orders against the supply chain and automates the sales order commitment process.
According to NetSuite, the routing and scheduling capability in the suite allows production managers to define scheduling parameters, such as setup time and run rates for each operation. It also allows the creation of assemblies involving multiple steps and roll-up of standard costs. The work-in-process inventory tracking capability with new multistep functionality enables manufacturers to closely manage work-in-progress inventories to minimize inventory holding costs, prevent stock-outs and maximize efficiency.
The cloud solution covers manufacturing-specific requirements such as shop floor and project control, multisite and multidivision operations and warehousing, demand planning, production engineering, lot and serial control, standard costing, bill of materials and assembly building.
The delivery of real-time visibility into costs and customers enable manufacturers to make data-driven business decisions and adapt swiftly to opportunities and threats.
NetSuite SuiteCloud provides a robust environment to customize solutions to meet unique business needs. All customization seamlessly carry over with each periodic upgrade, eliminating users¿ concerns that customizations will be lost with an upgrade.
Netsuite¿s partnership with 3D design and product lifecycle management (PLM) companies provide its customers with a complete solution to manage product lifecycle¿from design to delivery¿entirely in the cloud and in one single suite.
An alliance with cloud-based design and engineering software provider Autodesk Inc., which was also announced at the SuiteWorld, will allow NetSuite to integrate its capabilities with Autodesk¿s PLM 360, a next-generation cloud-based lifecycle management solution. This, according to NetSuite¿s statement, is a major breakthrough in delivering an end-to-end solution for ideation, design, manufacturing, service, multichannel sales and beyond to the manufacturing industry.
"This gives manufacturers a single, closed-loop solution to accelerate product design and development, reduce risk of errors and delays, streamline supply network collaboration and gain critical real-time visibility into pricing, scheduling, capacity and profitability," according to the statement.
NetSuite has packaged its manufacturing offering with other business solutions, such as financials, enterprise resource planning (ERP) and customer relations management (CRM).
"Modern manufacturers require a system that helps them reduce costs during the design process, efficiently manage multichannel distribution, continuously innovate and leverage a dynamic supply network while adapting to mobile-empowered customers who demand modern e-commerce experience," the company said in a statement.
It adds that traditional on-premise software used by manufacturers creates a barrier to product innovation and business growth by increasing IT (information technology) costs, therefore driving up the cost of production and decreasing business efficiency and accuracy.
Establishing the traditional on-premise system not only costs a lot but also takes several years to complete. On the other hand, tapping cloud-based solutions is less costly and takes a much shorter time to get the system online.

COPYRIGHT: ASIA NEWS NETWORK

Wednesday, 12 June 2013

In-memory computing: the SMB perspective

IN DEPTH Advanced software and cloud services are removing barriers to entry


By | TechRadar.com

In-memory computing: the SMB perspective
In-memory computing is accelerating data analysis

Having gained traction in the larger enterprise in recent years, in-memory computing (IMC) is now becoming a viable option for small to midsized businesses (SMBs).
IMC involves storing critical business information in the random access memory (RAM) of dedicated servers, rather than in relational databases on traditional hard disks. It removes bottlenecks and positions data closer to the processor, allowing analysis to take place in 'real time'.
According to a recent Gartner report, the declining cost of RAM and maturing software systems are making it easier to SMBs to pick up on IMC.
"The industry has been through a period where large enterprises have used in-memory computing on a very experimental level," says Bo Lykkegaard, analyst at IDC. "The technology is now beginning to spread to smaller companies via different routes off the back of that."

Embedded analytics

A number of vendors targeting smaller businesses are beginning to integrate IMC technology into their analytics solutions, including Tibco Spotfire (in Spotfire5), QlikTech (Qlikview), and PowerPivot (Microsoft), which allows users to load data in-memory that can be manipulated using Excel.
"These vendors provide business intelligence tools that allow you to load in-memory data from your data warehouse or from various data sources," explains Gartner analyst Massimo Pezzini.
"While the data is in-memory you can analyse it using graphical or navigational tools that return results very quickly."
Pezzini adds that SMBs should not think in terms of how much data they have when considering an IMC solution, as a more important question lies in the frequency of reporting.
"You probably don't need in-memory computing if you only run reports once a week or month," he says. "However, you would need a data visualisation tool if you needed to analyse data in real time to identify opportunities and track profitability of your product line or customer activity."
Tableau Software, a provider of data visualisation solutions, offers an "in-memory Data Engine" which can extract data to bring it in-memory before executing fast query responses on hundreds of millions of rows, all performed on scalable commodity hardware.
"When users are able to get answers to their questions at the speed of thought they are able to ask more questions of their data, and safely explore different assumptions and perspectives," says Francois Ajenstat, Director of Product Management at Tableau.
"If people can make decisions based on facts and figures rather than gut feel then the quality of the decisions will increase which will result in greater business outcomes."

Innovating at speed

While SAP is not credited with inventing in-memory computing (it has been around since the 70s), it was the first vendor to ramp up marketing efforts around its own IMC technology when it launched HANA in late 2011.
SAP recently integrated HANA's technology, which allows businesses to run both analytics and transactions on a single database, with its BusinessOne management suite for SMBs. This removes the need for a separate data warehouse to run reporting tasks, thus lowering the potential total cost of ownership (TCO).
"Simplistically, HANA is an added-on appliance to BusinessOne, which allows the customer to pull data from the transactaional database and run analytics on top of it," says Rich Philips, UK Channel and Sales Director at SAP. "It's pretty low risk as you don't have to switch off the BusinessOne system while you're deploying and delivering the analytics alongside."
Philips adds that this could give SMBs a competitive advantage, providing the example of a retailer with six or seven stores that needs to find out whether a specific TV is in stock.
"If a customer enters a store and wants a particular TV that's not there, but is in another store, the SMB only knows the exact stock level of that particular item at that time," he says. "The current method to get an update would be to do an end-of-day stock check and submission to the back office, which could risk the customer going to that store to find out the TV has been sold."
"The benefit of IMC is that you don't have to wait for the transaction to complete until you can perform all of the analysis on it and get an update. That can help keep customer dissatisfaction at bay, and of course, loyalty in today's economy is very short lived."

Cloud memory

For businesses unable to afford the on-premise route to deploying IMC, IDC's Lykkegaard says that cloud solutions give SMBs access to the technology without the capiital expenditure. Amazon, for example, offers Business One with HANA database and compute power on Amazon Web Servers for a pay-as-you-go hourly fee.
"Amazon offers small companies the choice of shifting computer tasks, computer intensive work out there to the cloud with very limited cost," he says. "That may allow retailers with the skills to do more exploratory work, or assist smaller specialised companies servicing larger ones."
"It's all about this democratisation of in-memory computing that is happening right now with the ability to purchase computing power and software in very small increments."
Gatner's Pezzini says that many SMBs are also already likely to be using IMC though subscriptions to software-as-a-service (SaaS) cloud services.
"Quite a lot of SaaS applications are based on in-memory computing types of architectures," he says. "It means many businesses won't know they're using it explicitly, but it's embedded into certain types of applications, such as logistics, planning and other things of this nature."
Pezzini gives the example of Workday, the cloud-based financial and human capital management soutions provider, which is built on an in-memory architecture.
"In-memory computing enables Workday to implement functionality and provide the scalability and performance that would be very hard to implement using traditional architectures," he says. "They don't market the fact that they use the technology or give users a choice of whether they want it or not. It's just there."
IDC's Lykkegaard adds that cloud-based social media monitoring services, which allow businesses of any size to instantly analyse Twitter and Facebook activity, are also driven using IMC technology.
"This is another way of how these small enterprises will start to use in-memory computing," he says. "It's just going to be increasingly under the hood of some of these services and software that they are already using."

Tuesday, 11 June 2013

First look: Mac Pro

WWDC 2013 Apple isn't done innovating just yet


By  | TechRadar.com


First look: Mac Pro
Apple staging a revolution of its own with the new Mac Pro

While Microsoft and Sony were busy readying next generation console reveals on Monday, Apple was prepping for a next-gen reveal all its own.
During its Worldwide Developers Conference, Apple unveiled the long-awaited new Mac Pro desktop, complete with a drastic and stylish redesign.
Of course, style isn't everything, and the Mac Pro packs a lot of punch into its diminutive cylindrical frame, which Apple claimed would provide "breakthrough performance" at one-eighth the size of current Mac Pros desktops.
Let's take a closer look at just what makes the new Mac Pro a desktop worth getting excited about.

Mac Pro: what's under the hood?

Mac Pro
Inside Apple's short stack (credit: Tech Crunch)
Apple wasn't squeamish about breaking the Mac Pro open to give everyone a glimpse at the innards powering the 9.9-inch desktop.
The Mac Pro brings the noise with Intel Xeon E5 processors, which in turn are capable of supporting up to 12 core configurations to deliver two times the floating point performance.
Coupled with a pair of AMD FirePro workstation-class GPUs, the new Mac Pro is more than ready to handle up to seven teraflops of computations, and delivers speeds more than two times faster than current generation Mac Pros.
Mac Pro
Bask in the Mac Pro's obelisk-like stature
More impressively, Apple is including 1,866MHz DDR3 RAM in the revamped Mac Pro, which gives it the ability to deliver up to 60GBps of memory bandwidth.
With that kind of power, the Mac Pro is a filmmaker's dream, as it's able to render full-resolution 4K video, while also working out rendering effects on the side.
All of this hardware is built around a unified thermal core, which will give the Mac Pro the advantage of distributing that thermal capacity across all the processors evenly.

Mac Pro: Ports galore

Mac Pro
A port for any storm (credit: Tech Crunch)
A desktop wouldn't be any good without a plethora of ports, and the Mac Pro has them in spades.
There are six Thunderbolt 2 ports, each capable of supporting six daisy-chained devices, meaning you could have up to 36 different external devices hooked up to the Mac Pro with ease.
Add in the fact Thunderbolt 2 allows for up to 20GBs of bandwidth to each plugged device, and you've got yourself outstanding external performance almost unheard of to this point.
Even if you don't have a wealth of Thunderbolt 2-compatible external hard drives or displays, the Mac Pro's ports are completely backwards compatible with existing Thunderbolt connections, meaning you won't have to upgrade every last device you already have.
Mac Pro
It's all very 2001

Mac Pro: Apple murky on release date

While specifics about an exact drop date and price for the Mac Pro haven't been divulged, Apple is planning on releasing the black beauty later this year.
It's been a while since Apple's dropped a desktop this revolutionary on consumers, and we can't wait to see what the Mac Pro is actually capable when we get our hands on one.
After all we've seen so far, we're inclined to believe Apple when it calls the Mac Pro "the most radical Mac yet."

Thursday, 6 June 2013

Intel betting big on gesture, voice and biometrics

COMPUTEX Puts $100 million in the pot


By  | TechRadar.com



Intel betting big on gesture, voice and biometrics
Intel believes gesture controls are the future


Intel is preparing for the future by betting big on gesture and voice controls, biometrics, and other "perceptual" computing technologies, according to a new report from Computex.
Intel will invest $100 million over the next two to three years in companies that make breakthroughs in these areas, the Wall Street Journal learned at the Taiwanese trade show.
No doubt the company hopes to ride the crest of a wave of such technologies dropping soon, the most recent example being Microsoft's highly publicized Xbox One game console.
"The idea of the $100 million fund is you go find companies that have those kinds of innovative breakthroughs and help get them to work," said Intel's Asia-Pacific Vice President Gregory Bryant.

The future is hands-free

Other technologies Intel will focus on include imaging and emotion sensing, the WSJ reported.
The site added that Intel is already working with a firm called Creative Technology on 3D cameras for PCs that will go on sale this year, as well as with other hardware manufacturers on getting depth-sensing 3D cameras built into devices.
But Intel executives wouldn't mention any specific companies that will benefit from the $100 million fund, according to the WSJ.
Last year Intel announced it was working with Nuance, makers of Dragon dictation and speech recognition software, on new software for Intel laptops.

Monday, 3 June 2013

Magic Quadrant for Mobile Device Management Software - BlackBerry

23 May 2013 ID:G00249820

Analyst(s): Phillip RedmanJohn GirardTerrence CosgroveMonica Basso | Gartner


Market Definition/Description

Enterprise mobile device management (MDM) software is: (1) a policy and configuration management tool for mobile handheld devices (smartphones and tablets based on smartphone OSs), and (2) an enterprise mobile solution for securing and enabling enterprise users and content. It helps enterprises manage the transition to a more complex mobile computing and communications environment by supporting security, network services, and software and hardware management across multiple OS platforms and now sometimes laptop and ultrabooks. This is especially important as bring your own device (BYOD) initiatives and advanced wireless computing become the focus of many enterprises. MDM can support corporate-owned as well as personal devices, and helps support a more complex and heterogeneous environment.

Magic Quadrant

Figure 1. Magic Quadrant for Mobile Device Management Software
Figure 1.Magic Quadrant for Mobile Device Management Software
Source: Gartner (May 2013)

Vendor Strengths and Cautions

BlackBerry

One of the new entrants in this Magic Quadrant this year, BlackBerry is a global public company with headquarters in Waterloo, Ontario. It ended its fiscal year in February 2013 with $11.1 billion in sales, including $4.2 billion in software and services. BlackBerry's focus has been on developing the new BlackBerry 10 (BB10) devices to compete with existing smartphone platforms. The vendor launched its first cross-platform MDM server, called Mobile Fusion, after the last Magic Quadrant research was developed, so it did not qualify. Its latest MDM product was released in January 2013 as part of the BlackBerry Enterprise Service 10 (BES 10) announcements to support the new devices. BES 10 has limited experience supporting non-BlackBerry devices, but still leads the way for mobility management based on its own platform. Although there hasn't been much adoption of cross-platform MDM from BlackBerry, there has been significant interest among its core base. Its success in MDM will rely on uptake of the new BB10 devices and the updating of older versions of BES to BES 10. BlackBerry is not considered much of an innovator in cross-platform MDM; although it does manage Android, it does not yet support advanced Android APIs from Samsung Safe-certified devices, but does have the strongest offering to manage and support BlackBerry devices. Although some vendors offer limited BlackBerry device support, these devices have a closed system that doesn't allow deep support outside the devices' own servers. BlackBerry has also created a unique and secure way to route MDM traffic through its infrastructure, eliminating the need to use a separate VPN. BlackBerry is positioned in the Niche Players quadrant and should only be considered for BlackBerry management or for cross-platform if iOS is needed and BES 10 has been purchased.
Strengths
  • BlackBerry has designed an easy upgrade path to support BB10 devices by which current BES 5 customers can get a free upgrade, with over 12,000 installs of BES 10 by May 2013.
  • BlackBerry supports basic iOS and Android device policies equal to other MDM vendors and provides industry leadership functionality for its own devices.
  • The containerization of BlackBerry devices, called BlackBerry Balance, is the best example of the separation of corporate data from personal data while retaining a strong user experience.
Cautions
  • BlackBerry has been more focused on policy management and the management and enablement of cross-platform enterprise mobility than on mobile content management. It still requires a third-party partner to provide extended Android support.
  • Combined with BlackBerry device support, cross-platform MDM can get very expensive and it does not have a cloud offering or partner.
  • BlackBerry uses third-party solutions to secure and containerize iOS and Android.

Evaluation Criteria

Ability to Execute

Gartner analysts evaluate technology providers on the quality and efficacy of the processes, systems, methods or procedures that enable IT provider performance to be competitive, efficient and effective, and to positively affect revenue, retention and reputation. For MDM, this involved providing on-premises-based or SaaS/cloud delivery capability, with the required number of features to manage the software, security and hardware of a midsize or large (more than 1,000 devices) organization. We also look for diversity in channel support and operations capability, and the ability to support a global organization.
Table 1. Ability to Execute Evaluation Criteria
Evaluation Criteria
Weighting
Product/Service
High
Overall Viability (Business Unit, Financial, Strategy, Organization)
High
Sales Execution/Pricing
Standard
Market Responsiveness and Track Record
Standard
Marketing Execution
Standard
Customer Experience
High
Operations
Standard
Source: Gartner (May 2013)

Completeness of Vision

Gartner analysts evaluate technology providers on their ability to convincingly articulate logical statements about current and future market direction, innovation, customer needs, and competitive forces, as well as how they map to the Gartner position. Ultimately, technology providers are rated on their understanding of how market forces can be exploited to create opportunities for the provider, which is especially important in a diverse mobile world, with no platform standardization, a quickly moving market and rapidly changing technology. MDM providers should have a significant vision of the evolving market, including software delivery methods, innovative and differentiated features, and geographic sales diversity.
Table 2. Completeness of Vision Evaluation Criteria
Evaluation Criteria
Weighting
Market Understanding
High
Marketing Strategy
Standard
Sales Strategy
Standard
Offering (Product) Strategy
High
Business Model
Standard
Vertical/Industry Strategy
No Rating
Innovation
High
Geographic Strategy
Standard
Source: Gartner (May 2013)

Quadrant Descriptions

Leaders

Leaders demonstrate balanced progress, effort and clout in all execution and vision categories and are the first to envision, develop and launch new MDM features, partnerships and strategies. If they are not among the leading MDM providers in sales, they are, at a minimum, the most critical competitive threats to their peers in open competition. A leading vendor is not a default choice for all buyers, and clients are warned not to assume that they should buy only from the Leaders quadrant. To stay on the right side of the chart, Leaders (and Visionaries) must offer features that remove significant roadblocks to the complex challenges that enterprises face when attempting to treat mobile consumer devices as business tools. One example of a competitively disruptive activity might include delivering a sandbox method to prevent data leakage between personal and business applications. Another is the ability to support enterprise and third-party applications, provide a deeper security capability, and actively partner for technology capabilities.

Challengers

Challengers have attractive products that address the typical baseline needs for MDM, with competitive visibility that is strong enough to demand attention in RFPs, but may not show up as often, nor win as many clients as Leaders. Challengers may win contracts by competing on a limited selection of functions or a limited selection of prospective buyers by industry, geography or other limiting factors, even if, on speculation, their products have broad functions. They may be perceived as a threat by other vendors, but that threat will be primarily focused on a limited class of buyers, rather than the MDM market as a whole. Challengers are efficient and expedient choices for defined access problems.

Visionaries

Visionaries are able to demonstrate long-term strategies for MDM that point to the product and service approaches that will be most competitive in the future. Visionaries might affect the course of MDM, but they lack the execution influence to outmaneuver Challengers and Leaders. Also, Visionaries may not have the funding nor the capability to scale their businesses and provide robust operations and customer support. Marketing and mind share are also weak areas for Visionaries. Buyers may pick Visionaries for best-of-breed features, and for broader infrastructure investments than Niche Players. Smaller vendors may take risks on potentially disruptive technologies, while larger vendors may be in the process of building out their next-generation portfolios. Buyers of Visionaries' products may base their selections on specific technology features and by participating in the vendor's road map.

Niche Players

Niche Players meet the typical needs of buyers, and fare well when given a chance to compete in a product evaluation, but are usually smaller, and many buyers may be unaware of their services. Larger companies in the Niche Players quadrant may not have fully articulated a vision or strategy, and may have fallen behind the competition as the market moves forward. They may not be as invested in the MDM market as other companies, and are focused on more of their core market offerings. Niche Players generally lack the clout to change the course of the market or have not yet made the investment to do so. They may offer an uncommon delivery mechanism for products and services. They may rely on a self-limiting business model, and/or have limited influence outside of a particular industry or geography. Niche Players may target clients that, for various reasons, prefer not to buy from larger network players. In many Gartner market studies, buyers report that Niche Players tend to provide more personal attention to their needs.

MDM Market Data
MDM has seen rapid growth during the past two years as companies have adopted more consumer-designed smartphones and are looking to enforce policies across multiple mobile OS platforms. In 2012, Gartner saw license revenue run to $784 million worldwide, and it is expected to rise to over $1.6 billion in 2014. Of that, 83% of lines were managed in on-premises servers, with cloud accounting for 17%, up from 5% in 2011. Although penetration has hit about 30% in North America, it is still growing and is much lower in other regions. The additional growth in smartphones, tablets and BYOD is driving adoption of MDM and will continue to do so for the next few years at a similar rate. The expansion into additional security products, such as DLP, containerization and VPN, as well as mobile content management areas, such as EFSS and MAM-like app stores, will continue this growth.
Increased competition, the movement toward cloud services and the impact of larger MDM companies will continue to put pricing pressure on this segment. In 2012, Gartner saw per-seat pricing decrease by up to 30% on average from the beginning to the end of the year. Increased product expansion into mobile software and content management can delay this in 2013, but continued competition on a global basis will push pricing in a downward trend. Potential mergers and acquisitions could delay some of the pricing pressure.
As in previous years, North America has seen the biggest number of MDM sales in 2012, with 65% of revenue gained in North America. Western Europe was second, at 17%, with the rest of the regions in single digits. Financial services led the way with 25% of sales, followed by manufacturing and healthcare and government. MDM is also being adopted by companies of all sizes, with over 70% of sales at 500 seats or lower. Gartner expects continued adoption and growth in all segments through 2014.
MDM Market Drivers
The growth of consumer-based devices in the market continues, with 63% of companies in North America planning for iOS to become the primary platform in the next 12 months.1 Android, the most popular smartphone platform (see "Forecast: Mobile Phones, Worldwide, 2011-2017, 1Q13 Update"), at 50% market share for both the consumer and business markets at year-end 2012, has under 20% in enterprise-only market share today, which varies based on region. However, Gartner believes that, by 2016, over 40% of enterprise-supported mobile devices will be Androids, so cross-platform MDM will be in even greater demand. The drive for many companies to support individual users' mobile devices (both smartphones and tablets), as well as to secure corporate data and support mobile users, are the primary drivers for MDM adoption.
MDM is typically introduced as a method to implement and support mobile data security on smartphones and tablets. Most adopting companies are already supporting basic mobile device policies through EAS (see Note 2) before they adopt a more thorough MDM solution. This is because they are looking for more detailed mobile data security capabilities and are looking to support more-complex mobile computing and communications processes. For 2013 and beyond, the main trends will be:
Security Trends
  • Application-based VPN — Using a VPN for every app transaction can drain battery life and also increases data traffic for nonbusiness needs. There is a movement to enforce application-based VPN on business apps to guarantee security.
  • Data containerization — Companies are assessing the opportunity to separate business data from personal data, either by application or by putting it into separate workspaces, as a way to increase data integrity and management, while affording additional privacy to personal data. This is especially important for BYOD programs.
  • NAC — The use of NAC and identity management with MDM is to enforce segmented policies, and can use the network to allow, deny or grant limited access to devices, based on their compliance with these policies.
Mobile Enablement Trends
  • EFSS — These offerings enable productivity and collaboration for mobile workers who use multiple devices by allowing file sharing for internal and external use. Consumer-grade products are dominant today, but enterprises are evaluating solutions that will afford them increased data security and management.
  • App catalog — Companies are looking for solutions that will provide access to secure and manageable third-party apps commonly found in application markets, but want to be able to add enterprise policies and controls. MDM providers are partnering with ISVs and third-party app developers to configure enterprise-grade apps and provide them in an extensive app catalog. An app store is used independent of the apps available in a catalog.
  • Application provisioning and support — As part of a total mobile software management solution, enterprises need the ability to provision and support third-party, ISV and enterprise mobile applications. Many want an easier way to support apps across different types of users, with multiple policy possibilities. MDM is well-positioned to provide this as part of advanced mobile app management capabilities.
  • Application virtualization — Also in the app area, companies are assessing the use of mobile workspace aggregation, where the app would run in the cloud versus on the endpoint. While this is compelling because it would reduce the need for app customization based on the mobile platform, it would require an optimization of the app to run in the network as well as require increased network access. Offline requirements are also important when mobile users are disconnected, but still need access to data.
There are many vendors to choose from and the MDM software Magic Quadrant is the guide to use to help create a shortlist of MDM vendors to assess. Not all MDM vendors could be included in the deeper assessment if they did not meet the inclusion criteria. These vendors are listed in Note 3; they were not included in the Magic Quadrant, but have some type of MDM offering.
The Future of MDM and Enterprise Mobility Management
As companies support mobile users, devices and content, the challenge of putting together an enterprise mobile solution continues. Because of the lack of standardization in mobility and the fact that users have different mobility profiles and application requirements, there is no one size fits all when it comes to providing this mobile solution. Today, enterprises often have to sew together a number of point solutions to enable a mobile solution. Often, those point solutions come from a nonmobile legacy and are not optimized for mobility, leading to a poor user experience and an expensive option that is underutilized.
As MDM adoption grows, it is expanding out of a pure policy management function to incorporate an enterprise mobile management and enablement solution. Many companies see the MDM platform as the main tool to both implement and manage a mobile solution. Since the EMM concept was introduced by Gartner last year, MDM has evolved to become a broad system management offering, what we call enterprise mobility management. This entails many of the services for optimizing and enabling mobile applications and data on the device, as well as for ensuring the security of that data. Many products are still evolving in this area, but it will be the primary focus of many MDM providers during the next few years.
Additional research contribution and review: Song Chuang, Bryan Taylor, Ken Dulaney, Leif-Olof Wallin