EBF Blog

Finanz Informatik Chooses Teamwire as Secure WhatsApp Alternative

Finanz Informatik, based in Frankfurt am Main, is the IT service provider of the Sparkassen-Finanzgruppe. Its customers include hundreds of savings banks, eight state banks, DekaBank, eight state savings banks, public insurers as well as other companies of the Sparkassen-Finanzgruppe and the financial sector. Finanz Informatik offers comprehensive IT services – from application development, infrastructure and datacenter operation to consulting, training and support. With OSPlus, the company now represents one of the leading global banking systems for the German market.

Finanz Informatik is responsible for the service for 120 million bank accounts; on the computers and systems, more than 108 billion technical transactions are carried out annually. At the end of 2016 the company had about 3,200 employees. The revenues of Finanz Informatik together with the subsidiaries amounted to around 1.8 billion euros.
Continue reading

How To Improve Your Mobile Development Results

Mobile web sites are a growing design issue. According to StatCounter GS, mobile web access has risen to 36.54% in the United States as of January 2017.


shutterstock
Internationally, according to the same set of statistics, mobile phones have overtaken desktops as the primary means of accessing the internet by approximately 4%.
This means that companies seeking to reach customers need their sites to be easily read and navigated by smaller screens and devices that may not support Java or cookies. But what works best? And what should IT departments focus on when improving or developing mobile sites? Experts on the Forbes Technology Council have this to say:

1. Put Priority Content At The Top

Place high-priority content, such as phone numbers, address or directions, at the top of the website page, so that users can quickly get to it without having to scroll. Don’t fall into the trap of “stacking” low-priority content over high-priority content. – Andrew Kucheriavy, Intechnic

2. Foster An Environment Of Continuous Experimentation And Improvement

Good UI/UX is hard. Don’t imagine you’re going to get it right the first time. Experiment with alternatives as much as you can during development. Consider A/B testing technology that lets you run experiments to evaluate interface alternatives and to respond quickly to the findings. Implement continuous integration and deployment techniques that let you release improvements regularly. – Manuel Vellon, Level 11
Continue reading

Lookout Expands Mobile Endpoint Security Solution to Enhance Productivity Across iOS Enterprises

Introduces enterprise app review to enable iOS-centric enterprises building their own custom apps to rapidly analyze for data policy compliance and security risks

Lookout, the global leader in securing mobility, has expanded its enterprise security solution, Lookout Mobile Endpoint Security, to address the most pressing needs of iOS- centric organizations and accelerate the adoption of secure mobility.

Lookout and Apple understand mobile is transforming the way business is done, and as mobile productivity increases, enterprises are developing their own apps to take advantage of this transformation. As a new Apple mobility partner, Lookout is introducing enterprise app review to enable enterprises building their own iOS apps to rapidly analyze them for data policy compliance and security risks. With enterprise app review, custom iOS apps are uploaded into the Lookout Security Cloud for correlation against a 40-million-app database to uncover anomalies before distribution via internal app stores.

Many enterprises have unique compliance policies that specify how corporate data should be stored and transmitted, including while in use on mobile devices and in apps. Some mobile apps or public Wi-Fi networks compromise company or industry policies. For example, enterprise apps developed by third parties and distributed through internal app stores may lack sufficient encryption to protect customer or patient data.

“Enterprises must be confident that their data is secure while employees are working anywhere in the world,” said Santosh Krishnan, Lookout chief product officer. “This new functionality is addressing mobile compliance as part of our collective mission to help organizations seamlessly embrace mobile productivity in the workplace.”

In addition to reviewing custom apps, Lookout Mobile Endpoint Security can also review apps downloaded from the App Store. While vetted and approved through Apple’s stringent App Store approval process, some apps may send contact or location information to an external server which may directly contradict corporate policy. Plus, with the rise of mobile productivity on the go, employees are frequently connecting to public Wi-Fi networks which could expose corporate data in transit.
Continue reading

A CISO’s job is a hard one

Evolving architecture, management solutions that don’t secure, and dead perimeters.

“You know, when a CSO thinks through priorities — it’s a tough job. [They need to] to balance the kinds of things that require a lot of intense concentration, real deep problems in infrastructure … with the day-to-day things that could be just as important.”
Ed Amoroso would know. Ed served for 12 years as CSO at AT&T and is now the CEO of TAG Cyber. He started his career at Bell Labs in Unix security R&D over 30 years ago.

So many tasks, so little time

A CSO’s job is a constant juggling process — balancing budget, human capital, time, effort, team energy, and many other factors. In recent years, mobile security has been added to the task list. However, as threats like Pegasus come to the surface and as employees use their personal devices to get their jobs done, mobile security is quickly becoming a much bigger priority.

Dealing with mobile security: an evolution

In recent history, a CSO (or perhaps one of her employees) dealt with the security of mobile devices through management. “MDMs are good!” Ed explains in the above video, but CSOs are now actively asking themselves new questions: Do I need to augment my MDM? Should I replace it?

Ed suggests stepping back and understanding the interconnectivity of attacks. Malware, vulnerabilities, risky employee behaviors, and network connections all play into a larger mobile attack surface. Security teams need a holistic sense of what they’re working with: how many mobile devices access corporate data? How reliant on mobile devices are employees? How could you enable their productivity by allowing them to use their mobile devices freely?

“You’ll make a better decision,” says Ed.

If you’re still doing perimeter security, you’re doing it wrong

“To date, we’ve had these perimeter architecture … you’re ‘inside the firewall’ and that’s the worst architecture that you could have in 2017.” – Ed Amoroso

Mobile devices and cloud services bypass the traditional firewall, making it ineffective. End-users, or employees, aren’t slowing down their mobile device usage either. They will do what they want to do: download apps, visit websites, maybe even gamble a little (you’d be surprised). A CSO wants to gain visibility and the ability to mitigate risks to their corporate data, not to become the blocker who says, “No.” CSOs who implement the right kind of architecture, that embraces mobile security, becomes the corporate enabler — the person who helps people get their jobs done.
Continue reading

Top 5 Wireless Expense Areas Every Company Should be Monitoring

With so many devices to manage, it’s hard for companies to keep track of how much each device costs while focusing on the employee at the center of the mobile program.

wireless expense areas
Many companies are slowly shifting the mindset around their mobile policies from being cost-driven to productivity-driven — with so many balls in the air, it is hard enough to manage one bill let alone hundreds or even thousands of bills.

As the enterprise mobility landscape continues to evolve with company paid devices, personal devices, and hybrid programs, IT and finance managers often struggle to make sure mobile policies and programs are the most cost efficient for the company. With so many factors contributing to the bottom line of wireless costs, what exactly should companies be watching?

Here are five areas that we think companies should be monitoring to make sure they are managing their wireless cost effectively:

  • Billed lines by carrier: Your company should know how many lines of service you have on each carrier. This information is helpful when your company considers adding additional lines of service or are adding or migrating a number of devices.
  • Wireless charges breakdown: Understand how much of your mobile spend lies in recurring charges, non-recurring charges, taxes and surcharges. Be sure to include a breakdown of voice, data and text costs by carrier. This information will give you the true anatomy of your wireless costs and allow you to figure out where you need to tune up your program.
  • Average charges per billed line: It’s extremely helpful to know how much one of your company’s devices costs per month on average. Not only can you benchmark your average wireless cost against other companies, but you can understand the true cost of your mobile employees.
  • Total charges by carrier: Here’s an obvious one: Do you know how much your company is paying each carrier every month? I bet your CFO would love to know.
  • Breakdown of additional charges: This is the BEST one! You need to know how much all of the surprising costs — from data overage charges and 411 calls to ringtones and downloads — are coasting you and where they’re coming from so you can make them stop!
  •  

    Source:Troy Mobility

MobileIron and incapptic Connect Automate Mobile Apps for CLAAS

We’ve reduced handling in the different stages of the app lifecycle by two to three hours, says Stephan Niewöhner, Project Manager Mobile Applications, CLAAS KGaA mbH.

MobileIron is helping the international agricultural machinery manufacturer CLAAS to automatically publish and update mobile apps, using incapptic connect´s mobile release automation technology. Therefore, the departments that initiates and uses the apps can publish and implement new ones, and maintain existing ones, without outside help. This makes it more cost-effective for CLAAS to handle new and existing apps.

More than just one of the world’s leading manufacturers of tractors and harvesting technology, the CLAAS group has also pioneered the use of mobile digital processes. Mobile business apps play a key role in all of the company’s departments: there are nearly thirty apps in use, largely initiated by the departments themselves. “Around 2,500 people are using our main apps on their iPhones and iPads,” says Stephan Niewöhner, Project Manager for mobile applications at CLAAS KGaA mbH.

The group operates some 3,000 mobile devices on MobileIron’s Enterprise Mobility Platform, of which 2,500 are running iOS, 500 using Windows Phone 8.1, and a small number with Windows 10.

The platform has been managed since 2012 by Cologne-based mobile IT specialist EBF GmbH, using its hosted core model. This includes 24/7 helpdesk services, second-and third-level support from EBF specialists and administrator support.

The MobileIron platform provides CLAAS with a solid foundation for the company’s mobile devices, apps, and data from unauthorized access and ensures compliance with administrative guidelines. Business-critical data transferred between mobile devices and backend systems are securely encrypted.
Continue reading

Lookout in Vanity Fair: The real story behind Pegasus and Trident

For those of us that work with threats, vulnerabilities and exploits on a daily basis, it’s always interesting when we see security make it to the mainstream – in tv shows and movies – with a varying level of accuracy.

So I was excited when Vanity Fair asked to interview my Security Research & Response team at Lookout to understand the story behind the discovery of Trident and Pegasus in October of last year.

lookout-team

READ THE REAL PEGASUS STORY

What they came out with is a fascinating look at security – from the beginnings of “Spot the Fed” games at DefCon, to large scale companies being hacked and the emergence of White Hats, Black Hats and zero-day bounties, along with an in-depth look at how Lookout and Citizen Lab came across Pegasus and how we investigated its capabilities.

This is worth the read if you’re interested in learning more about the world of cyber-arms dealing and how a security team goes about analysing a threat. And if you want to know more about the facts behind Pegasus and how to protect your organisation, watch this on-demand webinar I presented shortly after the discovery or read my latest blog.

Mike Murray
Vice President, Security Research & Response

Gartner Market Guide for Mobile Threat Defense

The risk to your organisation from mobile devices has increased.

Is your enterprise prepared to protect against mobile threats?

As a result, Mobile Threat Defence (MTD) solutions are being adopted by enterprises concerned about threats that cannot be countered with traditional mobile management tools, such as EMM. Now is the time that security and mobility leaders need to evaluate MTD solutions to mitigate attacks and address threats to mobile devices, networks and apps.

Read the Gartner Market Guide for Mobile Threat Defense to better understand why:

  • A period of significant change is occurring due to shifting enterprise threats and evolving MTD technology
  • Enterprise adoption of MTD solutions is expected to triple by 2018
  • Mobile policy enforcement won’t be a sustainable workaround for mobile security
  • Device behavioural anomalies, vulnerability assessments, network security & app scan are the four MTD solution must-haves

Read the full Gartner Market Guide for Mobile Threat Defense: Here

Lenovo and MobileIron Form Global Partnership to Deliver Security and Management for Modern Operating Systems

MobileIron, the security backbone for the digital enterprise, announced a global partnership with Lenovo to help enterprise customers secure and manage Windows 10, Android, and iOS devices simply and efficiently.

Using MobileIron’s EMM platform with select Lenovo PCs, customers may be able to decrease the total cost of PC ownership by up to 80 percent.* According to the latest numbers by IDC, Lenovo is currently the biggest PC supplier in the world. MobileIron is the security backbone for the digital enterprise, protecting corporate data across apps, networks, and clouds.
 

Lenovo has previously provided security and management software to large business customers; however, to secure devices running modern operating systems, like Android and Windows 10, customers need new software. Now, Lenovo customers can purchase MobileIron’s comprehensive security and management platform at the same time as Lenovo PCs, tablets, and smartphones. This one-stop shopping also simplifies bring-your-own-device (BYOD) because applications can be securely provisioned. Lenovo, MobileIron, and its reseller partners will provide expert services to deploy across the global enterprise.

The addition of MobileIron’s security and management platform rounds out Lenovo’s Modern Enterprise Computing Portfolio: a collection of offerings that provides modern computing, security, and infrastructure products. In October 2016, Lenovo introduced the Unified Workspace Cloud to provide employees with simplified access to their company’s complete portfolio of applications and content via single sign-on, on any device, anytime, anywhere. Later that month, the company launched its ThinkAgile portfolio to help customers transform their data centers with IT offerings that are appliance-centric, pre-validated, and pre-integrated. This gives customers quick implementation time for maximum value and agility in an easy-to-use solution. Now MobileIron Lenovo customers can choose cutting edge devices like the Yoga convertible and the MotoZ smartphone, deploy a customized workspace with the Unified Workspace Cloud, secure the endpoint with MobileIron, and modernize their data centers with ThinkAgile solutions.
Continue reading

Enterprise Mobility: Key Investment Drivers for 2017

Enterprise mobility has become an essential part of remaining competitive.

In its summary of last year’s biggest trends in business technology, BizTech Magazine cites, “A business without an enterprise mobility strategy is missing a critical part of its IT battle plan.” The benefits of mobility can be seen across all aspects of the enterprise, making the answer to where to start a bit difficult for some.

Enterprise Mobility Exchange in partnership with VDC Research, released the list of top investment drivers for enterprise mobility in 2017. Obvious ones like improving productivity and reducing operating costs offer no surprise. You needn’t be a mobility expert to see those key benefits. What is interesting about this list are the bottom five drivers of investment, which include: faster cash cycles, more accurate billing, reducing asset failures, improving employee satisfaction and retention, and improving customer loyalty and repeat business. Based on what we’re seeing with our customers who have already started deploying mobility in their organizations, we believe that these benefits will increase as key drivers over the next two years.

 

Source:  Enterprise Mobility Exchange, VDC Research December 2016

 

Collectively, these drivers ensure a company’s success, which is why we’re seeing more of our customer base create micro apps that deliver on these key business needs.

Faster Cash Cycles

For retailers and manufacturers that need proof of delivery before they can invoice, mobility can speed up the process by days and even weeks through mobile forms with signature capture that can be directly input into the company’s ERP system. The result saves having to wait for drivers to return back to the home office with paperwork and subsequently enter data manually into the application.

More Accurate Billing

Companies with service technician teams often rely on pen and paper or phone calls into back office admins to record their hours by project. Most of the time, hours are recorded after the project has been completed which results in missing time and therefore inaccurate billing. Mobile time entry makes it quick and easy to record hours-by-project in real-time.

Reducing Asset Failures

As new technologies make proactive and predictive asset management possible for equipment such as cell towers, mobility can help with speeding up repairs. Alerts and access to key information such as equipment locators, outage dashboards, spare parts finders, and safety check-ins are just a few examples of mobile workflows that field operators can be armed with.

Improving employee satisfaction and retention

Half of our customers have deployed HR-related micro apps as a way to support employee self service initiatives to make for enhanced employee satisfaction and retention.  Attracting and retaining Millennials, and the sheer cost of employee turnover makes employee engagement a top priority. Benefits enrollment, PTO, job application submissions, pay rate submissions and approvals, and employee appraisals are a few of the HR use cases  that are enhancing employees’ experiences with business applications.

Boosting customer loyalty and repeat business

We’re seeing many companies mobile-enable workflows that aid with customer experience – be it easy account access and information look-up, to sending relevant timely promotions.  In addition, many of our customers in B2B companies are mobile-enabling their sales teams and other customer-touching employees with back office information and transactions such as purchase orders, proof of delivery, sales discounts, etc. to provide information to customers quickly.

At Capriza, we have we have helped 100+ enterprises mobile-enable their workforce, partners, and customers with these workflows and more. We expect that these five drivers will be moving further up the key driver list throughout 2017.

Read More