GPS Tracker – Vehicle Fleet GPS Tracking #gps #car #tracker, #vehicle



Rewire Security offers effective smart GPS trackers packed with everything you will need to start tracking your vehicle. “GPS Tracking bundles” include data SIM card and 1-year GPSLive vehicle tracking platform subscription pre set-up to get you started faster than ever. Reliable Vehicle Security, Vehicle CCTV and GPS tracking solutions in the United Kingdom for cars, motorbikes, boat, bus and van tracking.


We do not require you to sign any contracts. you get the tracking device for a fixed cost after a one-time payment and start/stop tracking whenever you want. Additionaly, we offer annually pre-paid; GPS tracking bundles packed with a tracking device, SIM card and annual GPSLive software subscription. Rewire Security supplies the UK’s most distinct yet affordable GPS Tracker s and tracking software.


Locate people, assets or vehicles in real-time, anywhere on the planet using GPSLive software on PC, tablet and smartphones. Annual GPSLive subscription costs £20 and include 1-year full access to Cloud Tracking Platform. Apple IOS APP and Android APP. GPSLive Mobile app displays live location of your assets updated every few seconds along with access to route history and event alerts.


For businesses with vehicle fleets, we offer advanced GPS vehicle tracking devices with integrated chips that provide GPS GALILEO GLONASS satellite connections and feature telematics functions such as mileage reports. remote immobilisation. fuel level sensor, driver identification. system notification alerts, detailed usage reports (PDF, Word document), driver behaviour management and more.


Posted In: NEWS

Tags: , , , , , , , , , , , ,

Leave a Comment

Venture Capital Funds in Israel, medical device venture capital firms.#Medical #device


Israel Science and Technology Homepage

To re-sort the list, click a column heading.

Fields of investment

Computers, communications, internet.

Telecom, Datacom, energy distribution and basic industry.

IT, Telecommunications, Healthcare, and Services.

Seed and early stage companies in Internet and information technology.

Water, agriculture and clean technologies. Agro-biotechnology.

Communications, information technology, medical devices, materials engineering.

Internet infrastructure, software, communications.

Enterprise software, networking equipment, semiconductors, mobile computing.

IT, biomedical companies, communications.

Venture capital arm of Merck covering healthcare, life sciences, advanced materials and beyond.

Digital media, communications, enterprise software and services, clean tech, healthcare, biopharmaceuticals, medical devices, diagnostics.

Early stage high tech ventures. Medical devices and life sciences. HomeLand security.

Information Technology: Software, Telecommunications, Internet, Media, Semiconductors, Consumer Electronics.

Telecommunications, networking, Internet infrastructure and enterprise software.

Communications, Machine Vision, Semiconductors. Medical Devices, Biotechnology and Healthcare.

Mature mid sized Chinese companies in high growth industries of IT, consumer electronics, healthcare and cleantech.

Biotechnology, biopharmaceutical companies.

IT, Medical technologies, communication, software, Internet and semiconductors.

Communications, semiconductors, imaging, software, biomedical informatics.

Textile, software, consumer electronics, power generation, communication, automotive, food and plastics industries.

E-business, enterprise software, communications and convergent media.

IT, Communications, Semiconductors, Industrial Equipment, and Medical Technology.

Communications, enterprise software, cellular and wireless Infrastructure, storage systems.

Corporate finance services and technology venture capital fund management.

Life sciences, pharmaceuticals, medical devices. Software, electronics, communications.

Clean-tech, medical devices and software.

Agro-technology, aquaculture, nutrition, food industry.

Enterprise software, semiconductors and communications.

Software, medical equipment, pharmaceuticals, communications, internet, hardware.

Information technology, communications, life sciences, and industrial equipment.

Software, Data Center, Cloud & IT Infrastructure, and Perceptual Computing opportunities in Israel.

Investment exclusively in Biotech companies developing drugs at or near clinical stages.

Software, hardware and materials technologies related to alternative and renewable energy and fuels, energy efficiency, water resource management and waste water treatment, pollution mitigation and sustainable agriculture.

Medical devices, biotechnology, pharmaceuticals and medical-related IT.

Information technology, medical technology, semiconductor industry, industrial equipment, homeland security, life sciences.

IT, Communications, E-commerce, B2B, Digital imaging, Semiconductors, Life sciences.

Communications infrastructure technology, wireless data, optical systems and components. Medical devices and biotechnology.

Enterprise software, semiconductors, materials, communications.

Communications, semiconductors, healthcare.

Early-stage investment fund in the areas of media, enterprise software, mobile telecommunications and Internet companies.

E-commerce, Cloud solutions, networking, software.

Early stage communication and semiconductor technology .

Biotechnology, inspection and advanced electronics.

Medical devices and bio-pharma technology.

Advanced materials, industrial processes, chemicals, bio electronics materials and materials for life sciences.

Service company that specializes in obtaining and managing public funding for technological research and development.

Early stage high-tech companies with emphasis in life sciences, telecommunications, information technology, clean tech and energy.

Medical devices, software. Seed and early stage companies.

Telecommunication, data communications, semiconductors, Internet infrastructure, medical devices and biotechnology.

IT, E-commerce, multimedia software, telecommunications, electronics.

Communication, Network Security, Software, IP Telephony, Internet, Intranet, E-Commerce.

Semiconductor equipment, medical equipment, communications.

Mid-stage life science technologies and services, with a concentration on therapeutic medical devices.

Life science and medical devices.

Communications and Information Technology.

Communications, software, semiconductor

Life sciences, medical devices, new indications of approved drugs, and drug-device combination products.

Equity fund investing primarily in Israeli companies traded in international markets.

Telecommunications technologies, QOS/VPN/CDN, OSS-NMS, mobile datacom and 3G, multimedia streaming, optical networking, system- on-chip, LAN WAN servers, and storage networking.

Communications, enterprise software, internet, medical devices and software.

Communications, Software, Internet.

Communications, medical devices, software and Internet infrastructure.

Renewable energy, alternative fuels and energy efficiency. Water related technologies such as water purification.

Software, semiconductors, communications, electronics and medical equipment.

Early stage Israeli startups in the areas of Telecom, Internet, Media and Entertainment.

Internet, network communications and healthcare.

IT, communications hardware and software and semiconductors.

Early stage, sector focused Israeli technology.

Technology oriented private equity investment group.

IT, Internet infrastructure, communications, software, healthcare technologies especially medical devices and biotechnology.

IT and medical devices.

IT: Information Technology including software and multimedia


Posted In: NEWS

Tags: , , , ,

Leave a Comment

BlackBerry Repeats as a Leader in Gartner 2017 EMM Magic Quadrant


BlackBerry Repeats as a Leader in Gartner 2017 EMM Magic Quadrant

The BlackBerry Secure story keeps getting better. For the second year in a row, BlackBerry was named a Leader in Gartner’s Magic Quadrant for Enterprise Mobility Management Suites. We were one of four EMM vendors to be positioned in the Leader’s Quadrant this year, moving higher in execution and farther in completeness. Download here. or read on.

At BlackBerry, we recognized a while ago that MDM and EMM were not enough for today’s enterprises. Organizations are grappling with securing, managing, and controlling smartphones, PCs, and the coming flood of smart IoT-enabled devices. Our vision is to offer a Unified Endpoint Management platform that lets companies secure and manage all of these devices – plus the associated apps, files and content that reside on them.

So we executed and invested on that vision building and integrating the best technology into an overarching platform that we today call the BlackBerry Enterprise Mobility Suite. This includes our core multi-OS management platform, BlackBerry UEM, as well as a whole lot more: the BlackBerry Work family of productivity apps, the Workspaces document control solution, the BlackBerry Dynamics platform, and more.

Our strategy is being recognized by experts. By 2016, Gartner not only positioned us a Leader in the EMM Magic Quadrant, but we also achieved the highest score in three use cases 1 in the 2016 Critical Capabilities for EMM Suites report. as well the highest score in six out of six use cases 2 in the Critical Capabilities for High-Security Mobility Management report .

We believe our improved positioning not only mirrors our successful transition to a business software provider from a device maker, it also validates our strategy of focusing on securing, managing and connecting the Enterprise of Things by offering the most cutting-edge, comprehensive platform around.

Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

1Regulated Industries Use Case (4.16 out of 5), Application-Centric Use Case (4.29 out of 5), Unmanaged Device Support Use Case (4.33 out of 5)

2High-Security Government Grade Use Case (3.68 out of 5), High-Security Commercial Use Case (3.57 out of 5), Shared Data Use Case (3.64 out of 5), Shared Devices Use Case (3.58 out of 5), Nonemployee Use Case (3.77 out of 5), BYO Use Case (3.73 out of 5)

About Billy Ho

Billy Ho is Executive Vice President, Enterprise Products and Value Added Solutions, for BlackBerry.

QNX Software Helps Carmakers Solve the Backseat Aural Dead Zone

What’s new in BlackBerry UEM Cloud Part 2

Push and BlackBerry Dynamics

How BlackBerry QNX’s Multi-Level Security Can Safeguard Your Car


Posted In: NEWS

Tags: , , , , , , , , , , , , , , , , ,

Leave a Comment

Vehicle tracking system #gps #vehicle #tracker,gps #tracking #unit,gps #tracking,gps #tracking #device,vehicle


Vehicle Tracking System

GPS Vehicle Tracker used to locate vehicle with the help of online software or smart phone. This device combines with a GSM and a GPS Module. The location of the vehicle is collected through GPS and this location data along with other information collected from the vehicle by using different sensors are sent to the central server. A GPRS enabled SIM card is used to communicate between the central server and the GPS Tracking Device. User can login to our online Vehicle Tracking application from their desktop computer or phone and the vehicle information can be viewed on electronic map.

Supported Devices

Major information about the vehicle received from GPS Vehicle Tracker

1) Vehicle Number

2) Date and Time

3) Vehicle Location

6) Status (Stop/Moving etc.)

7) Fuel in tank (in %)

8) A/C on/off status

9) Odometer reading

10) Main battery voltage

11) Temperature inside the vehicle

12) Satellite in view

These information are saved to central server for the period of three months. So user can view history of any date within three months.

Technology used in GPS tracking unit

The GPS tracking device fits inside the vehicle dashboard and captures the GPS location information from satellite and other vehicle information from different sensors at regular intervals to a central server. Update intervals depends on the status of the vehicle. At moving condition the GPS tracking unit sends data to central server every minutes and at stop condition 15 minutes.

Features of Vehicle Tracking application

1) User can see vehicle location as well as various information on electronic map.

2) Set speed limit.

3) Generate various reports of individual vehicle.

4) Create Geofence and get SMS alert upon enter and exit from it.

5) Immobilize vehicle by sending command to GPS tracking unit.

6) Set different alarm condition get alert through SMS.

7) Full control over the GPS tracking device from vehicle tracking application.

8) Fleet management and fleet tracking

Reports generated through vehicle tracking application

  • Performance report i.e day wise total Km travelled, Over speed info etc.
  • Fuel consumption report in graphical format.
  • A/C on/off report
  • Geofencing report
  • History report to view data of any date within previous three months.
  • Performance report i.e day wise total Km travelled, Over speed info etc.
  • Detail report i.e raw report received from GPS tracking device
  • Stoppage report

Uses of Vehicle Tracking System

Vehicle tracking systems are commonly used by fleet owners for fleet management functions such as fleet tracking and security of vehicle as well as driver. Other applications include monitoring driving behaviour, such as over speeding, driving through a wrong route, fuel theft etc.

Vehicle tracking systems can also be used in consumer vehicles as a theft prevention, monitoring and retrieval device. Police can follow the signal emitted by the vehicle tracking system and locate the stolen vehicle. When Vehicle Tracking System used as a security system, it may serve as either an addition to or replacement for a traditional car alarm. Our vehicle tracking systems make it possible to control vehicle remotely, including block doors or engine in case of emergency. The existence of GPS vehicle tracker can reduce the insurance cost, because the loss-risk drops significantly. Our vehicle tracking systems is integrated with several security systems like by sending an automatic alert to a phone if an alarm is triggered by pressing panic switch, main power removing or when it leaves or enters a geofence. GPS Vehicle Tracker also popular in trailer tracking, school bus tracking, ambulance tracking, cash carrying van tracking


Posted In: NEWS

Tags: , , , , , , , , ,

Leave a Comment

How to Add a Device to Google Play Store #google #mobile


How to Add a Device to Google Play Store

When you add a device to Google Play, you can access your previous app, movie, music, book and other purchases on the new device. You can quickly add Android devices by signing in with the same Google account. If you have an Amazon Fire tablet, you can use some workarounds to load the Play Store and access all Android apps. It is not possible to add iOS (iPhone, iPad) or Windows devices to Google Play.

Steps Edit

Method One of Two:
Adding an Android Device Edit

Tap the Settings app on the second device. You can use your same Google account on multiple devices, allowing all of them to access your Google Play Store purchases.

  • You can find the Settings app in your app drawer.

Tap “Accounts. This will display all of the accounts that are currently associated with the Android device.

Tap “Add Account. You’ll see a list of possible accounts to add.

Tap the “Google” option. This will allow you to add a Google account to the device.

Sign in with the same Google account. Enter the account information for the Google account you want to link the device to. You can use the same Google account for multiple Android devices.

Open the Google Play Store. If there are multiple Google accounts on the device, you may be prompted to select the one you want to use.

Tap the Menu (☰) button in the upper-left corner. This will display the Play Store menu and the active Google account in the upper-left corner.

Verify that your newly-added account is visible. You should see the account you just added in the upper-left corner of the settings menu. Tap the account that’s there and select your new account if the wrong account is active.

Access your Google Play Purchases. You’ll be able to see all of the app purchases associated with your account by tapping “My apps games” from the settings menu. You can also tap the different media categories and then select “My media ” to view your purchases.


Posted In: NEWS

Tags: , , ,

Leave a Comment

DreamLover Laboratories – How I became a Male Training oriented Marriage


How I became a Male Training oriented Marriage Counselor

(by Susanne Liu, M.D. for DreamLover Laboratories)

My first clients on “male training”

My name is Susanne Liu and I work as a self-employed marriage counselor. I started to become interested in male psychology in order to help my clients get along in their love and family life. I do not consider myself a feminist; however, as a marriage counselor you often see couples who are desperate to salvage their relationship – especially if they hold shared assets – and you end up trying anything and everything. It is with reluctance that I first recommended a particularly problematic couple to try to resolve their problems with the (back then) controversial approach of “male training”. Both were a little surprised, but other means of reconciliation weren’t working, and because of offshore asset laws and a complicated legal situation they could both stand to inherit a large sum of money if they could go on living together as husband and wife for another few years. So, rather than keep driving each other insane or lose the money, they decided to try out male training. It was my first couple on male training and I too was inexperienced and thought most of this stuff was crazy, so I decided to start out very gently.

The band aid

The husband (James) was given a simple rule: “when your wife Samantha wants you to shut up, she will put a band aid on your mouth, and until she takes it off, you are forbidden from talking, moving or doing anything”. He was to remain still until she decided he could move again. My objective was to diffuse the argument, and avoid escalation; James would shut up, Samantha would chill out, and this male training thing would do its magic. Or whatever. That was the plan.

Initially I expected all of this to blow up: there was no way James would just shut up – they’d get into another heated argument, and they’d be back in no time asking for yet another solution. I’d probably be ashamed for even having proposed this weird technique I read about on usenet. So much for male training. Or so I thought. But I was wrong, very wrong. When James and Samantha returned to my office for their appointment they both had a smile on their face. I asked them what was going on, and Samantha replied that everything was going well, and that the band aid helped them not get into arguments. “Are you serious?” – I wanted to say, but I quickly turned that into a more professional “Are you satisfied with this technique? I knew you would like it”.

I was more excited than them, because I knew this was big. If every one of the techniques I was reading about worked half as good as this one, I would soon fix all my clients’ problems and be out of work!

Samantha explained that they did – as expected – get into an argument. But before it could spiral out of control she remembered about the band aids in her pocket. She walked to James with the band aid in her hand, reminding him that they should at least try to follow my advice, since they were paying for it, and affixed it to his lips as she was instructed. As soon as James’ mouth was taped closed, they both burst into laughter and forgot all about their argument. However, Samantha reminded James about his vow to remain silent and still until she decided he could move again. So, evidently annoyed but ready to try the unthinkable to save his inheritance, James remained still until Samantha returned ten minutes later and removed the band aid.

James and Samantha’s first attempt at male training was amusing more than it was effective, but to my great surprise, this technique which I had thought of as a mere gimmick continued to work session after session. Arguments became less frequent because James naturally yielded to Samantha on most matters.

Male training worked. But I had no clue why. I spent nights researching and reading psychology books, animal psychology books, anything I could get my hands on.

Male training reduces conflict

Eventually, it hit me. Most marital disagreements arise because there is no clear distinction of roles. An argument can never stop because neither party knows who is supposed to win! The simple band aid method created order in Samantha and James’ relationship. It gave Samantha the final word. Once this was an understood reality, the band aid became unnecessary.

Samantha finished her band aids and switched to simply saying “James, shut up now.” – the trick still worked, as both knew that James would eventually give in and become silent until she decided to allow him to speak again.

This was the experience that sold me on male training, and I have since been recommending its introduction (in different forms) in the lives of countless couples, with incredible success.

Male training in the modern age

“A male management system, when combined with a male chastity device, is a formidable tool to set clearly delimited roles in the relationship.”

The practice of deliberate male training has expanded dramatically in recent years, to the point that many now feel it will eventually become commonplace or even institutionalized. The modern woman has a lot more male training choices. One of the most exciting developments has been the invention of the modern “male management system”: a male training apparatus allowing quick and easy control and punishment of your male in a pretty much automated fashion.

A male management system, when combined with a male chastity device, is a formidable tool to set clearly delimited roles in the relationship. Whenever I feel that a clarification of roles would benefit my clients, which is almost always, I recommend them to supplement their male’s chastity regimen with a male management solution by DreamLover Laboratories.

(C) 2008-2017 DreamLover Laboratories – all rights reserved


Posted In: NEWS

Tags: , , , , , , , , , , , , , , , ,

Leave a Comment

BYOD Security: Tips for Reducing Risks #byod #security #software, #what #is


BYOD Security Policies

BYOD: Bring Your Own Device, Secure BYOD Policies and Mobile Management

What is BYOD?

BYOD is short for Bring Your Own Device, a phrase that refers to the practice of allowing employees to bring their own mobile devices to work for use with company systems, software, networks, or information. BYOD has become a huge trend amongst enterprises, with nearly 1/3 of employees using personal devices at workplaces worldwide. 1 BYOD can provide several key benefits to enterprises, including increased productivity, reduced IT and operating costs, better mobility for employees, and higher appeal when it comes to hiring and retaining employees. However, with these benefits comes an increased information security risk, as BYOD can lead to data breaches and increased liability for the organization.

BYOD Security through BYOD Policy

Establishing BYOD security starts with BYOD policy creation. A strong BYOD policy accomplishes several objectives for the organization. BYOD policy should address basic considerations such as the goals of the BYOD program, which employees can bring their own devices, which devices will be supported, and the access levels that employees are granted when using personal devices. Beyond these factors, more in-depth considerations for BYOD policy include:

  • Who will pay for the devices and data coverage required?
  • What regulations (government, industry, or otherwise) must be adhered to when using employee devices?
  • What measures (configuration, software installation, etc) will be taken for securing devices prior to use?
  • Where will data from BYOD devices be stored (locally, in the cloud, etc)?
  • Will there be an agreement for employees that wish to bring their own devices?
  • What happens if an employee violates BYOD policy?
  • What privacy will be granted to employees using their own devices?
  • What support (software updates, troubleshooting, maintenance, etc) will the organization provide for BYOD users?
  • What safeguards are in place if a device is compromised?
  • What methods will be used for securing devices before they are retired, sold, or disposed of?

Once a policy has been created, maintaining BYOD security depends on an organization s ability to educate its employees on BYOD best practices, implement effective device management and support, and enforce BYOD policies. Employees that are not trained on BYOD security will only increase BYOD risks for the organization. Therefore, creating a sound BYOD program must be a collaborative effort between an organization s employees, IT and security teams, and management.

Ten Tips for Securing Devices and Reducing BYOD Risks

These tips should serve as a BYOD security best practices guide for end users and IT/security teams alike. While it is impossible to guarantee BYOD security, following these recommendations will help organizations to mitigate BYOD risks by securing devices.

  1. Use password protected access controls: It may seem obvious, but setting a password/access PIN is a critical first step in BYOD security that many users choose to ignore. Passwords should be unique for each device/account and should not be generic or easy to guess.
  2. Control wireless network and service connectivity: Wi-Fi and Bluetooth connectivity should be turned off when not in use, and employees should only connect their devices to trusted networks. Devices should be set to prompt users before connecting to networks so that employees aren t unknowingly connecting to unsafe networks.
  3. Control application access and permissions: Many devices have built-in access control features. Organizational IT and security teams should assist users in optimizing their access control and app permission settings so that each application can access only what it needs to function and nothing more.
  4. Keep OS, firmware, software, and applications up-to-date: Users need to ensure that all of their devices OS and other software are updated in real time. This is a critical step because software updates often contain security patches to protect users from the latest threats or exploits.
  5. Back up device data: All enterprise users should periodically back up the data on their devices. Backing up data in conjunction with having security and recovery procedures in place will greatly reduce the fallout should a device be lost or stolen.
  6. Enroll in Find my Device and remote wipe services: All BYOD devices should be subscribed to a device locator service. In addition to being able to track a missing device, these services usually have the ability to wipe a device remotely, a critical last-resort measure for ensuring BYOD security in the event of a lost or stolen device.
  7. Never store personal financial data on a device: Employees should avoid saving any financial or otherwise sensitive data on their devices. This precaution ensures that confidential data is safe even if a device gets compromised.
  8. Beware of free apps: Many free applications have been found to track users and share user information with advertisers or other third parties. Enterprise users should review app permissions prior to downloading and download only from trusted publishers. IT and security teams can assist employees by providing lists of applications that are approved for download.
  9. Run mobile antivirus software or scanning tools: There are many commercially available antivirus and security applications that scan and protect devices from common threats. IT and security teams should assist employees in selecting and installing antivirus software prior to using their devices at work.
  10. Use Mobile Device Management (MDM) software as recommended by IT: Many IT and security teams use Mobile Device Management (MDM) software for securing devices. Mobile device management software enables IT teams to implement security settings and software configurations on all devices that connect to company networks.


Posted In: NEWS

Tags: , , , , , , , , ,

Leave a Comment

The bring-your-own-device fad is fading #byod #bring #your #own #device


The bring-your-own-device fad is fading

U.S. companies are moving away from the bring-your-own-device (BYOD) trend that kicked off in earnest five years ago and had workers using their personal smartphones and tablets for work duties, according to a new study.

An online survey conducted in April and May of 375 U.S. IT professionals in various private businesses found that 53% allowed no BYOD, up significantly from 34% in 2013. No BYOD means that a company provides smartphones and tablets to workers and bans the use of personal devices for work.

Also, just 7% of those surveyed said they allow a full BYOD policy where the company takes no responsibility for devices. Another 40% allow a partial BYOD policy, where the company provides some devices but allows some personal devices to access corporate systems.

“It’s not quite the death of BYOD, but there does seem to be a decrease in the use of BYOD in enterprises,” said Tim Herbert, senior vice president for research and market intelligence for CompTIA, a nonprofit IT trade association, which conducted the survey.

The BYOD findings were published recently in a comprehensive CompTIA report, “Building Digital Organizations,” that tracked the intertwined influences of mobile devices and cloud computing on enterprises. “Cloud and mobility represent a true revolution,” the report said, noting that the two technologies represent 100% of all growth in IT spending in 2015. Wireless data spending globally will be $536 billion, while sales of smartphones and tablets will reach $484 billion; overall cloud spending will reach $118 billion.

“There is a clear move towards a policy of no BYOD,” the report stated. Companies find they can pursue mobility initatives just as well by providing mobile devices to workers “who are often happy to take a corporate device if it is the same thing they would choose on their own.”

Various studies, including one by management software vendor Good, have concluded that about 70% of smartphones and tablets used by enterprises run on Apple’s iOS.

The CompTIA report noted that even when companies ban BYOD, “ambitious employees will find ways to utilize personal devices and applications even if they are forbidden.”

The survey exposed a trend away from BYOD also noticed by Jack Gold, an analyst at J. Gold Associates. “There certainly is a curtailment of BYOD from where everyone thought it would be a couple of years back,” Gold said. “Companies are much more cautious now, knowing that the benefits of BYOD often don’t outweigh the risks.”

Gold agreed that workers are getting more of the devices they want from their companies so there’s less motivation to circumvent IT. “A lot of the original motivation behind BYOD was by users wanting to replace older style corporate devices like BlackBerry, with newer iPhones in particular, but increasingly Android as well.”

Both Gold and Herbert said many corporations five years ago thought they could save money by having workers both buy their own devices and pay monthly service bills. “But that’s generally not been the case, as companies have come to realize there is no free lunch with BYOD,” Gold said.

Another reality is that workers recently have found they can keep their personal photos, music and other data in a personal cloud repository, which means their personal treasures won’t be lost if the worker leaves the company and has to surrender a corporate-owned phone or tablet, Herbert said.

The CompTIA study also found evidence that discussions within corporations about BYOD as well as mobile device management (MDM) have settled down. Sometimes, companies that never had an internal device usage policy have created a security policy and have trained workers on what uses are not allowed with smartphones and tablets, which lowers the security risk. For example, a company that never had a policy restricting which websites can be visited on a work device or that never restricted use of a smartphone camera, might in the past two years have instituted mobile policies, Herbert said.

“MDM is probably not at the adoption level some would have expected a few years back,” Herbert said. “Some of the reason may be that companies have focused on getting the mobile usage basics right and now may have a security policy that covers mobility. It was odd that for years many companies simply didn’t have a formal policy for mobile uses.”

If an organization controls the type of smartphone or tablet used by banning BYOD, it can more easily set the policies and see they are adhered to, which can result in fewer security breaches and lowered costs to deal with breaches. “There’s also been more investment on the employee training side and employees are more self-aware” about mobile security risks, Herbert said. “As a result, the original projections of MDM haven’t been realized.”

CompTIA interviewed IT executives who said the corporate focus on MDM and BYOD will evolve into greater attention on the Internet of Things, largely as an extension of mobile technology capabilities. “IoT is a very broad area, and we define it as adding intelligence to devices that previously didn’t have it,” Herbert added.

Senior Editor Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld.


Posted In: NEWS

Tags: , , , ,

Leave a Comment

13 Free Open Source NetFlow Analyzers (Windows #network #device #monitoring #open


13 Free Open Source NetFlow Analyzers for Windows and Linux/Unix

Looking for a Free Open Source NetFlow Analyzers for Windows, Linux or Unix? Look no further, we ve compiled the ultimate list of Open Source tools to help with your network monitoring tasks. As many of you already know, NetFlow is a protocol/standard developed by Cisco for collecting/transferring/analyzing network data using software packages to get a better understanding of what is happening on your network, along with further analysis of bandwidth usage, etc.

Netflow allows administrators to take the processing of network data away from switches and routers and send the flow packets and information to a collector that further analyzes that data to free up resources on the network device itself.

There are many commercial Netflow (or sflow, jflow, rflow, cflow, or netstream) that are Available for Free Download and use that we ve recently detailed in this post that are also Free of charge too. These Software packages are great if you are just getting into network analysis using Netflow, as they are designed to be Very user friendly and can be setup in relatively little time. Check them out HERE if you want to see what they re all about.

On the other hand, if your looking for an Open-Source alternative, you re in luck We ve put together a large list of Free Open Source Netflow Analyzers/Collectors to help you collect, analyze and scrutinize traffic and bandwidth to help you keep track of whats going on in your network.

Using a open source network analyzer/collector allows you the flexibility of customizing the software packages and reports as you wish if necessary. These software packages can be used on a wide variety of operating systems including Windows and Linux/Unix.

Open Source Netflow Tools/Analyzers

NTop (or Ntopng)

Probably the most well-known open source traffic analyzers, Ntop, is a web-based tool that runs on Ubuntu x64 versions, CentOS/Redhat x64 Linux flavors, Windows x64 Operating systems, BeagleBoard ARM, Ubiquity networks EdgeRouter and even Mac OSX per their github site. nTopng also includes suuport for sFlow and IPFIX (through nProbe add-on), as its becoming a new standard that many manufacturers are using for flow analysis. RRD is used for databases and storing of data on a per-host level.

  • Flow-tools is a toolset that can be used to Collect, Send, Process and generate Reports for Netflow data flows and provides an API for developing custom features and applications. Flow Tools is hosted at .
  • Flowscan is more of a visualization tool that analyzes and reports Netflow data and can produce visual graphs that are in near real-time to see whats going on in your network. Flowscan can be deployed on a GNU/Linux or BSD system and uses some of the following packages in order to correctly collect and process flows: cflowd to as the flow collector, flowscan which is a perl script that makes up the software package itself ( FlowScan ) and is responsible for loading and executing reports and the last major component is RRDtool which is used to store all flow information in its database.
  • EHNT (which is pronounced ent ) is an acronym for Extreme Happy NetFlow Tool. This is a commandline tool that supports Netflow Version 5 only and provides reports for intervals between 1 min to 24 hrs and provides information about Ip Protocols, TCP/UDP ports and more.
  • (which stands for Berlekey Packet Filter Traffic collector) is a built on top of the BPF pseudo-device and libpcap for capturing IP traffic, including Source/Destination IP s Ports, number of transmitted/received bytes which are all stored in one compact form binary file.
  • Maji is an implementation of an IPFIX meter which is based on libtrace, a packet capturing and processing library. Maji seems to have an array of information per their website and the latest release was from 07/2011. One of the major benefits to maji is the custom templates you can develop with as many elements included into them as you want, and can be exported via Network over SCTP/TCP/UDP, SQLite database or the terminal.
  • cflowd is a tool that is made for analyzing Netflow enabled devices and includes modules for collecting, storing and analyzing netflow data. Apparently cflowd is no longer being supported per their website, and is directing users to use flow-tools with FlowScan in order to take advantage of cflowd and its modules.
  • AnonTool is more of an anonymization tool for netflow v5 v9 traces.
  • According to the sourceforge page, this project is no longer being developed or supported and was an open-source project that used NetFlow data to help detect and stop (Distributed) Denial of Service attacks. It is no longer support or being updated, so use at your own risk. Check out their Sourceforge page for more information and a download link.
  • pmGraph is a great open source tool for graphing and monitoring bandwidth using pmacct, which is a network monitoring and auditing tool. pmacct collects and monitors traffic using Netflow or Sflow on network devices (including firewalls, routers and switches) into a database and allows for analysis of that data using pmGraph. The software was developed by Aptivate staff and volunteers and looks to still be active.
  • sFlow toolkit is an open source software package the is used for analyzing sFlow data and can be used with other utilities including tcpdump, ntop and Snort for further analysis. sflowtool is the main component of the sFlow toolkit software and is a command-line utility that gives you the ability to view network traffic devices in real-time and interface with other software packages for mapping out graphical images of IP flow. sflowtool is also available for windows as well per their website .
  • NDSAD, which stands for NetUP s Data Stream Accounting Daemon, was developed by NetUP as a tool to capture packets and generate Netflow v5 data streams and was specifically used for ISP billing purposes. The software still seems to be supported as well.
  • NFsen, which is short for N et f low Sen sor, is a web-based front-end tool for nfdump to present the user a nice graphical image of all the data nfdump pumps out. You have the ability to generate reports of your netflow data with information including Flows, Packets and bytes using RRD database tool, as well as setup alerts and view historical data. nfsen project is still very active and can be downloaded from its Sourceforge page here and runs on any Unix/Linux systems. You ll need PHP, PERL (along with Perl Mail::Header and Mail::Internet modules), RRD Tools module and Nfdump tools installed on your system in order to use it correctly.

  • If your not convinced that you ve found any Open Source Netflow Analyzers that will suite your needs, due to either your skill level or understanding of Unix/Linux systems, you can always try one of these Free netflow software packages that we ve recently reviewed that will work for Windows systems.

    Most, if not all those downloads are free and can be setup and used very quickly some of them also offer pro versions of the software that can be had for very little investment. Check them out and let us know what you think.

    Editors Rating


    Posted In: NEWS

    Tags: , , , ,

    Leave a Comment

    Residential Locks – Locksmith New York #new #york #locksmith, #metropolitan #locksmith,


    Locksmith Services

    When locks needs to be changed; due to theft, personnel policy, loss of a key, there s no time to waste. Fortunately, Metropolitan Locksmith provides 24-hour service to any location in the New York Metropolitan area.

    In addition, the most common cause of unauthorized entry through a locked door is by using a duplicate key. Standard keys to your property can be made on demand in countless places. Our suggestion is to replace standard locks with high security products by Mul-t-lock because each Mul-t-lock key has a personal identification card that prevents duplication without the property residents permission.

    Protecting your facility has grown increasingly more challenging during the last few years. The new breed of security threats is more immediate than ever before, increasing the risk of a serious security breach and exposing your institution to dangerous liability problems. Chances are unauthorized duplicate keys are infiltrating your security system, despite your efforts to control them.

    We are dedicated to the professionalism and excellence of our trade. We service all of New York City, and keep a large inventory of locks and security products.


    Posted In: NEWS

    Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    Leave a Comment