Rugged and Mobile on safari

28 07 2009

Hi Everyone,

We’re at it again adding yet more products to our e-shop ensuring we offer you the unique and tailored Rugged and Mobile experience.

After previously announcing Psion’s collection to our pages, Zebra will be following shortly, kick-starting our Mobile printer offering. Zebra specialises in mobile and wristband printing solutions and is regarded as one of the world leaders in providing innovative and reliable products to the rugged market.

Taking mobile business tasks to the next level is all the rage at the moment and Zebra’s rugged and flexible product range allows easy connection to many of your existing mobile devices which means you can quickly get up and running with your print solution.

The capability of mobile printers has evolved rapidly to meet the demands of various industries. With implementation of wireless mobile printing, using either Bluetooth, Wifi or RFID, many businesses can add value, increase efficiency and shape innovation towards creating new and improved printing systems.

Check back soon!


The Rugged and Mobile blog.

Psion coming soon to Rugged and Mobile

27 07 2009

Hey everyone,

Here’s a quick heads up about our progress implementing Psion products to our ever extending e-catalogue. Currently we’re working closely with Psion in order to gain our partnership status and bring their extensive range to us at Rugged and Mobile.

We at Rugged and Mobile will be focussing on Psion’s range of handheld computers in the coming week as we add them to our range and as we learn about them we’re finding we love them more and more!, ”why?” I hear you say…… because they’re rugged and they have great support!

Psion offer high levels of support for all their products ensuring your business continues operating. This links perfectly with our service based ethos that adding value to business can directly benefit our customers.

Often within this market the addition of another manufacturer, introducing more products, creating more product variants and model numbers can cause a headache for you guys, the end-user. However with our reviews, our expert knowledge and direct links into the manufacturer, we’ll clear the mist and make sure that more choice simply means you’ll always find the best product. We’ll always help you decide what products are right for your business.


The Rugged and Mobile blog.

A Laymans Guide to Device Management! – Part 1

26 07 2009

Hi Everyone, it has been a little longer between posts than I like this week but the lag will pay off as I get everyone else posting soon. Our webshop is almost ready now too with an announcement pending!

So on to Device Management! I think I already told everyone here that we specialise in service and part of that is offering our customers the right solution to their IT and mobile problems. So you got the right hardware, you got the right software solution that’s working for you but you’re doing nothing to keep track of and service all these new mobile devices that are flying around the country! One area in the mobile domain that I see lots of confusion in how to look after and manage devices that are working remotely. I’ve worked with many Device Management companies employing their products into both large and small companies and I’ll be totally honest when I say this; all the options out there currently are either too technical and resource intensive for customers to install and run, or they’re too costly as vendors take advantage of an ill-educated market.

This blog takes a look at Device Management (DM) and gives the lay person a chance at understanding what is it they need and how easily they can manage devices and data that are essential to their business.

In Part 1 we take a look at the market and why DM is needed and take a look at some of the challenges we face in employing a DM solution.

Part 2 looks at the benefits of DM

and lastly Part 3 looks at the options out their and why we feel we could have an exciting new option for our customers.

So onto this section…

Part 1 – What is Device Management?

It’s estimated that approximately 70% of business data typically now exists on various mobile based equipment of some kind, whilst at the same time about the same percentage of businesses leave the responsibility of security up to the user or don’t think about it at all. At the very least, valuable names, addresses and PIM data such as birthdays and travel arrangements are pretty much uniformly saved to business phones. However as the drive towards data capture in the field gives us fantastic new services, it also means the risks increase as more and more data is required and generated in the field.

Take a typical parcel delivery application. Now we don’t want to go into the ins and outs of how an application of this nature is actually written but just think for one moment about what kind of data the device could have stored on it. In the case of customer data that it must keep secure, it will have:

• Names, addresses and possibly contact numbers
• Parcel details
• Signatures in the event of delivery proof made
• Photos of front doors in the case of non-delivery
• Details of alternative delivery instructions
• Whether the person will be in or out at a particular time

And in the case of business data:
• Parcel itineraries
• Driver data
• Business contact information
• Messaging data
• Wireless/3G connection access
• GPS tracking data
• Telematics data

The list could go on but the point being made here is that in the case of the delivery company this is all stuff that you would hate to get into the hands of your competitors and in the case of the customer, this data could severely put your personal data and even home security at risk.

Not enough businesses are doing what they should be to keep data secure and this article takes a look at device management, what it is, the reason we need it and the challenges it faces. It then looks at why we need to seriously think about it in this day and age and finally takes a look at what you need to do to keep your data secure. Surprise, surprise there is also a look at our own Management application and why we feel there is simply no excuse to not employ device management in your company any more.

What is Device Management

Device Management (DM), in a nutshell, is ensuring that your business can see, connect to and then manage in some way a device that it owns. Some of the areas DM should address can be seen below:

This is about providing the user with an easy way to upload required data, applications and settings to their device whether new or ongoing. It takes away the laborious task of setting up a device every time it is needed and it also provides a more secure way to update settings on live devices. No more carrying around that WPA key on a piece of paper!

DM can also cover many aspects of security. Ensuring data security travelling to/from the device can be managed by a DM service, setting passwords, locking a device down in a “Kiosk” fashion or when all else fails, wiping a device remotely when needed.

Asset Management
It should allow IT Managers to be able to group and manage their device family better so that they do not lose track of the devices they should be managing. Making changes to groups of devices should be easily accomplished and tracked so that settings and status’ can be understood at a glance. It’s no good having a DM service if it can’t use it easily.

Monitoring and Support
Devices with a problem could easily alert the DM central server. Whether this is a reboot, a failure of some kind or a simple notification of battery levels it can be used to prompt and aid the support teams.

Remote access
Remote assistance could be in the shape of a remote helper application that can help walk-through users through a particular application or it could allow support teams to browse the file system and get hold of dump files.

Location is becoming the next big thing in DM and along wioth a whole host of other interesting services, knowing where a device is can be critical in supporting or knowing whether the device has been lost or stolen early on.

User Behaviour
Key metrics can be stored and sent back to teams in order to view user and device behaviours. Do your van drivers use the charging cradle? How many batteries go flat in the day? What kind of call/SMS usage are your phones experiencing?

These are just a few of the key areas DM should address. You could also manage software licenses and distribution and by doing so you will be on the road to keeping your devices safe and more importantly your business and customer data secure.

The challenges of Device Management

For years we have seen our friendly neighbourhood IT Managers lock down and control our PC’s or laptops. Nearly all of these have Windows on them of some flavour and typically they will connect through a certain firewall/gateway or server. So why do companies fail to employ a DM service for their remote mobile devices? At Rugged and Mobile we see the same problems and hear the same excuses time and time again! Lets look at some of these challenges (or excuses!) is more detail:It’s too expensive
Your right….until now!! Typically DM services have been very expensive to buy and then you find that its only half the story. You have to maintain the service yourself, get tied in and then be subject to costly updates, support and training needs. It seems that employing something that really should be integral and key to keeping your customers and your own business data safe is just out of reach of most businesses.

It’s way too complicated
Again, you’re right until now!! Most DM services require you to install different client applications for different devices, you need to buy costly servers and install complex server software, maintain secure communication between your solution and then have people to learn, run and administer a system that constantly requires updating. Installing and running a classic DM system can be very complex and this is when everything goes to plan!

Wouldn’t it be nice if there was a true SOA DM service on the market. Meaning you pay for what you use, you don’t have any set-up costs or administration worries and you just have install the client application and you manage your family of devices.

My DM system is too old and insecure
Data security protocols are changing all the time in the fight to keep our data secure. Your DM System will inevitably become out of date and you’ll need to go through the rigmarole of pulling out and then installing a new system. Some companies have gone through this process and simply give up in the face of locked in, aging software that requires costly licenses updating before anything can be done with it. Surely you need a DM tool that uses the most up to date and appropriate ways of keeping your devices secure without exposing you to the risks or complexities of keeping it that way?

We just don’t understand the need for DM
Everything’s been fine up to now why do we need to bother with it? Well we see so many businesses with this attitude, completely disregarding what could happen in the future and at the same time completely ignoring the fact that a mobile device can be anywhere and in any situation despite the rules and regulations they may set to their users. I’ve personally seen devices being left in cars (Because they’re too big and the company will pay for it if it goes missing!!) I have also seen phones being taken out to pubs/bars at the weekend. No-one uses a mobile device as it is intended!! As Mobility becomes central to our work and personal lives, we need to ensure that we start to look after the data and devices that we own. Things may have been fine up to now but will they in the future as hackers and thieves turn their attention to mobile devices.

There are also lots of technical challenges we have to face to:

• Devices have limited bandwidth and could run out of bandwidth.
• What protocol do you use to communicate with the device? GPRS/3G, SMS, MMS, WiFi or even GSM. What happens when 1 or more are available? What if the device is cradled or connected to a laptop?
• Mobile devices have unreliable, intermittent and slow connectivity (At best!!). What happens when you drive through a tunnel mid-way through an update?
• Absolutely no local support will be available unless you are Bill Gates and can afford to have a personal support bod follow you around everywhere you go!!
• There is an astonishing variety of client platforms that you have to consider. It’s not just about Windows, Linux and OSX. Nokia, Blackberry, Apple, Android and even Windows mobile/CE devices can be flavoured differently device to device as can OS40/60.
• Mobile devices can very easily go missing, whether lost or stolen.
• Battery life is a big issue. You can’t rely on the power being on 24/7 like a PC can.
• And there’s more…What happens if the SIM card is taken out? A new one put in? What happens if the device is stolen and rebooted or wiped by the thief?

You’re probably beginning to see why so many businesses haven’t bothered with DM systems. It’s a potential nightmare and I have been a party to some installations from certain companies where lots of money is spent and DM simply never works properly!!! However the risks of doing nothing are ever-increasing as hackers turn their efforts to mobile devices and mobile OS’s as well as starting to see regulations now appearing in this world, forcing businesses to adopt some kind of strategy.

Just stop and think for 1 minute. How damaging could it be to your business if a customer’s data was stolen that resulted in some kind of personal loss to them. What if that customer complained to all sorts of blogs, forums, papers or simply to other people? Would you use that company after hearing about that? Chances are even 1 incident like this could impact your business very heavily indeed. It is time to act.

In the next part we lift the mood a little bit and start talking about all the wonderful benefits DM can bring you. Check back soon…..

The Rugged and Mobile blog.

New Employee

24 07 2009

Hi There

It has been very, very busy but I wanted to introduce our latest starter, Mike, who is going to be helping us keep our focus on excellent service and support.

As with everyone, we’ll be getting Mike to contribute here very soon and he should be bringing some interesting views on our market.



The Rugged and Mobile blog.

Bluetooth vulnerability found in HTC phones

15 07 2009

Hi Everyone

I spoke to few people about this yesterday after a heads up from a fellow twitter user and thought it should go up on the site as we sell HTC devices. We’ve had a quick look into this  and it does seem to be prevalent on some of our demo HTC smartphones.

HTC smartphone’s running Windows Mobile 6 or Windows Mobile 6.1 seem to be the main problem and you need to be careful when connecting to an untrusted device using Bluetooth. There’s a vulnerability in one of the HTC drivers installed on the little smartphones that allows an attacker to access any file on the phone or even upload malicious code through a Bluetooth connection. It looks like this is a WM 6 thing, as phones running Windows Mobile 5 are not affected.

To shield from the attack, make sure that Bluetooth is disabled and essentially file sharing over Bluetooth is de-activated. If both are on then a connection can be made either through standard Bluetooth pairing and then by taking advantage of the “Bluetooth MAC spoofing attack”, where the attacking device can convince the target phone that it’s a trusted device on its paired device list.

So if you are vulnerable and you have both your Bluetooth and file sharing on, it could mean that the attacker can use a means of directory traversal which enables them to move out of the phone’s Bluetooth shared folder and into pretty much any other folder on the file system. PIM data isn’t safe either so your contact details, e-mails, pictures and pretty much any data stored on the phone in the Microsoft file system can be viewed and copied. So far we haven’t had any comment back about SMS’s and data stored on the SIM card. As these are not strictly managed by Windows Mobile, they could be safe. We’ll get back to you on that. Attackers can also use this vulnerability upload software and then run malicious code.

So how can you protect yourself from this? Firstly don’t accept any untrusted Bluetooth connections. Secondly, disable your “file sharing over Bluetooth” which will stop the attacker from traversing your files even if they get a connection. Lastly, it is prudent to delete your current list of paired devices because hackers can masquerade as one of your trusted devices which gives them a connection and access to your smartphone.

We contacted HTC and their UK distributor about this but so far we haven’t had word back if they will issue an updated Bluetooth driver. In the meantime if you follow the security protection measures above, then you should be OK.

This actually reminds me of the original Bluetooth vulnerability that Nokia phones had where anyone with a Bluetooth dongle could effectively steal your PIM data and send messages to/from your phone. With mobile phones becoming more and more popular, more powerful and holding more and more important data, issues like this are going to become more common.

The lesson is to ensure you protect your little devices just as you do your laptops by ensuring you have good device protection, employ a device management solution and lastly talk to someone who can ensure you have a good data sync and back up strategy if all else fails.

Next article should be a 3 part on Device Management and what we’re doing here to address the main problems user shave with their systems.

Check back soon


The Rugged and Mobile blog.

%d bloggers like this: