Author Archives: Moka5

Enterprise Anywhere

Moka5 is Enterprise Anyware

Empower your workforce. Stay secure. Cut the strings. Moka5 is Enterprise AnyWare.

Enterprise AnyWare for the Everywhere Enterprise

Today, all computing is mobile computing. The majority of computing devices—from notebooks to tablets to smartphones—are designed to bring MIPS to where and when they’re needed to perform critical business functions. But as these devices continue to evolve, it becomes increasingly difficult—and expensive – for IT organizations to support them all. Moreover, with ubiquitous network access and cloud- based solutions assuming a larger portion of the enterprise solution profile, trying to secure all these devices is an exercise in futility. Using legacy endpoint security configuration management solutions in their new mobile device management disguise only succeeds in preventing productive mobile device utilization. Indeed all legacy IT and systems security practices are based on the premise that the device is the center of the IT universe, while ignoring far more valuable critical data.

It’s time to stop the insanity.

Introducing Moka5 – Enterprise AnyWare.

Moka5 fundamentally transforms enterprise end user computing. The M5 platform creates a highly elastic enterprise perimeter where consistent user data and applications are delivered as simply-managed and highly-secure workspaces to popular end-user devices. The device is no longer the center of the action—the stream of data and applications becomes the real focus. Why spend significant cycles and cash managing and locking down commodity hardware designed to be disposed, when the priceless IP generated on those devices remains exposed and vulnerable to user malfeasance?

M5 Enterprise AnyWare delivers:
  • Agile Management
  • Secure Access
  • Device-aware Data

Centralized Control – Distributed Trust

Moka5 requires significantly less management overhead than legacy endpoint security/management or MDM solutions, while offering far more functionality than legacy VDI tools. Moka5 effectively takes your IT organization out of the endpoint procurement, management and deployment business.

New employees, field-based workers or contractors can be provisioned or decommissioned within minutes—without additional server or storage capacity, and regardless of computer make, model, smartphone or tablet. In addition, sensitive documents and IP can be securely shared among a select group of users with vastly more security than cloud-based file sharing options. Most of all, your workers can be both productive and secure online or offline.

Moka5 enables IT to retain centralized control, while allowing for distributed end-user trust for devices and networks creating real enterprise productivity!

Take Moka5 for a Test Drive!

It’s a Holiday Miracle: Real Tips for a Highly Effective BYO Program

Yes, Virginia – there is such a thing as a successful enterprise BYO program and it doesn’t take a Christmas miracle to get it implemented! While virtually everyone in IT believes that a well-implemented BYO program can boost productivity and reduce costs, overcoming the twin obstacles of employee trust and data privacy have effectively slowed the overall implementation of these programs to the detriment of both parties—call it the coal in the Christmas stocking effect.

In fact, according to a study published in CIO magazine, over 70% of employees do not trust their corporate IT group to keep personal information private, even as 80% of employees use their personal devices for work related tasks. Talk about a holiday bummer!

A column written by Software Advice’s Taylor Short—who researches and writes buyer’s guides for help desk and IT professionals—provides keen insight into how Intel overcame significant trust and privacy issues to implement what, by all accounts, is a highly effective BYO program. According to Short’s interview with Intel’s IT Senior Principal Engineer, Alan Ross, the following three guiding principles have enabled them to overcome the trust gap and deliver a BYO program that employees love, and IT can live with.

  1. Establish trust by clarifying what the IT team can see on an employee’s device. Being very precise and clear about those areas that are strictly off-limits to IT eliminates ambiguity and helps to clarify boundaries, thereby preventing unpleasant surprises down the line.
  2. Create security tiers that allow employees to adhere to their preferred level of security monitoring and measures. Everyone has different comfort levels with surveillance, and those levels should correspond directly to the types of tasks and information access they can perform with their device of choice. Setting reasonable limits based on consistently applied policies helps create clarity and ensures that employees use the right device for the right task, without sacrificing their sense of privacy or corporate security.
  3. Establish data containers that separate work and personal data to reassure employees their private information will stay private. As the inventor of the centrally managed localized container, we at Moka5 believe this is absolutely central to a successful BYO implementation. Using containerized data and applications that are isolated from each other allows what belongs to IT to be managed by IT, and what belongs to the employee to managed by the employee.

 

Since we know that many of you will soon be unwrapping a fancy new tablet or smartphone, we want to make sure you can maximize its use at your workplace; and, that your IT department doesn’t have to play Scrooge again for another year!

A very happy holiday to all from your friends at Moka5.

5 Technology Trends for 2014

Technology is ever evolving, and although there’s no way to say for sure which trends will take the spotlight over the course of the next year, the predictions and trends of the last year help us to predict what technology trends will continue into the new year.

What technology trends are going to be big in 2014? The following are some of the predictions from the team at Moka5.

  1. Continuity Across All Devices  
    Wouldn’t you like to be able to look up an address from your laptop and have the directions populate on your in-car GPS? This kind of device continuity could start to become a trend in 2014.As ITBusinessEdge explained it in last year’s Top 10 Technology Trends for 2013, “With more users working across multiple devices, 2013 will see a move to provide the missing link in today’s computing experience – the ability to pick up the session on a different device in exactly the same place you left off.”Moka5 VP of Technical Services, Lee Wei expects this 2013 trend to continue to gain momentum in 2014. “With Cloud and various AAS (As A Service) as enabling technologies, I believe we will start realizing the ability to have continuity across devices.”
  2. Personal Cloud
    Personal cloud was not only of Forbes’ Top 10 Strategic Technology Trend for 2013, but also among the 2014 strategic technology trends shared by Gartner Fellow David Cearley during Gartner Symposium.This trend opens up the possibility for greater continuity across all devices, because it allows our personal cloud—not the device—to become the center of our digital live and allow us to sync across devices. However, the era of the personal also has the potential to shift the balance of power further towards the user, as devices become less important.
  3. The Internet of Things and DMaaS
    It likely comes little surprise that there are more Internet-connected devices in the U.S. than there are people. The Internet of Things (IoE) will continue to evolve in 2014 as more and more ordinary consumer electronic devices become connected to the Internet.  As this trend moves more into homes and home appliances, Kurt Somerville, Moka5 Marketing Operations Manager, anticipates that the not-yet-created acronym DMaaS (Device-Management as a Service) will likely explode on the consumer level. Since there is no real standard yet according to Somerville, he anticipates that “there will be universal ‘hubs’ where ordinary at-home devices will be able to communicate with a central console—very similar to the current state of managing PCs, Macs, and every other device in the enterprise.” However, this kind of trend isn’t limited to the home, Somerville anticipates that “brick and mortar retail stores will become “alive” relaying important, hyper-targeted location based information to consumers while they are shopping. This is already happening with Apples introduction of iBeacon.”
  4. Flash Storage
    Although some may argue that there are problems that arise with flash storage—aka any data repository or system that uses flash memory—Moka5 Senior System Admin, Jonny Campbell suggests that “flash storage is changing the performance characteristics of all things, since the previous system-internal performance bottlenecks were almost all related to storage.” As a result, flash storage is certainly a trend to watch in 2014.
  5. Software Defined Networking
    2014 will also likely see a continued shift in focus from hardware to solutions made possible by virtualization. As Campbell explains, “Software Defined Networking is poised to put traditional networking hardware providers out of business.” Although big name vendors have succeeded for years by coupling hardware and software into one unified and expensive model, major players like Amazon are now replacing expensive networking components with services that leverage virtualization.

What trends do you predict will be big in 2014? Tweet to us @Mokafive

Pros and Cons of Contract Employees

Nearly one in five small business owners say they’re more likely to hire an independent contractor than a full-time employee, according to results from Inc.com’s August Small Business Scorecard, and they’re not alone. The use of contract employees is not limited to one industry or business size.

Although hiring contract workers can provide benefits to businesses, there are also risks associated. So do the benefits outweigh the risks and how do you mitigate the risks, should your company choose to move forward with the hiring of independent contractors?

Advantages of Contract Workers

There are a number of benefits to hiring an independent contractor as part of your workforce, as opposed to an additional full-time employee, including cost savings and staffing flexibility.

According to a guest article on Forbes regarding the pros and cons of hiring independent contractors, there are several major advantages to using independent contractors, “with financial savings topping the list.” Although employers oftentimes pay independent contractors more per hour than they would pay employees, with contract workers, employers aren’t subject to many of the other expenses that are typically incurred when hiring full-time employees, including: office space and equipment, a share of the employee’ Social Security and Medicare taxes, state unemployment compensation insurance, or worker’ compensation insurance.

Hiring contract workers also provides greater staffing flexibility than hiring traditional employees. Because most independent contractors bring specialized expertise to the job, they can usually be productive immediately, reducing time and costs of training. This, combined with the idea that employers can hire for a specific task or project, make contract workers a good solution for fluctuating workloads.

Disadvantages to Hiring Contract Workers

Although there are a number of benefits to hiring an independent contractor, as opposed to a full-time employee, hiring a contract worker can also pose some risks including: the potential of a government audit, sensitive company or customer information leaks, and malware infections and unauthorized intrusions.

Hiring a contract worker also poses restrictions on firing. Unlike with a traditional employee, your right to fire an independent contractor depends on your written agreement with that individual. As a result, if you fire an independent contractor in violation of the agreement, you could be liable for damages.

However, legal ramifications, should you choose to fire a contract employee, are only part of the risk associated. Depending on the procedures put in place, a former contract worker could have access to internal systems post-engagement. Even in a relationship that does not result in a disgruntled employee, access to internal systems post-engagement, can pose a threat for the hiring organization.

A Solution for Managing Contract Workers

As might be expected, some of the greatest disadvantages of hiring contract employees come from the threats involving how these contractors access data both during and after the engagement. What if you could reap the benefits of hiring contract employees while eliminating these data-focused threats? Moka5 does just that. Benefits of the M5 for Contractor Workforce Solution include:

  • Policy-based secure corporate access regardless of device or network
  • Secure container eliminates data leaks and IP loss
  • Bare metal support reduces management/security costs and complexity of corporate supplied laptops
  • Reduction of CapEx costs related to corporate supplied laptops
  • Simplified image management, updating, and wiping
  • Unified management console for laptops, tablets and smartphones
  • Offline capability enables productivity even in low bandwidth environments

Considering hiring contract employees or need to better manage data being using as part of existing projects? Find out how you can test-drive Moka5 for free.

ROI for Simplified Management with Moka5

Today’s enterprise IT is constantly challenged to deliver more at higher velocity and lower price points. Whether provisioning contractors, offshore workers, or remote employees, the need is apparent for a quicker way to manage, update, and deploy corporate workspaces. There’s got to be a better way than the current crop of heavy endpoint and systems management suites IT has now. Using containerized management solutions isn’t just for mobile devices.  See the payoff for using the Moka5 containerized solution for managing your hard-to-manage PCs. Check out the infographic below for details!

Wired, Tech Target, and MSPToday Discuss the Challenges of Keeping Data Secure

With many still maintaining the assumption that if you manage and protect the physical computer, you’re managing and protecting the data, it should come as little surprise that trends like consumerization of IT and BYOD have made keeping data secure a hot topic in technology.

These recent articles form WIREDTech Target, and MSPToday discuss some of the concerns being faced by the enterprise while trying to keep data safe:

WIRED: Think Server-based VDI Keeps Your Data Secure? Think Again.

In a recent byline for WIRED Innovation Insights, Moka5 Founder and CTO, John Whaley discusses the security risks associated with deploying Virtual Desktop Infrastructure (VDI), the biggest of which being endpoint security. As John explains, “ While data applications reside in the data center, the endpoint itself can easily become a ‘front door’ into corporate systems.”

Tech Target: Six Ways Consumerization Leads to Data Leaks

As Matt Kosht explains in this article for Tech Target, “Consumerization has made employees more productive, but it has also created more risks for data leaks.” BYOD, app stores, and cloud storage are among the six ways consumerization leads to data leaks according to Kosht. There are however, ways to decrease these data leaks. For instance, although some cloud storage options tempt users to keep files in the cloud and access them from anywhere, “you can tightly manage documents with tools such as WatchDox and Moka5 for iOS. These products encrypt document and put rules around their use.”

MSPToday: When it Comes to BYO, Securing the End Device is a Losing Proposition for the Enterprise

As Moka5 Senior VP of Marketing, David Appelbaum explains in his interview with TMCnet contributing editor, Laura Stotler, “There will always be ways to thwart device security and device management. Don’t manage the device, assumer the device is corrupted.” Although Stotler considers it a bold approach, with the push towards BYO, she also considers “Moka5’s concept of protecting data and not individual devices…a sound one.”

 

Need a way to lock down and liberate your endpoint IT infrastructure? Learn more about how Moka5 can provide secure data storage, anywhere, any time, and on any device.