Tuesday, 2 April 2013

ENTERPRISE MOBILITY MANAGEMENT OPTIONS


These days, most organizations are a mobile enterprise, whether their IT departments want them to be or not.
As end users rely more on tablets, smartphones and even their personal laptops, IT needs to keep up with the latest mobile computing definitions and trends. Devices, operating systems and apps evolve quickly, so IT pros in a mobile enterprise must stay on top of the latest software and strategies for managing, securing and taking advantage of new technologies.
Enterprise mobility
With enterprise mobility, end users aren't chained to their desks and PCs anymore. More employees do work outside the office with smartphones and tablets, sharing and accessing data via cloud services. Enterprise mobility can improve employee productivity but also create security risks
Mobile operating system
A mobile operating system is software that lets devices run apps, connect to cellular and wireless networks, and perform other tasks. Popular mobile OSes include Apple's iOS, Google's Android, Research In Motion's BlackBerry OS and Microsoft's Windows Phone.
Mobile browser
Smartphones and tablets have much smaller screens than desktops and laptops, so they run Web browsers that render websites for optimal viewing. Mobile browsers also utilize lightweight software to address mobile devices' memory and bandwidth limitations. Most browsers display the mobile versions of sites by default but can display regular HTML sites if mobile versions aren't available.
Mobile device fragmentation
When there are different versions of the same mobile operating system in current use, that's known as mobile device fragmentation. Android provides the best example of a fragmented operating system: Wireless carriers control the timing of OS updates to different devices, so there are often delays (deliberate or otherwise) in delivery. Some devices in a mobile enterprise may be on Android 4.1 Jelly Bean, while others may still run Android 2.3 Gingerbread, and there's nothing IT can do to standardize.

Mobile device management
Mobile device management (MDM) software lets IT deliver apps, data and configuration settings to smartphones and tablets. A mobile enterprise typically deploys MDM for security reasons; most commonly, MDM lets IT see what users are doing on their mobile devices, blacklist and whitelist apps and remotely wipe devices in case of loss or theft.
BYOD policy
A bring-your-own-device (BYOD) policy governs how employees may use their personal smartphones, tablets and computers at work -- and the extent to which corporate IT will support these devices. BYOD policies vary widely between organizations, because no two companies will have the same use cases, IT resources and security concerns. A BYOD policy will typically state who can do what with particular apps on certain devices.
Device-agnostic
Apps and websites that work with most operating systems and device types are device-agnostic, but the term also applies to any hardware or software that is compatible across different systems without special adaptations. App development has begun to lean toward device agnosticism to help IT departments avoid unmanageable support demands. When apps work across a broad range of devices, they're better for users and for IT.

Saturday, 2 March 2013

Enterprise Resource Planning (ERP)


There is no business today, without an ERP application. Many companies now are shifting their focus on ERP, including Small and Medium Enterprises. An ERP software solution seeks to streamline and integrate operations, processes and information flows in an enterprise, to synergize the resources of an organization namely men, material, money and machine. In other words, ERP systems integrate all data and processes of an organization into a unified system. A typical ERP will use multiple components of computer software and hardware to achieve the integration. A key ingredient of most ERP systems is the use of a unified database to store data for the various system modules.

Most organizations across the world have realized that in a rapidly changing business environment, it is impossible to create and maintain a custom designed software package which will cater to all their requirements and also be up-to-date. Realizing these requirements of organizations, companies have designed and developed ERP software, which offer an integrated software solution to all the functional processes in an organization.

Although, in the initial stage ERP originated in the manufacturing environment, now ERP software solutions typically cover all basic business process/functions of any organization, regardless of the organization's business or charter. A typical ERP module include: Manufacturing, Supply Chain, Financials, Customer Relationship Management (CRM), Human Resources, Warehouse Management and Decision Support System. These solutions are often incorrectly quoted as back office solutions indicating that customers and the general public are not directly involved. This is contrasted with front office systems like Customer Relationship Management (CRM) systems that directly deal with customers, or ebusiness systems such as eCommerce, eGovernment, eTelecom, and eFinance, or Supplier Relationship Management (SRM) systems. In reality, ERP modules are cross-functional and enterprise wide software solutions. All functional departments that are involved in operations or production can be integrated in one system using it. In addition to manufacturing, warehousing, logistics, and Information Technology, it also includes; accounting, human resources, marketing, and strategic management.

There are many different flavours of ERP that serve businesses' varying procedure types. An ERP solution has numerous benefits depending on the type of business that it serves; these are business solutions and industry solutions. The industry solutions are designed for people who are working in specific industries, like finance, communications, education, healthcare to name a few.

Importance of ERP software for businesses:

ERP software business solutions are designed for companies that work in a wide variety of areas. IT combines a large number of different elements into a single unit. Three of the most important ERP tools available today are manufacturing, human resources, and finance.The finance tools allow companies to successfully maintain their financial information like that of the assets, accounts, budgets and cash. ERP can also assist a company in managing internal as well as external factors affecting it. A company that uses ERP financial products can save a great deal of money over the long term, the reason being, the productivity of the organization will be improved. Enterprise Resource Planning is instrumental in getting rid of time consuming activities as paper management. A company is able to study their processes, earnings, and performance by merging their operational information with their financial information. Once this information is connected together, a company can become more competitive and productive. Synergy is an important part of ERP solutions. The concept of combining multiple processes into a single whole will allow the company to become successful in the long term.

In addition to finance and business processes, it is also important to look at materials maintenance. Enterprise Resource Planning will allow a company to successfully automate the process of buying materials and maintaining them. There are modules that track the supplies that are purchased and can also make calculations about how these materials should be distributed. It also becomes possible for a company to predict the demand of the market based on history, economic statistics, and data from their employees. They can even decide when a product should be produced, and they can do this based on the raw material that is available. 

Saturday, 2 February 2013

Information Technology Infrastructure Library (ITIL)


Today’s IT systems require a disciplined and controlled approach to system management. The ITIL framework provides a great guide for organisations seeking to streamline processes, improve service delivery and enforce controls. However, a rigid one-size-fits-all strategy to ITIL is not the right answer for all.

The IT Infrastructure Library® (ITIL) is the most widely accepted approach to IT service management in the world. ITIL is a best practice framework that has been drawn from both the public and private sectors internationally. It describes how IT resources should be organised to deliver business value, documenting the processes, functions and roles of IT Service Management (ITSM).

ITIL is a set of books that provide a practical, no-nonsense framework for identifying, planning, delivering, and supporting IT services to the business. The framework is based on proven best practices developed by IT experts around the world and has evolved over the past two decades. ITIL is the most widely adopted approach for IT service management.

ITIL is a public framework that describes IT service management best practice.  It “provides a framework for the governance of IT, the ‘service wrap,’ and focuses on the continual measurement and improvement of the quality of IT service delivered, from both a business and a customer perspective”.

ITIL was first developed in the 1980s by the Office of Government Commerce (OGC), a branch of the British Government. It has become a de facto global standard, with thousands of organizations worldwide adopting it as the framework for establishing IT processes .ITIL comprises of five chapter namely  first Service Strategy, provides an overall strategy for IT services and IT service management. The remaining chapters are Service Design, Service Transition, Service Operation, and Continual Service Improvement.

It’s important to note that the ITIL tell you what to do but not how to do it.

Wednesday, 2 January 2013

BRING YOUR DEVICE (BYOD)


A bring your own device (BYOD) is nothing but allowing employees to bring their own device to access enterprise network.A bring your own device (BYOD) strategy for enterprises can be a winner for both users and administrators. But switching to BYOD requires more than throwing open the barn doors and letting employees buy whatever device they want. IT still needs to manage and secure the data on mobile devices, whether they are owned by an enterprise or user.

In more traditional mobility deployments, the enterprise itself was responsible for all facets of the mobile device, including purchasing, its associated voice and data plans, as well as managing the device assets. The IT department would track what device was assigned to each user and would be the clearinghouse for any device replacement or upgrades. Essentially, IT treated mobile devices in the same way that it did other IT assets like laptops or printers.Consumers, however, are embracing smartphones and tablet devices as ways to stay personally connected. This has led to a two-device dilemma, with many enterprise users carrying both a personal and work device with them. The bring your own device movement is partially a solution for this dilemma, enabling users to carry a single device for both business and personal use.

Bring your own device (BYOD) programs, especially when they include desktop virtualization, have gained steam in organizations looking to centralize desktop management and make hardware management easier. Allowing end users to employ their own personal devices can also make them more productive, saving companies time and money. But if an organization implements BYOD poorly, it can lose control over its infrastructure and, even more importantly, its data.

It’s important to take some time and plan out a BYOD initiative by following these guidelines:

Determine the need for a BYOD program
Some organizations jump on the BYOD bandwagon too quickly, not realizing how it can affect their existing IT infrastructure. Examine how users work on their corporate PCs to gauge whether they will be able to continue this type of productivity on their personal devices. In some cases, users will be a lot more productive given the chance to use their own equipment. Other times, a BYOD initiative just won’t make sense, either because of employees’ work styles, the corporate culture or other reasons.

Consider desktop virtualization
Desktop virtualization can deliver corporate desktop images to personal endpoints, ensuring that there won’t be a drastic change for users when a BYOD program takes effect. At the same time, users can still have very powerful, personalized computing experiences because they are in charge of managing their devices. The added benefit is that IT administrators can manage desktop images directly from one interface and worry less about endpoint hardware.

Don’t forget application delivery
Even though they’ll be using their own devices, employees will still need access to corporate applications. Application delivery is an important subset of desktop management, especially when it comes to BYOD. It means not only controlling how applications get to end users, but also how to monitor and manage application settings all from a centralized location. Virtualization is one way to handle application delivery in your BYOD program.

Plan for BYOD security
Even with a BYOD program in place, IT admins still have to control and manage access to the corporate infrastructure and data. Another benefit of using desktop or application virtualization is that data and applications live in the data center. This way, a lost device doesn’t spell disaster, because the device doesn’t actually contain any sensitive corporate information. As they do with standard, corporate-owned devices, administrators will still need to create comprehensive security groups and strict policies, plus perform general security monitoring.

Get end users’ support
Keep in mind that some of your users might not be up for BYOD. Some people may take issue with the blurring of the line between their personal and work lives, for example. Educating end users and assuring them that their IT department can help them have a better work experience with their personal devices should be on the BYOD checklist. By gradually testing the program, organizations can gain employees’ support and make them much more enthusiastic about using their own devices for work.

Develop BYOD policies
Implementing a BYOD program doesn’t mean users will be able to use any device they want. For BYOD to be successful, admins must decide in advance which devices they will support for various workloads. For example, you can deliver a full desktop to an Android phone, but it probably isn’t practical because of the small screen (and other factors). But delivering that same desktop to an iPad might work for some users. Figure out what the needs of your users are, then pick a device (or devices) to fit those needs. IT also needs to develop, implement and enforce a BYOD policy that governs user access to corporate infrastructure and data on their device.

BYOD still requires mobile device management
Shifting users to a BYOD strategy does not absolve IT from responsibility for mobile device management. It doesn’t matter who is paying for the mobile device, IT will still have to manage that device as a corporate asset. Companies will need tools to support mobile devices, including tools for mobile device management (MDM), mobile security and mobile application management.

Sunday, 2 December 2012

IDENTITY AND ACCESS MANAGEMENT(IAM)

Identity and Access Management (IAM) comprises of people, processes and products to manage identities and access to resources of an enterprise. The ultimate goal of IAM Framework is to provide the right people with the right access at the right time.

IAM components can be classified into 4 major categories: authentication, authorization, user management and central user repository (Enterprise Directory)

Authentication
This area is comprised of authentication management and session management.  Authentication is the module through which a user provides sufficient credentials to gain initial access to an application system or a particular resource.  Once a user is authenticated, a session is created and referred during the interaction between the user and the application system until the user logs off or the session is terminated by other means (e.g. timeout).  The authentication module usually comes with a password service module when the userid / password authentication method is used.  By centrally maintaining the session of a user, the authentication module provides Single Sign-On service so that the user needs not logon again when accesses another application or system governed under the same IAM Framework.

Authorization
Authorization is the module that determines whether a user is permitted to access a particular resource.  Authorization is performed by checking the resource access request, typically in the form of an URL in web-based application, against authorization policies that are stored in an IAM policy store.  Authorization is the core module that implements role-based access control.  Moreover, the authorization model could provide complex access controls based on data or information or policies including user attributes, user roles / groups, actions taken, access channels, time, resources requested, external data and business rules.

User Management
This area is comprised of user management, password management, role/group management and user/group provisioning.  User management module defines the set of administrative functions such as identity creation, propagation, and maintenance of user identity and privileges. One of its components is user life cycle management that enables an enterprise to manage the lifespan of a user account, from the initial stage of provisioning to the final stage of de-provisioning.

Central user repository (Enterprise Directory)
Central User Repository stores and delivers identity information to other services, and provides service to verify credentials submitted from clients.  The Central User Repository presents an aggregate or logical view of identities of an enterprise.  Directory services adopting LDAPv3 standards have become the dominant technology for Central User Repository.

Oracle, Microsoft and IBM are pioneers in IAM technology.

Saturday, 3 November 2012

VIRTUALIZATION

1. What is virtualization?
In computing, virtualization (or virtualisation) is the creation of a virtual (rather than actual) version of something, such as a hardware platform, operating system (OS), storage device, or network resources.

2. How virtualization works?
Virtualization needs a special software that runs as a virtualization layer (called a hypervisor) between the hardware and the operating system.

3. Why virtualize?
There are many reasons for adopting virtualization. A popular one is better resource utilization. It is not uncommon to see servers running at 10 percent or less of their capacity, at different points in the day. By letting several virtual servers share a single set of hardware, a much higher average utilization rate is achieved, and hardware and support costs are lowered. Virtualization also makes it easier to provision and reallocate servers. Instead of having to manually set up a server, the virtualization software can set up a server using a pre-existing template and shift server images from one physical server to another to balance workloads or improve efficiency. It can also automatically set up a new virtual server on a different machine when there is a hardware malfunction. Each application is isolated from the others, which provides greater security.

4. What are the different types of virtualisation?
1. Hardware virtualisation
2. Desktop virtualisation
3. Software virtualisation
4. Storage virtualisation
5. Network virtualisation

5. What are big challenges to virtualization technology?
Backup and restoration of Virtual Machines (VMs), software licensing are big challenges to virtualization technology.

6. Who are the pioneers in the field of virtualization?
 VMware (EMC) is by far the largest vendor of virtualization technology for x86 platforms.
IBM is also into foray with their IBM Virtualization Engine Platform.
Microsoft is also playing a major role in virtualization technology with Windows Server.

Tuesday, 2 October 2012

ON INFORMATION SECURITY


1 .What is Information Security?
Information security is the process of protecting the availability, privacy, and integrity of data.

2. Why Information Security is important?
In today's high technology environment, organisations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from cyber criminals are increasing. Many organisations will identify information as an area of their operation that needs to be protected as part of their system of internal control. It is, vital to be worried about Information security because much of the value of a business is concentrated in the value of its information.

3. What is data breach?
A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. The most common concept of a data breach is an attacker hacking into a corporate network to steal sensitive data.

4. What is data breach means to organisation?
A data leak, may lead to a business loss. An organisation may lose their edge against their competitors. Potential hacking of corporate network may affect business continuity of the organisation.

5. What are the different ways to secure information?
Install proper anti-virus software into the corporate network. Installation of Unified Threat Management (UTM) is highly recommended. Strong Information Technology (IT) policy is highly appreciated. Periodically change passwords wherever applicable. Encrypt and Decrypt the data as applicable. Regular system audit may help to know about the security of the data.

6. Are there any guidelines available?
Yes, there are guidelines available. Follow the guidelines mentioned in ISO:27001 for better governance, risk and compliance.

7. Who is responsible for information security in an organisation?
The ownership varies depend upon the size of organisation. Normally in a big organisation, it is the responsibility of chief information security officer (CISO) and in small organisation it is the responsibility of System Administrator or Network Administrator.