The proliferation of smart phones and tablets is at record levels, and no one sees them stopping anytime soon. With these new devices coming out everyday, remote access and potential for issues to arise will continue to increase as well.
Mobile Security will be a big focus for a number of companies as we shift in 2012, and Trend Micro is here to help.
As smart phones and tablets enter and traverse networks at record levels, IT administrators will have to find ways to ensure that devices accessing corporate resources are secure.
Look no further than Trend Micro Mobile Security.
There are 3 main technologies behind the security:
1. Walled Garden – essentially keeps network applications (email) completely separate from regular consumer applications
2. Remote Wipe – if the phone is lost or falls into non-company hands, it can be remotely wiped
3. Encryption – the contents of the phone can be encrypted and secure
As a plug-in to Trend Micro’s OfficeScan, organizations can quickly deploy the mobile security app to IOS (iPad & iPhone), Android, Windows, Symbian, and RIM Blackberry devices.
The devices can be remotely provisioned, encrypted and password protected. Remote lock, remote wipe, power-on-password enforcement, and location tracking are some of the key features that you will have at your disposal. Plus you’ll know that your devices will be protected through Trend Micro’s best in class cloud-based threat intelligence, Smart Protection Network, safeguarding against malware, viruses, malicious code and attacks.
Plus the app gives the smart phone user the ability to filter calls and messages. So if an unwanted user is calling and texting you, you can simply put them on the block list and move on.
The game has changed: Smart Phones and Tablets are omnipresent and being able to prevent enterprise assets from being at risk is key.
eGroup can help.
If you are in need of a self-extracting executable, check out Window’s built-in compression tool, iexpress.exe, before investing money on a third-party solution like WinZip. Using Windows native compression format, Cabinet (or CAB for short), the compressed files are more like mini-installation programs with the compressor including support for license files, prompt windows, and the launch of other applications when extraction is finished. Configuration and creation of an executable is an easy step-by-step process handled via the IExpress Wizard. At the end of the wizard, the option to save your configuration as a Self Extraction Directive file (or SED for short) is available. These SED files can be loaded at the start of the wizard or supplied as arguments in the Windows command line, negating the need to complete the wizard twice for the same file. The command line support also makes iexpress.exe perfect for automated tasks via batch files or in custom software.
While iexpress is a great and convenient tool, there is also a few downsides one should be aware of before using it as a solution. For example, a default folder to extract to cannot be defined for the executable and must always be entered in manually before extracting. Also, an executable created with the 64-bit version of the application cannot be decompressed on 32 bit architecture.
For a quick tutorial, we will run through the process of using the wizard to create our first executable, saving our chosen configuration as an SED file, and creating a batch file that make uses of this SED configuration to automatically generate all future executables…
1. Run iexpress.exe from the command line. NOTE: This defaults to the 64-bit version on 64 bit Windows. To use the 32 bit, you have to directly run the iexpress.exe file in SystemWOW64.
2. Choose Create new Self Extraction Directive file.
3. Choose the Package purpose you wish to create. Information about each package type can be found in the description window.
4. Enter the Package title.
5. If you want the user to be prompted with a message at the start of the extraction process, choose Prompt user with: and then type in the message you wish to be displayed
6. If you have a license file to display, choose Display a license: and then click Browse to select the license file.
7. Click Add and select the files you wish to be compressed into the package.
8. If you choose Extract files and run an installation command during Package purpose, you will now be prompted to choose an executable to run or enter a Windows command to execute when the executable is done extracting it’s files.
9. Leave Default selected for Show window
10. If you wish for a message to be displayed when the executable is done extracting, click Display message and type in your message.
11. Enter a full path and file name for the executable.
12. Make sure Save Self Extraction Directive (SED) file is selected. Choose a folder to store the SED file.
13. Clicking Next one more time will create your first executable and then save the SED file.
14. Open Notepad.
15. Type the following: iexpress /N c:/pathTo/SEDFile.SED using your own path for your SED file. The /N argument will skip the wizard and force the iexpress to create the executable from the SED.
16. Save the file as iexpress_test.batch.
17. Double click the file to create a new executable. You will notice the previous one, if it has not been removed from it’s folder, will automatically be overwritten.
Command line switches for the executable: http://support.microsoft.com/kb/197147
Example SED File
FriendlyName=KiXtart 4.10 installation with file associations
Many origanizations struggle with managing the vast landscape of user PCs, the increasingly challenging task of mainting end user security, and all the while staying compliant. In addition, IT departments must use multiple applications and systems to accomplish these tasks. Enter Windows Intune, Microsoft’s cloud PC management solution.
The Windows Intune Cloud Service, coupled with Windows 7, allows IT administrators to centrally manage PCs without having to install any onsite infrastruture. This Microsoft hosted solution allows organizations to deploy Windows updates, mantain end point security, and provide remote assistance for every PC via the Intune web console, including those that are currently not connected to the company’s local network. Also, administrators can effeciently manage their computer assets and licenses to stay compliant. Intune uses Microsoft’s Malware Protection Engine, the same technology used in Forefront and Security Essentials. This solution, in addition to centrally managed security polices, allow IT departments to maintain endpoint security without the need for extra onsite servers. The Desktop Optimization Pack can be purchased to add additional functionality including Enterprise Desktop Virtualization, and Application Virtualization add-ins.
Check out Windows Intune today!
Many times I have run into issues with Microsoft’s User Access Controls. I have been a big fan of simply disabling it.
In Server 2008, the process is just as simple.
Read more >>
While working on a laptop today, I noticed the NUM LOCK was continuously coming on, even after I turned it off. This can be extremely frustrating.
Here’s how to fix it.
Read more >>