BorderLAN announces availability of mobile applications and solutions for bring your own device (BYOD) challenged organizations. The announcement focuses primarily on securing email on mobile devices.
BorderLAN Inc., a provider of network security solutions, announced today the availability of a new mobile app for businesses allowing easy access to secure email. With a simple per user pricing model, a user can now utilize email in a secure manner and reduce the exposure of sending and storing confidential information on a mobile phone. Data such as email residing on a mobile device can be detrimental in the event of a theft, loss or hack. In fact mobile device OS’s are just now getting the full attention of the hacking community as they realize the value of the data on the mobile devices.
“The BorderLAN announcement is to ensure our customers know we are diligently partnering and reviewing solutions to ensure data security and compliant technologies.” said Craig Smith, President of BorderLAN Inc., Smith goes on to explain the importance of BYOD – “Mobile computing is projected to be one of the fastest growing market segments in 2013 – 2016. Our preparation for helping customers focus reducing legal liability to corporations for having data like PHI, HIPAA and more on a mobile device, while simultaneously avoiding the liability that would normally come with corporate monitoring of an end user device.”
The app available for email security shows a user simple pin key entry, followed by access to the secure hosted email. In this way nothing is on the device and sending can be entirely secure delivery with a 3rd party encrypted mail service. Smith Continued “According to what we’ve read from Gartner Research in April 2013, 38% of companies plan to stop providing mobile devices entirely to end users by 2016. The primary reason for this elimination of devices is liability. BYOD often takes the place of corporate phones, but are even less secure as they are not monitored or managed. We at BorderLAN feel we can finally have the convenience of mobility while maintaining security.”
BorderLAN Network Security sees a steady increase of the use of mobile devices, both corporate owned and private over the next three years. The ability to secure these mobile devices will empower companies to finally use the mobile technologies for convenience and customer service in a way never before seen.
For more information on Bring Your Own Device For Secure Email – Click Here.
BorderLAN finds most AV (Anti-Virus) solutions lacking in their “what’s behind the curtain” report. Most AV technologies use old signatures and variants making a green-field opportunity for hackers and malicious software.
BorderLAN Inc., a provider of network security solutions, announced today the release of their “what’s behind the AV curtain” report, which finds the majority of AV solutions stagnate with technology that looks only for the known AV threats. The BorderLAN report tells customers to about the defensive method of many AV technologies employ, which takes known viruses and variants and applies a statistical match algorithm to the files being opened. Some AV systems are more aggressive in their blocking of known variants, triggered at 50% of a match while other less effective AV systems look for more of a perfect match. Simply stated, most viruses are known, thus AV technologies are designed to block only the identified viruses making the system less effective against zero-day viruses (or unknown viruses). Network Security spending is estimated to double within the next 36 months in part due to the surge of malware and AV threats, yet the complacency in the AV software community has put the world at risk. The BorderLAN report opens some additional questions to the reader that center around what the future would look like with smarter and more unique viruses.
“As malware enters a company, it begins its long mission to extract data, passwords, and more” said Craig Smith, President of BorderLAN Inc., Smith continued – “A good malware is unique and quiet and does not make a fuss within a network, instead it accomplishes its mission as a rouge trained soldier that takes data and leaves without anyone knowing about it. A well coded virus may be already infecting a company but without a good scanning technology, IT will never know.”
The report further concludes that there will be shortly a new frontier of hackers coding unique virus and malware content along with tag-along morphing malware to free-bee software. “Hackers used to want their name in lights for bragging rights. The new generation are professional thieves and they are doing it quietly on purpose. They are going after identities, social numbers, customer lists, credit card numbers, bank passwords, targeted phishing attacks and more. Don’t wait…the defenses must be in place before the attack!” Said Smith.
BorderLAN Network Security sees an increase of targeted undetectable attacks and has taken precautions with customers to ensure the most up-to-date technology is deployed such as a futuristic AV which watches what a file does as a part of its security scan, even before it is opened by the computer. The right technology can help defend against the unknown and the known viruses threats that plague networks. BorderLAN believes the right defense is a mix of solutions including the right AV product, mitigating applications, proper Internet Filtering, security can be greatly enhanced.
A Tradition of Security
For more than a century, The National Banks of Central Texas have been helping customers build their financial security. Now they’re helping protect their sensitive financial and personal data online as well.“We are very aware of our customers’ privacy and were determined it wouldn’t be breached, especially in this day and age of identity theft,” said Barry Birchard, the banks’ Information Security Officer. “That’s why we chose Zix Corporation for our email encryption solution.”
With close to 30,000 customers — a significant number of them overseas on active military duty — The National Banks of Central Texas felt it was imperative they provide a top-notch level of security that would make their customers feel at ease when conducting online transactions from such far-flung postings as Afghanistan and Germany or as close to home as Copperas Cove or Gatesville, Texas.
“Having ZixCorp Email Encryption Services in place was a way we could guarantee our customers’ confidential information was protected,” said Birchard. “Before we implemented this solution, we were getting privacy questions from customers all the time. Now they can see right away that our email is encrypted and that makes them feel safer. They also like that they can ask us questions about their accounts by sending us a secure email themselves.”Birchard set up specific criteria that encrypt such personal data as account information, loan and mortgage applications, and Social Security numbers. “Anything of a sensitive nature is automatically encrypted,” he said.
Birchard says the ZixCorp® solution is easy to use and requires minimal maintenance. “The ZixCorp solution is a workhorse that keeps plugging away. I don’t have to do anything with it. I can set it and forget it, because it’s so reliable,” he said. “And when you’re a network administrator, you’re very grateful for that.”
Any challenge in supporting the increasing diversity of devices involved with BYOD?
Anytime you open the door for outside devices you have to ask yourself “what is technology’s role in your tech plan?” With a NAC solution you have the ability to detect what kind of device is trying to connect to your network; with policies you can determine what access to give. Furthermore the NAC solution can also detect if that device is “safe” for your network by detecting Anti-Virus setting to insure compliance.
Let’s face it: IT managers are not salesmen and often can be completely misunderstood with “geek speak”. With terms like BYOD, SNMP, NAC, MDM and even PC can become confusing to the non-initiated.
The key is to sell the sizzle not the steak.
In other words what decision makers want to hear is not BYOD but how awesome it will be if “Johnny” can bring his laptop he got for Christmas to do school work. Without having to do a lot of training for the teachers or risk to the network.
For years IT managers have been worried about people bringing their own technology into the classroom – what kind of viruses are they bringing onto the network? How many hours will be lost from support tickets from technology that’s not even owned by the school?
But as time progresses so did the realization that the funding level for technology maintenance and growth in schools are insufficient.
With a Network Access Control (NAC) a school can now set policies and provides a security gateway for newly connected machines. The NAC can provide flexibility to select and use policy modules needed to satisfy the requirements of their security plan and enforce them across the network. Read More: http://borderlan.com/byod-for-schools/
Technology is playing an increasing role in education every year – we have to have a greater density and access to technology. At one time it was a popular expression “10:1” that’s a ratio of ten students to computer but now “1:1” is becoming the standard.
Most decisions are made to move into BYOD comes with a realization that with schools limited budgets makes it impossible to reach the technology density required to be effective.
BorderLAN’s BYOD solution makes it possible for students to bring their own devices to school while at the same time maintaining required standards (Security, privacy and regulatory). Read More.
I was fascinated at the idea we might be able to overcome the fact we have a growing need to provide access to our students. Because of the kind of curriculum deliver we are faced with and that’s only going to become more important. Without having to expend massive amounts of money that we don’t have, to provide these technologies for the students.
The secret is that all these kids have parents/grandparents/guardians that give those kindles, iPads, laptops for birthdays, Christmas etc. Furthermore these kids are often better then us at using these technologies. So why wouldn’t we want to find a way to let the students bring these technologies on campus.
The problem is we have a number of things we have to deal with that are different than businesses like Starbucks. Among them are the CIPA/FIRPA regulations and the risk of allowing viruses into the network. BorderLAN’s BYOD solution allows non-organization owned devices to connect with less worry of security breaches, viruses and open policy. It’s also very easy to use and implement and enforce compliance with policies in place.
District makes choice after evaluation determines ESET Anti-Virus speedier, more efficient
WEST DES MOINES, Iowa – In the age of shrinking budgets and aging computers, school districts are forced to start thinking outside the box maintain their network security. “A locked-down and well-managed desktop PC can be over 40% less expensive to maintain than an unmanaged one that fails often and only last a few years,” explained Craig Smith of BorderLAN, a nationwide network security provider. “With 70,000 unique pieces of malware variants being identified daily, you need the best anti-virus software you can find.”
The West Des Moines Community Schools (WDMCS) – the state’s ninth-largest K-12 district, including 14 schools, more than 9,000 students and 1,200 employees – understood. After conducting an independent case study of available Anti-Virus programs, it selected ESET as its exclusive AV system.
Said Scott Crothers, district network engineer, “Most AV systems these days have lost their way and become huge bloat software that does very little, uses more than it should and does not do the primary job it was designed for. We used many of the popular AV’s in the past but now we needed one that had two simple requirements: fast boot time and low footprint on local resources.”
A WDMCS team launched an evaluation of the three biggest names in anti-virus software … and just before conducting its tests was introduced to ESET by BorderLAN Network Security.
Identical personal computers were formatted and each loaded with a different AV program. The team timed regular boot cycles, and evaluate boot resources, along with ongoing local resources to gauge the impact of each installation. The winner was ESET — with a noticeable 45 seconds faster boot.
“Boot speed was important, but only part of the equation,” Crothers said. “The next test evaluated the resource usage of the AV systems in background / standby mode and in scan mode. Hands down, ESET not only used half of the resources of its competition, but also completed the scans faster.”
Scan technology was also an important factor in the WDMCS case study. “We found ESET to be very proactive in its signature update process for known threats,” said Crothers. “Moreover, ESET’s heuristics-based scan engine was able to identify threat variants that have morphed from their original known threat signatures. Given the dynamic nature of modern viruses, trojans, spyware, and malware in general, ESET’s effective capability to combat zero-day threats made for a clear decision.”
Crothers continued, “Prior to ESET, the AV bloatware we were using was causing delays in the classroom and even caused slower application performance due to low resources. We feel we have extended the life of our PCs by using ESET.”
“We needed something simple, fast and affordable and BorderLAN delivered. ESET and BorderLAN exceeded our requirements and impressed us further with technical support and helpfulness.”
About BorderLAN Inc.
BorderLAN is a California-based nationwide provider of innovative and budget-friendly software, specializing in hassle-free network security solutions for IT and compliance needs as well as deployment assistance. BorderLAN clients include thousands of schools, businesses and government offices.
New facility and key hiring positions available as BorderLAN Network Security prepares for additional growth.
San Marcos (I-Newswire) May 2, 2013 –BorderLAN Inc., a provider of network security solutions, today announced the growth into a larger office in North County San Diego, to accommodate current growth. The office will be located at 950 Boardwalk, San Marcos, CA 92078. BorderLAN expects tremendous success in the coming months in backup and recovery, energy management, email security, Internet monitoring and web security. The company’s primary objective and vision is to obtain complete customer satisfaction by supplying the right products that customers need before disaster strikes.
“BorderLAN understands the challenges that Customers face in budgeting for network security and can supply affordable solutions and options that were often previously unknown” said Craig Smith, President of BorderLAN Inc. Smith continued – “We have listened to our customers and found that 92% say they need to acquire more network security solutions, yet their budget is restrained. A common goal we share with network managers is to get more network problems solved with fewer resources and budget. BorderLAN can find solutions to save our customers money over while seeing an improvement in features and performance.”
BorderLAN Network Security has seen significant growth in its corporate and education customer base, particularly as CEO’s, network administrators and educational institutions demand more effective solutions for their networks. This includes Internet security, e-learning, email encryption, backing up and restoration of critical data, and data security.
BorderLAN’s innovative approach to solving network security needs has supplied customers with the latest defenses against unknown and known attacks. Over the last three years, the company has seen over 200% growth and strives to find talented individuals to help fill its office space and arm our customers against the ever changing security threats.
About BorderLAN Inc
BorderLAN Inc. is a nationwide provider of innovative and budget friendly IT Security Solutions. BorderLAN’s customers include thousands of Schools, Businesses and Government organizations. BorderLAN represents the best network security solutions for IT Security and Compliance needs. BorderLAN finds the latest products in emerging markets and provides honest advice on what’s best for each customer. BorderLAN is always there for clients before, during, and long after a sale. BorderLAN works hard to ensure a successful project roll out and strive toward a long term relationship. BorderLAN believes in an upfront hassle free experience while providing up-to-date IT industry trends, installation videos, and network security information.
BorderLAN also helps organizations comply with IT Solutions that match budget challenges. The high integrity and security expertise offers simple solutions and products that solve the most complex network problems. BorderLAN save’s IT time and money both short and long term. BorderLAN offers special payment terms, discounts and can provide deployment assistance.
Says Smith – “At the end of the day the solutions we provide helps IT departments sleep at night. BorderLAN Inc. solutions help businesses become more productive by reducing downtime preventing data-loss. As wonderful and powerful as computers are, there is a downfall…productivity loss, liability, and data-loss. We’re finally able to do something about it.”