IBM Verse Mobile

Most mobile devices come with an email client built in, these apps are integrated into other apps with reminders, notifications and “open with” feature allowing you to send and receive files as an attachment. But that’s about it, that’s your basic email and most times with using work programs, all those functionalities aren’t always easily available.

So what does IBM Verse Mobile offer?

Of course the basics:

  • Emails
  • Calendar entries
  • Corporate address book

In addition to this, it includes apps with more state-of-the-art features in order to:

  • Get presence awareness information (who is available?)
  • Start or join a text-based chat
  • Host or attend web meetings
  • Access my social enterprise network
  • Access my files (documents and media files)

The best way to fully understand exactly all that IBM Verse Mobile is capable of, is to see it in action :


IBM Verse is an example of how modern mobile apps should be built, with the following capabilities:

  • Awareness of other complementary apps, providing single sign-on and avoiding redundancy
  • Integration of all capabilities in one user interface, without the need to switch apps
  • Intelligent design that’s easy to learn and use, including suggestions based on users’ behavior

IBM Verse is said to become available March 30th for IOS and Android users. Please click here to sign up for your free trial and/or contact us today to get started creating a more efficient email platform for your business.

IBM MobileFirst for iOS solutions

When IBM and Apple announced their partnership back in July, I was extremely excited. FINALLY 2 tech giants see that they could create better and more efficient business applications, if they worked together! Who knew?!?! Apple is obviously bringing their user experience and innovative product design to the table, while IBM is offering up their industry expertise and position in enterprise computing. Together they have created 10 apps (so far) exclusively for IPhone and IPads that can be customized for any organization. But Why?  “The business world has gone mobile, and Apple and IBM are bringing together the world’s best technology with the smartest data and analytics to help businesses redefine how work gets done.” Philip Schiller, Apple’s senior vice president of Worldwide Marketing.

So what are these knew apps and what do they do ?

The first IBM MobileFirst for iOS applications include:

  • Plan Flight (Travel and Transportation) addresses the major expense of all airlines—fuel—permitting pilots to view flight schedules, flight plans, and crew manifests ahead of time, report issues in-flight to ground crews, and make more informed decisions about discretionary fuel.
  • Passenger+ (Travel and Transportation) empowers flight crews to offer an unmatched level of personalized services to passengers in-flight—including special offers, re-booking, and baggage information.
  • Advise & Grow (Banking and Financial Markets) puts bankers on premise with their small business clients, with secure authorization to access client profiles and competitive analyses, gather analytics-driven insights to make personalized recommendations, and complete secure transactions.
  • Trusted Advice (Banking and Financial Markets) allows advisors to access and manage client portfolios, gain insight from powerful predictive analytics—in the client’s kitchen or at the local coffee shop, rather than the advisor’s office—with full ability to test recommendations with sophisticated modeling tools all the way to complete, secure transactions.
  • Retention (Insurance) empowers agents with access to customers’ profiles and history, including an analytics-driven retention risk score as well as smart alerts, reminders, and recommendations on next best steps and facilitation of key transactions like collection of e-signatures and premiums.
  • Case Advice (Government) addresses the issue of workload and support among caseworkers who are making critical decisions, one family or situation at a time, on the go. The solution adjusts case priorities based on real-time analytics-driven insights, and assesses risk based on predictive analysis.
  • Incident Aware (Government) converts an iPhone into a vital crime prevention asset, presenting law enforcement officers with real-time access to maps and video-feeds of incident locations; information about victim status, escalation risk, and crime history; and improved ability to call for back-up and supporting services.
  • Sales Assist (Retail) enables associates to connect with customer profiles, make suggestions based on previous purchases and current selections, check inventory, locate items in-store, and ship out-of-store items.
  • Pick & Pack (Retail) combines proximity-based technology with back-end inventory systems for transformed order fulfillment.
  • Expert Tech (Telecommunications) taps into native iOS capabilities including FaceTime® for easy access to expertise and location services for route optimization to deliver superior on-site service, more effective issue resolution and productivity as well as improved customer satisfaction.

The whole idea of these apps is to be able to have access to all necessary information Anytime, Anywhere. This will help employees of all kinds to work more efficiently and in turn it will create superior customer satisfaction rates as well as a more streamlined work flow.

“There’s terrific energy in our collaboration with IBM and Apple around the goal of equipping our professionals with mobile capability that will create new competitive advantage and enable us to re-imagine how we share our knowledge to improve the quality of life for our clients.” Heather Cox, Chief Client Experience, Digital and Marketing Officer for Global Consumer Banking at Citi

While this is the first of  IBM MobileFirst applications for iOS, both IBM and Apple have even bigger plans for the partnership heading into 2015, so stay tuned!!!

Are your employees communicating safely and efficiently?

If you wanted to tell a friend something quickly, how would you go about sending that message? If you’re like most Americans in 2014, you would text them. Wouldn’t you want to be able to take advantage of that same technology when delivering a message to a colleague? In everyday life we use SMS Text messaging to send quick messages to one another via our cellphones, so why can’t we use it in the workplace? What if a nurse could text a doctor their patient’s vitals so he/she can quickly assess the information and send back a quick treatment plan while en route elsewhere? Wouldn’t that speed up the patient’s treatment? Isn’t that kind of quick response something hospitals drive for?

With all the regulations in our workplace (ie. HIPPA, ) sending a regular text message doesn’t quite measure up to being the most secure way to deliver a message. But if this method saves time, is more convenient for all parties, and gets the job down faster, than there must be a way to implement this technology where it can comply with all the necessary regulations.

Celltrust has come up with a solution and it doesn’t only apply to the Healthcare industry, but also to the Financial, Government and Enterprise industries as well. Each industry segment has their own set of regulations they must abide by when discussing business related topics, and with text messaging being one of the most convenient and popular ways for individuals to have a discussion, its only natural that employees would want to carry on discussions that way. And in reality, whether or not the company approves, employees will continue to do so on the unsecure text messaging device until a solution is put into place.

So what are the risks and how does Celltrust handle them :



Celltrust Solution

  1. Lack of Confirmation: Those who send messages do not know if the receiving party ever read them.
Critical Messaging Feature :

  • Redundant paging
  • Critical messages are delivered in less than 10 seconds
  • Critical communication is routed through multiple channels to ensure resilient delivery, minimizing dead spots
  • Delivery, open, and delete notifications provide proof of message acknowledgement
  • Serves as a pager replacement for healthcare professionals and eliminates the need to carry multiple devices
  1. Data Breach : Text messages may reside on a mobile devices indefinitely, which means patient information could be subject to theft or loss, or could be viewed by unauthorized persons
Secure Messaging

  • CellTrust’s mix of secure server registration, multi-factor authentication and 256 bit AES encryption featuring unique dynamic keys and full encryption key life cycle management, provide the highest level of security to prevent mission critical information from getting into the wrong hands.
  • Operates off-line with no signal and when there is a signal messages get exchangedInstant conference room creation for messaging and voice callsSecure and critical messaging with pager capabilities and supports Secure SMS and data through the mobile network or Wi-Fi
  • Group messaging and two-way paging capabilities
  • Allows up to 5,000 characters in a secure SMS
  • Messages can be archived indefinitely dependent on storage capacity
  • Volume control over-ride on Samsung devices for critical messaging and paging
  • Messages can be viewed and managed on wearable devices (Samsung Gear I & II)
  • SecureLine server can be interfaced with your email exchange to allow users to email communications to mobile devices. With this feature, your organization will be able to utilize your email system to send information or other secure messages to mobile phones through the CellTrust dedicated SMS Gateway

  1. Lack of recorded conversations
SMS Archiving offers electronic record-keeping, traceability and archiving for SMS/messaging in support of eDiscovery.Voice Archiving is a voice communication solution that offers an efficient and cost effective way for providing voice archiving and recording services for industries that require highly traceable voice communications.


  1. Mixing of Personal and Work related conversations
Dual Persona/Mobile Business Number : is key to achieving the traceability and archiving demands for mobile compliance and security. The Mobile Business Number provides a secondary business number for employees and creates a dual persona. MBN is completely autonomous from the phone’s actual number by having its own SMS and voice communication, logs, records and audit trails; thus preserving the duality. 
  1. Support BYOD
Supports both Apple IOS and Android devices
  1. Support Regulatory guidelines
The CellTrust SecureLine™ Mobile Collaboration Suite provides secure message and voice archiving, to support regulatory guidelines such as:

  • The Dodd-Frank Act
  • Gramm-Leach-Bliley Act (GLB)
  • Security and Exchange Commission (SEC) guidelines in the US
  • Financial Conduct Authority (FCA) and the Prudential Regulation Authority (PRA) in the UK
  • European Securities and Markets Authority (ESMA) among others
  1. Service interruption or message going without being seen.
Critical messaging a unique Celltrust offering that uses Samsung push notification which overrides the silent mode of the device. Urgent messages are received in less than to seconds. The multi-channel redundancy compensates for dead spots to provide resilient, persistent, paging.

CellTrust is now a global leader in traceable and secure mobile communication and mobile aggregation for healthcare, government, financial services, and enterprise across 200+ countries and over 800 carriers and mobile operators. CellTrust provides industry specific solutions such as:

CellTrust TRACK for Financial Services :

  • Traceability and archiving for both SMS/messaging and voice communication
  • Developed in support of industry compliance (Dodd-Frank Act, GLB, SEC, FCA, PRA and ESMA)
  • No app required on clients’ devices
  • Mobile Business Number
  • Automatic dual phone number persona
  • Critical Messaging for time-sensitive information
  • Access to CellTrust’s standard SMS gateway for affordable client account alerts and notifications

CellTrust COMMAND for Government

  • Critical Messaging and redundant failover channel for mission critical communication
  • Archiving for eDiscovery of both SMS/messaging and voice communication
  • Secure Messaging with 256 bit AES encryption
  • Secure Voice with 256 bit AES encryption
  • Mobile Business Number
  • Automatic dual phone number persona
  • Access to CellTrust’s standard SMS gateway for affordable alerts and notifications

CellTrust VENTURE for Enterprise

  • Access to CellTrust’s own SMS Gateway which provides an affordable way to send alerts and notifications to clients
  • Archiving for both SMS and voice
  • Secure SMS/messaging and voice
  • Redundant failover channel for critical communication
  • Mobile Business Number

To effectively address today’s mobile traceability and security demands, CellTrust believes in actively participating in organizations and committees that shape global mobile best practice. CellTrust works alongside mobile operators, major device manufacturers, and mobile device management providers throughout the world including – Samsung, Good Technology™, and T-Mobile®, among others – to maintain the highest level of leading-edge mobile solutions for our customers.

Giving your employees the capability to send out secure texts can significantly increase your productivity and also save you from compliance violations down the road. So give it a try! Contact us at with any questions you may have!


IBM’s Acquisition of Fiberlink

IBM is known for purchasing smaller niche companies and intermingling their technology with their own, and they are looking to do exactly the same with Fiberlink and its MaaS360 technology.

Who is Fiberlink and what do they provide?

Fiberlink’s MasS360 is an enterprise mobility platform that enables key features such as end to end security and management for applications, documents, emails and devices. MaaS360 provides end users with maximum flexibility to BYOD environments with multi-platform support, self-service enrollment, customized over-the-air configuration, automated policy enforcement, and secure distribution of apps and documents. With MaaS360 you can pick from one of the following product modules, or put a few of the modules together to create a bundle and meet more of your mobility requirements.

  • MaaS360 Mobile Device Management
  • MaaS360 Mobile Application Management
  • MaaS360 Secure Document Sharing
  • MaaS360 Secure Mail
  • MaaS360 Secure Browser
  • MaaS360 Mobile Expense Management
  • MaaS360 Laptop Management

Why did IBM buy Fiberlink?

IBM decided to acquire Fiberlink because its product portfolio was lacking a substantial mobile SaaS option. With continued enterprise interest to minimize data center usage and move to cloud-based services, the acquisition of Fiberlink will allow IBM to fill this gap and integrate the technology with other cloud offerings as well to provide a more complete overall solution by being able to build, run, manage and deploy mobile applications.

Fiberlink’s competitive advantages will further enhance the IBM solutions, by adding:

  • Simple and fast SaaS deployments with an exceptional customer experience for IT and employees, users can often enroll devices in less than five minutes with self-service.
  • Powerful management and security capabilities that are tightly integrated allowing for a complete solution to secure the device, application and the data.
  • Flexible mobile application container options to separate work and personal data and improve BYOD deployments.
  • Seamless integration with existing enterprise systems such as email, directories, and certificate authorities that can usually be completed within an hour.
  • The most trusted and proven approach to delivering mobile management and security backed by a FISMA Authority to Operation (ATO) from the US Government.

What Maas360 will bring to IBM’s endpoint manager?

Combined with other IBM MobileFirst offerings and recent acquisitions, Fiberlink and IBM will provide:

  • Comprehensive mobile solutions. IBM will be able to help clients with their full mobile management and app lifecycle needs – including on-premise and cloud, mobile devices and desktops. Provides seamless integration with existing enterprise technologies and broad OS support.
  • Rapid time-to-value. Enroll devices in less than five minutes with hosting and simple device on-boarding capabilities, hosted in the cloud. Automation and employee self-service reduces the impact to the Help Desk. Easily scale from ten devices to enterprise scale deployments.
  • BYOD and Trusted Transactions. Bring Your Own Device (BYOD) requires balancing organizational security and employee privacy. MaaS360 by Fiberlink, an IBM Company offers dual-persona management over enterprise apps, secure e-mail, web browsing and file sync to achieve this balance.

 And if all that isn’ t enough, MaaS360 is the most recognized, award-winning solution for Mobile Enterprise Management. The following are a few of their most recent awards: 

  • Gartner Magic Quadrant Leader for Mobile Device Management
  • SIIA CODiE Award Winner for Best Mobile Device Application for Enterprises
  • InfoTech Champion for Mobile Device Management
  • Best Mobile Solution from the Enterprise Mobility Forum
  • Best Enterprise Mobile Service at the GSMA Mobile World Congress
  • Best Mobile Solution by GovTEK

Read more about IBM’s Aquisition of Fiberlink here with a quick and informative Forrester Report.

As always, if you have any questions at all, please contact

How do you Manage ALL your endpoints?

Endpoint Management is a popular item on MANY of our clients’ wish lists, but with so many tools that claim to do the job, it can be difficult to choose the best for your environment.

What if you didn’t have to choose?   What if there was one tool that would take care of everything.

One tool that would take care of Mobile devices, Servers both virtual and physical, Desktops, security, patch management, Software management, life cycle management and security.

Well there is …..  IBM Endpoint Manager

IBM Endpoint Manager is a software package that offers a unified platform that automates and streamlines, systems management as well security management for endpoints of all kinds. This unified approach allows you to manage all your different tools like patch management and endpoint security within one program. The great part about the IBM Endpoint Manager is that you can pick the pieces you need, or bundle it all together into one package.

The following are some details about each separate piece:

A.    Desktop and Server Administration :

–          Delivers patch, inventory, software distribution, OS deployment, remote control
capabilities and near real-time visibility into the state of endpoints including
advanced capabilities to support server endpoints.

             I. Asset Discovery and Inventory

–          Create dynamic situational awareness about changing conditions in the infrastructure. You can run distributed scans on the entire network to identify all IP-addressable devices

             II. Software Distribution

–          Policy-based distribution and closed-loop verification of software packages. Automate software distribution for Windows, UNIX, Linux, and Mac OS platforms from a single point of control, reducing new implementation and upgrade projects to days/weeks vs. years/months

            III.Remote Desktop Control

–          Provide support and control for Windows and Linux desktops, notebooks and servers throughout the distributed environment from a central location. System management and troubleshooting, remote diagnostics and remote desktop capabilities are provided.

          IV.Power Management

–         Provides near real-time tracking. System administrators know how much time an endpoint spends in idle, standby and off states. This creates an accurate view of current power usage and costs.
–        Enables administrators to create highly complex power profiles that can be used to generate savings even in unusual computer usage scenarios.
–       Provides a “what-if” scenario calculator, which helps project potential energy savings and encourages conservation initiatives.
–       Generates reports that help you visualize ongoing energy consumption and savings, and measure the associated ecological impact.

         V. Patch Management :

–          Delivers patches to endpoints for Microsoft Windows, UNIX, Linux and Mac operating systems.
–          Delivers patches to endpoints for third-party applications from vendors including Adobe, Mozilla, Apple and Java, along with customer-supplied patches.
–          Supports a variety of endpoints. These include servers, notebooks, desktops and specialized equipment such as point-of-sale (POS) devices, ATMs and self-service kiosks.
–          Supports patching of online and offline virtual machines including roaming devices using Internet connections so that virtual and cloud environments have the same level of security as physical systems.
–          Can support up to 250,000 endpoints from a single patch management server.
–          Automatically assesses the endpoint status once a patch is deployed.
–          Confirms successful installation and updates the management server. This step supports compliance requirements, which require definitive proof of patch installation.
–            Provides proof of continuous compliance, which can help you pass audits and comply with regulations.
–          Can enforce policies and help you quickly report on compliance to improve your organization’s audit readiness.

VI.  Server Automation- Enables users to easily deploy and manage servers across heterogeneous platforms using either pre-built or custom automation. From the simple user interface, users can create, save and reuse automation flows or take advantage of out-of-the-box automation capabilities

B.   Software Asset Management

–          Track software usage patterns and trends across Windows, UNIX and Linux endpoints with always on asset management to enhance license compliance. Manages software assets from procurement to retirement using control desk integration.

 C.   Mobile Device Management and Security

Address issues of security, complexity and bring-your-own-device (BYOD) policies across a unified platform that spans Apple iOS, Google Android, Blackberry, Nokia Symbian and Microsoft Windows Mobile platforms.

–          Extend endpoint management with a single solution for viewing, managing, and securing mobile devices, laptops, desktops, and    servers
–          Protect data on lost or stolen devices with remote password locks and resets, partial and full data wipes
–          Rapidly adopt new capabilities to meet the ever-increasing sophistication of threats and attacks
–          Help control IT costs and reduce management complexity as the number of endpoints that need management grows

D.   Endpoint Security, Protection and Compliance 

Provides unified, real-time visibility and enforcement to protect distributed environments against threats that target endpoints and helps organizations to comply with regulatory standards on security

–          Centralizes the management of functions to coordinate among IT, security, desktop and server operations.
–          Guards against the full range of malware and scans POP3 email and Microsoft Outlook folders for threats.
–          Delivers integrated DLP capabilities using the same single console and single agent.
–          Monitors and controls physical ports on endpoints. You can apply additional protections to restrict removable USB storage devices.
–          Determines the safety of a file and prevents users from opening infected documents. The web reputation feature automatically determines the safety of millions of dynamically rated websites.
–          Identifies suspicious system activities. If triggered, it can block execution to help prevent potentially damaging activities.

So whether you are looking for a full endpoint management package, or just a piece of the overall solution, the IBM endpoint manager is the solution for you. Each piece is easy to use and will save you and your team time by allowing you to push out updates and receive results faster than ever before. For more information please click here and feel free to contact us at anytime!

Introducing IBM MessageSight

According to an IBM study, CEOs for the first time have identified technology as the most important external aspect impacting their organizations today. Industries are transforming with the adoption of Big Data, cloud, mobile and social business technology. These technologies are improving customer/employee engagement, creating new partnerships and driving competitive advantages throughout each industry, but many organizations are still struggling to keep up with the explosion of mobile technology and the sheer volume of data being generated.

To meet these growing needs, IBM MobileFirst was launched back in February to help clients design, deploy, secure and manage mobile strategies and apps. Yesterday, IBM announced a new technology that compliments the MobileFirst Platform, IBM MessageSight.

IBM MessageSight, is a 2U appliance designed to help organizations manage and communicate with the billions of mobile devices and sensors found in a variety of systems such as automobiles, traffic management systems, smart buildings and household appliances. This appliance is a big data orchestrator, and is capable of handling up to 13 million incoming messages per second flowing in from up to 1 million different sensors installed in anything — automobiles, medical equipment, home appliances, mobile devices – and then that data will be  transformed into useful information.

IBM MessageSight’s uses can be applied to all industries, for example:

  • In the retail world, a company could see in real time which products are selling out fast in its stores, via RFID, sensors on the shelves, or point-of-sale data. A trigger could kick off an automated order to manufacturers or distributors to order more.
  • In the automotive world, dealers and car manufacturers could collect real-time data from sensor-enabled cars and keep a tab on potential widespread defects in a new model.
  • If a dozen county hospitals were equipped with sensor-enabled medical equipment, the system collecting the data might observe a spike in a particular disease and warn of a potential epidemic before it spirals out of control.

Loading equipment and inventory with sensors is the easy part, relatively speaking; the biggest challenge is actually being able to manage and process all that incoming data. Over the next couple years, the number of machines and sensors connected to the internet will explode. By 2020, there will be more than 22 billion Web-connected devices, according to IMS Research. These new devices will generate more than 2.5 quintillion bytes of new data every day, with enough information consumed each hour to fill 7 million DVDs.

“Until now, no technology has been able to handle this volume of messages and devices. What’s even more exciting is that this only scratches the surface of what’s to come as we continue down this path of a Smarter Planet.”   said Marie Wieck, general manager, WebSphere, IBM.

IBM MessageSight is scheduled to be generally available within the next month, in the meantime if you have any questions at all please feel free to drop me a note at

IBM Mobile First

IBM Mobile First

Introducing the most comprehensive mobile portfolio EVER!! This fabulous new portfolio was just announced and it really is a HUGE game changer.

IBM Mobile First combines security, analytics and app development software, with cloud-based services and deep mobile expertise. Using IBM MobileFirst solutions, businesses can now streamline everything from the management of employee mobile devices, to the creation of a new mobile commerce app that will transform their entire business model.

So How does it work? How is this going to change the way we do business? Well essentially Mobile First changes everything.

The world is mobile. Customers want convenience and enterprises need to accommodate this by innovating and of course ensuring end to end security. So IBM came up with a portfolio that does it all.

Here are just a few of its features:

–          Brings resources together to strengthen customer and employee engagements in REAL TIME

–          Allows true end to end mobile solutions and security (the only platform that brings it all together)

–          Improves collaboration and workforce productivity by allowing employees’ BYOD to connect to networks, data and enhanced apps.

–          SECURITY , SECURITY,  SECURITY – single sign on, reporting, threat detection, encryption, app level VPN. (virtual private network) etc.

–          Allows you to gain visibility of mobile customers’ experience across your mobile websites as well as apps, eliminating obstacles that block successful conversions

–          Enhanced analytics with Cognos Mobile – allowing your company’s BYOD to view and full interact with reports, dashboards, metrics and analytics.

–          Develop, deploy , integrate and manage application and infrastructure elements of your mobile enterprise and end-user platforms

–          Helps companies connect and collaborate through integrated voice, data and video channels to support a mobile workforce.

–          Is an open, mobile application platform for smartphones and tablets. Allowing you to develop, run and manage HTML5, hybrid, and native applications.

–          Automates testing for high-quality mobile apps.

–          Allows you to create personalized, content-rich multichannel experiences for customers and employees easily and cost-effectively.

And the list goes on.

Check out a quick summary of how others are deploying its capabilities here  And read about it here!

As always if you have any questions or just want to chat and learn some more , feel free to contact me at anytime

Organizations’ BYOD security Issues SOLVED

“A recent survey should raise some alarms among healthcare providers who have adopted or are considering a bring-your-own-device (BYOD) strategy.”

Organizations in every industry are adopting the BYOD strategy, but what happens if that smart phone gets lost? Stolen? Your entire organizations security is now breached. ”  51 percent say their companies don’t have the capability of remotely wiping data from a device if it is stolen or lost.” THAT’S INSANE! The Healthcare industry is even more at risk when they allow employees to BYOD, since most don’t have proper security in place. That lack of security can lead to violations against HIPAA guidelines for protecting sensitive patient data.

IBM’s incredible solution? ” TEM ” Tivoli Endpoint manager, that essentially does just that… Manages Endpoints. With TEM you can safeguard all devices, as well as manage them from a single platform. If a device is lost or stolen you can REMOTELY and selectively wipe it clean so that your sensitve information will not become public knowledge. Imagine that you have a disgruntled employee that just got laid off, and they have all of your organization’s confidential information on their cellphone. Before that employee is able to even leave the building, you would be able to wipe that device clean. Now that’s some amazing management of technology!!!!

Not only did you just save plenty of clients’ information, but I’m sure your legal department is also very pleased with you as well!!  🙂

So what are you waiting for? Check out TEM for yourself, read the Data sheet here.

And check out this publication that refers to the Healthcare Industry and the major gamble it takes by not deploying security software on employees’ BYOD Here