Are your employees communicating safely and efficiently?

If you wanted to tell a friend something quickly, how would you go about sending that message? If you’re like most Americans in 2014, you would text them. Wouldn’t you want to be able to take advantage of that same technology when delivering a message to a colleague? In everyday life we use SMS Text messaging to send quick messages to one another via our cellphones, so why can’t we use it in the workplace? What if a nurse could text a doctor their patient’s vitals so he/she can quickly assess the information and send back a quick treatment plan while en route elsewhere? Wouldn’t that speed up the patient’s treatment? Isn’t that kind of quick response something hospitals drive for?

With all the regulations in our workplace (ie. HIPPA, ) sending a regular text message doesn’t quite measure up to being the most secure way to deliver a message. But if this method saves time, is more convenient for all parties, and gets the job down faster, than there must be a way to implement this technology where it can comply with all the necessary regulations.

Celltrust has come up with a solution and it doesn’t only apply to the Healthcare industry, but also to the Financial, Government and Enterprise industries as well. Each industry segment has their own set of regulations they must abide by when discussing business related topics, and with text messaging being one of the most convenient and popular ways for individuals to have a discussion, its only natural that employees would want to carry on discussions that way. And in reality, whether or not the company approves, employees will continue to do so on the unsecure text messaging device until a solution is put into place.

So what are the risks and how does Celltrust handle them :



Celltrust Solution

  1. Lack of Confirmation: Those who send messages do not know if the receiving party ever read them.
Critical Messaging Feature :

  • Redundant paging
  • Critical messages are delivered in less than 10 seconds
  • Critical communication is routed through multiple channels to ensure resilient delivery, minimizing dead spots
  • Delivery, open, and delete notifications provide proof of message acknowledgement
  • Serves as a pager replacement for healthcare professionals and eliminates the need to carry multiple devices
  1. Data Breach : Text messages may reside on a mobile devices indefinitely, which means patient information could be subject to theft or loss, or could be viewed by unauthorized persons
Secure Messaging

  • CellTrust’s mix of secure server registration, multi-factor authentication and 256 bit AES encryption featuring unique dynamic keys and full encryption key life cycle management, provide the highest level of security to prevent mission critical information from getting into the wrong hands.
  • Operates off-line with no signal and when there is a signal messages get exchangedInstant conference room creation for messaging and voice callsSecure and critical messaging with pager capabilities and supports Secure SMS and data through the mobile network or Wi-Fi
  • Group messaging and two-way paging capabilities
  • Allows up to 5,000 characters in a secure SMS
  • Messages can be archived indefinitely dependent on storage capacity
  • Volume control over-ride on Samsung devices for critical messaging and paging
  • Messages can be viewed and managed on wearable devices (Samsung Gear I & II)
  • SecureLine server can be interfaced with your email exchange to allow users to email communications to mobile devices. With this feature, your organization will be able to utilize your email system to send information or other secure messages to mobile phones through the CellTrust dedicated SMS Gateway

  1. Lack of recorded conversations
SMS Archiving offers electronic record-keeping, traceability and archiving for SMS/messaging in support of eDiscovery.Voice Archiving is a voice communication solution that offers an efficient and cost effective way for providing voice archiving and recording services for industries that require highly traceable voice communications.


  1. Mixing of Personal and Work related conversations
Dual Persona/Mobile Business Number : is key to achieving the traceability and archiving demands for mobile compliance and security. The Mobile Business Number provides a secondary business number for employees and creates a dual persona. MBN is completely autonomous from the phone’s actual number by having its own SMS and voice communication, logs, records and audit trails; thus preserving the duality. 
  1. Support BYOD
Supports both Apple IOS and Android devices
  1. Support Regulatory guidelines
The CellTrust SecureLine™ Mobile Collaboration Suite provides secure message and voice archiving, to support regulatory guidelines such as:

  • The Dodd-Frank Act
  • Gramm-Leach-Bliley Act (GLB)
  • Security and Exchange Commission (SEC) guidelines in the US
  • Financial Conduct Authority (FCA) and the Prudential Regulation Authority (PRA) in the UK
  • European Securities and Markets Authority (ESMA) among others
  1. Service interruption or message going without being seen.
Critical messaging a unique Celltrust offering that uses Samsung push notification which overrides the silent mode of the device. Urgent messages are received in less than to seconds. The multi-channel redundancy compensates for dead spots to provide resilient, persistent, paging.

CellTrust is now a global leader in traceable and secure mobile communication and mobile aggregation for healthcare, government, financial services, and enterprise across 200+ countries and over 800 carriers and mobile operators. CellTrust provides industry specific solutions such as:

CellTrust TRACK for Financial Services :

  • Traceability and archiving for both SMS/messaging and voice communication
  • Developed in support of industry compliance (Dodd-Frank Act, GLB, SEC, FCA, PRA and ESMA)
  • No app required on clients’ devices
  • Mobile Business Number
  • Automatic dual phone number persona
  • Critical Messaging for time-sensitive information
  • Access to CellTrust’s standard SMS gateway for affordable client account alerts and notifications

CellTrust COMMAND for Government

  • Critical Messaging and redundant failover channel for mission critical communication
  • Archiving for eDiscovery of both SMS/messaging and voice communication
  • Secure Messaging with 256 bit AES encryption
  • Secure Voice with 256 bit AES encryption
  • Mobile Business Number
  • Automatic dual phone number persona
  • Access to CellTrust’s standard SMS gateway for affordable alerts and notifications

CellTrust VENTURE for Enterprise

  • Access to CellTrust’s own SMS Gateway which provides an affordable way to send alerts and notifications to clients
  • Archiving for both SMS and voice
  • Secure SMS/messaging and voice
  • Redundant failover channel for critical communication
  • Mobile Business Number

To effectively address today’s mobile traceability and security demands, CellTrust believes in actively participating in organizations and committees that shape global mobile best practice. CellTrust works alongside mobile operators, major device manufacturers, and mobile device management providers throughout the world including – Samsung, Good Technology™, and T-Mobile®, among others – to maintain the highest level of leading-edge mobile solutions for our customers.

Giving your employees the capability to send out secure texts can significantly increase your productivity and also save you from compliance violations down the road. So give it a try! Contact us at with any questions you may have!


IBM’s Acquisition of Fiberlink

IBM is known for purchasing smaller niche companies and intermingling their technology with their own, and they are looking to do exactly the same with Fiberlink and its MaaS360 technology.

Who is Fiberlink and what do they provide?

Fiberlink’s MasS360 is an enterprise mobility platform that enables key features such as end to end security and management for applications, documents, emails and devices. MaaS360 provides end users with maximum flexibility to BYOD environments with multi-platform support, self-service enrollment, customized over-the-air configuration, automated policy enforcement, and secure distribution of apps and documents. With MaaS360 you can pick from one of the following product modules, or put a few of the modules together to create a bundle and meet more of your mobility requirements.

  • MaaS360 Mobile Device Management
  • MaaS360 Mobile Application Management
  • MaaS360 Secure Document Sharing
  • MaaS360 Secure Mail
  • MaaS360 Secure Browser
  • MaaS360 Mobile Expense Management
  • MaaS360 Laptop Management

Why did IBM buy Fiberlink?

IBM decided to acquire Fiberlink because its product portfolio was lacking a substantial mobile SaaS option. With continued enterprise interest to minimize data center usage and move to cloud-based services, the acquisition of Fiberlink will allow IBM to fill this gap and integrate the technology with other cloud offerings as well to provide a more complete overall solution by being able to build, run, manage and deploy mobile applications.

Fiberlink’s competitive advantages will further enhance the IBM solutions, by adding:

  • Simple and fast SaaS deployments with an exceptional customer experience for IT and employees, users can often enroll devices in less than five minutes with self-service.
  • Powerful management and security capabilities that are tightly integrated allowing for a complete solution to secure the device, application and the data.
  • Flexible mobile application container options to separate work and personal data and improve BYOD deployments.
  • Seamless integration with existing enterprise systems such as email, directories, and certificate authorities that can usually be completed within an hour.
  • The most trusted and proven approach to delivering mobile management and security backed by a FISMA Authority to Operation (ATO) from the US Government.

What Maas360 will bring to IBM’s endpoint manager?

Combined with other IBM MobileFirst offerings and recent acquisitions, Fiberlink and IBM will provide:

  • Comprehensive mobile solutions. IBM will be able to help clients with their full mobile management and app lifecycle needs – including on-premise and cloud, mobile devices and desktops. Provides seamless integration with existing enterprise technologies and broad OS support.
  • Rapid time-to-value. Enroll devices in less than five minutes with hosting and simple device on-boarding capabilities, hosted in the cloud. Automation and employee self-service reduces the impact to the Help Desk. Easily scale from ten devices to enterprise scale deployments.
  • BYOD and Trusted Transactions. Bring Your Own Device (BYOD) requires balancing organizational security and employee privacy. MaaS360 by Fiberlink, an IBM Company offers dual-persona management over enterprise apps, secure e-mail, web browsing and file sync to achieve this balance.

 And if all that isn’ t enough, MaaS360 is the most recognized, award-winning solution for Mobile Enterprise Management. The following are a few of their most recent awards: 

  • Gartner Magic Quadrant Leader for Mobile Device Management
  • SIIA CODiE Award Winner for Best Mobile Device Application for Enterprises
  • InfoTech Champion for Mobile Device Management
  • Best Mobile Solution from the Enterprise Mobility Forum
  • Best Enterprise Mobile Service at the GSMA Mobile World Congress
  • Best Mobile Solution by GovTEK

Read more about IBM’s Aquisition of Fiberlink here with a quick and informative Forrester Report.

As always, if you have any questions at all, please contact

How do you Manage ALL your endpoints?

Endpoint Management is a popular item on MANY of our clients’ wish lists, but with so many tools that claim to do the job, it can be difficult to choose the best for your environment.

What if you didn’t have to choose?   What if there was one tool that would take care of everything.

One tool that would take care of Mobile devices, Servers both virtual and physical, Desktops, security, patch management, Software management, life cycle management and security.

Well there is …..  IBM Endpoint Manager

IBM Endpoint Manager is a software package that offers a unified platform that automates and streamlines, systems management as well security management for endpoints of all kinds. This unified approach allows you to manage all your different tools like patch management and endpoint security within one program. The great part about the IBM Endpoint Manager is that you can pick the pieces you need, or bundle it all together into one package.

The following are some details about each separate piece:

A.    Desktop and Server Administration :

–          Delivers patch, inventory, software distribution, OS deployment, remote control
capabilities and near real-time visibility into the state of endpoints including
advanced capabilities to support server endpoints.

             I. Asset Discovery and Inventory

–          Create dynamic situational awareness about changing conditions in the infrastructure. You can run distributed scans on the entire network to identify all IP-addressable devices

             II. Software Distribution

–          Policy-based distribution and closed-loop verification of software packages. Automate software distribution for Windows, UNIX, Linux, and Mac OS platforms from a single point of control, reducing new implementation and upgrade projects to days/weeks vs. years/months

            III.Remote Desktop Control

–          Provide support and control for Windows and Linux desktops, notebooks and servers throughout the distributed environment from a central location. System management and troubleshooting, remote diagnostics and remote desktop capabilities are provided.

          IV.Power Management

–         Provides near real-time tracking. System administrators know how much time an endpoint spends in idle, standby and off states. This creates an accurate view of current power usage and costs.
–        Enables administrators to create highly complex power profiles that can be used to generate savings even in unusual computer usage scenarios.
–       Provides a “what-if” scenario calculator, which helps project potential energy savings and encourages conservation initiatives.
–       Generates reports that help you visualize ongoing energy consumption and savings, and measure the associated ecological impact.

         V. Patch Management :

–          Delivers patches to endpoints for Microsoft Windows, UNIX, Linux and Mac operating systems.
–          Delivers patches to endpoints for third-party applications from vendors including Adobe, Mozilla, Apple and Java, along with customer-supplied patches.
–          Supports a variety of endpoints. These include servers, notebooks, desktops and specialized equipment such as point-of-sale (POS) devices, ATMs and self-service kiosks.
–          Supports patching of online and offline virtual machines including roaming devices using Internet connections so that virtual and cloud environments have the same level of security as physical systems.
–          Can support up to 250,000 endpoints from a single patch management server.
–          Automatically assesses the endpoint status once a patch is deployed.
–          Confirms successful installation and updates the management server. This step supports compliance requirements, which require definitive proof of patch installation.
–            Provides proof of continuous compliance, which can help you pass audits and comply with regulations.
–          Can enforce policies and help you quickly report on compliance to improve your organization’s audit readiness.

VI.  Server Automation- Enables users to easily deploy and manage servers across heterogeneous platforms using either pre-built or custom automation. From the simple user interface, users can create, save and reuse automation flows or take advantage of out-of-the-box automation capabilities

B.   Software Asset Management

–          Track software usage patterns and trends across Windows, UNIX and Linux endpoints with always on asset management to enhance license compliance. Manages software assets from procurement to retirement using control desk integration.

 C.   Mobile Device Management and Security

Address issues of security, complexity and bring-your-own-device (BYOD) policies across a unified platform that spans Apple iOS, Google Android, Blackberry, Nokia Symbian and Microsoft Windows Mobile platforms.

–          Extend endpoint management with a single solution for viewing, managing, and securing mobile devices, laptops, desktops, and    servers
–          Protect data on lost or stolen devices with remote password locks and resets, partial and full data wipes
–          Rapidly adopt new capabilities to meet the ever-increasing sophistication of threats and attacks
–          Help control IT costs and reduce management complexity as the number of endpoints that need management grows

D.   Endpoint Security, Protection and Compliance 

Provides unified, real-time visibility and enforcement to protect distributed environments against threats that target endpoints and helps organizations to comply with regulatory standards on security

–          Centralizes the management of functions to coordinate among IT, security, desktop and server operations.
–          Guards against the full range of malware and scans POP3 email and Microsoft Outlook folders for threats.
–          Delivers integrated DLP capabilities using the same single console and single agent.
–          Monitors and controls physical ports on endpoints. You can apply additional protections to restrict removable USB storage devices.
–          Determines the safety of a file and prevents users from opening infected documents. The web reputation feature automatically determines the safety of millions of dynamically rated websites.
–          Identifies suspicious system activities. If triggered, it can block execution to help prevent potentially damaging activities.

So whether you are looking for a full endpoint management package, or just a piece of the overall solution, the IBM endpoint manager is the solution for you. Each piece is easy to use and will save you and your team time by allowing you to push out updates and receive results faster than ever before. For more information please click here and feel free to contact us at anytime!

Is Your Data Secure?

Ever wonder about the security of your data? What kind of security measures are you currently implementing?

Firewalls? -Encryption? – pretty typical answers

But what if “viruses” weren’t the biggest threat to your data? What if your data was being monitored for months, even years and you had no idea! What if one day the FBI just walked into your office and told you that you’ve been breached- I know that’s a little extreme…. But its happened!!!

The U.S. Chamber of Commerce fell victim to precisely this for over a year before anyone discovered it- a whole year of their “sensitive and confidential “ data was being stolen by an outside organization. This organization even had their own search engines developed just to search for specific keywords within the chamber’s documents.

This type of attack is known as an Advanced Persistent Threat (APT)

These threats are targeted at specific groups and use custom malware to penetrate your system. This malware is not detected by traditional antivirus products and typically these organizations will attack using an array of different tactics.

They can and will steal customer/employee data, corporate plans, financial data, even bring down your website… can you afford for this to happen?

To combat all these threats it’s important to deploy a number of technologies like network traffic monitoring and forensics, end point protection platforms, security information and event management (SIEM) and vulnerability assessment technologies. It is essential for businesses today to move beyond deploying the latest network security box to block hackers, and develop a real-time monitoring security environment that identifies all unusual activity.

According to Q1 Labs (an IBM company) “A solid strategy should include collecting network flow data, server and application logs, events and alerts from network security appliances such as firewalls and intru­sion prevention system (IPS) devices, and user activity data such as database activity monitoring (DAM) information, and putting them into a scalable, distributed repository so you can apply big data analytics and indexed search to find the “needle in the haystack” indicating that an attack has occurred.”

But it doesn’t stop there. Just like the rest of the technology world, “hacker technology” is ever evolving as well. Your IT security must be an ever changing environment. The QRadar SIEM (security Information and Event Management) is the leading  solution in the industry, and since January 1st 2013 it is now an IBM company.

QRadar SIEM will help you:

–          Detect Threats

–          Exceed regulation mandates

–          Predict risks against your business

–          Detect INSIDER fraud

–          Consolidate Data Silos

While QRadar is collecting information like security events, networking context/events and user context, it is also analyzing it as well. It then creates reports providing real time event correlation for use in threat detection and compliance reporting/auditing. This step helps to reduce and prioritize the millions or billions of events create throughout your organization that day.

QRadar has so many functionalities including those specifically formatted for virtual environments and mobile devices. It allows you to monitor, analyze and act on intrusions all through one easy to use console.

Read the data sheet here for more information and as always contact Metrotech at with any questions you may have!!