Cool Solutions

Mobile

Deploying and Using Remote Management Join Proxy Services in Dual Stack Environments With ZENworks 2017 Update 1



By: and

November 10, 2017 2:00 pm

Reads:638

Score:5

The main objective of this article is to give a step by step procedure for using remote management in a dual stack network environment using Join Proxy services provided by ZENworks. With the introduction of IPv6 support in the ZENworks 2017 Update 1 release, various…

+read more

Tags: , , ,
Categories: Configuration Management, Endpoint Security, IT Operations Management, Mobile, Technical, Unified Endpoint Management, ZENworks, ZENworks Configuration Management, ZENworks Suite

Using Retain Mobile to Archive iPhone Text Messages

qmangus

By:

October 24, 2017 12:36 pm

Reads:505

Score:Unrated

There is a good chance that your organization is using iPhones for business communication. These smartphones could be used for accessing email or other business applications, sending text messages or calling customers. Whatever these devices are being used for, the fact is, you need oversight on mobile communication data generated for business purposes. You need …

+read more

Tags: , , , , , , , , , , , , , ,
Categories: Information Archiving, Information Management & Governance, Mobile, Mobility, Retain Unified Archiving, Technical

In Case You Missed It: Key Takeaways from Micro Focus Techconnect 2017

Gil Cattelain

By:

October 3, 2017 12:54 pm

Reads:1,175

Score:5

Our team just got back from Berlin, where we hosted Micro Focus Techconnect 2017, formerly known as GWAVAcon — the premier technology event for CIOs, IT directors and managers, network administrators, resellers and consultants. This annual event was once again a tremendous success, and our only regret was that we couldn’t take all of our …

+read more

Tags: , , ,
Categories: Announcements, Configuration Management, Endpoint Security, Expert Views, Filr, General, Mobile, PR Blog, Technical, Unified Endpoint Management, ZENworks, ZENworks Configuration Management, ZENworks Full Disk Encryption, ZENworks Mobile Workspace, ZENworks Patch Management, ZENworks Reporting, ZENworks Suite

Can Micro Focus Help Fight Ransomware? The Answer Is Yes!

Gil Cattelain

By:

September 13, 2017 1:43 pm

Reads:752

Score:5

Ransomware—a form of malware that encrypts files and user machines for ransom—remains one of the top threats facing businesses today. According to a new report, ransomware has risen by over 250 percent so far in 2017. And the U.S. is directly in the cross hairs as the country that is most affected by it. One …

+read more

Tags: , , , , , , ,
Categories: Announcements, Business Continuity, Configuration Management, Endpoint Protection Suite, Endpoint Security, Expert Views, File Analysis & Management, File Management Suite, File Reporter, File Services and Management, Filr, Information Management & Governance, IT Operations Management, Mobile, Security, Storage Manager, ZENworks, ZENworks Endpoint Security Management, ZENworks Full Disk Encryption, ZENworks Patch Management, ZENworks Suite

Mobile Phones and The Office—Five Things You Need to Know

Madeleine Low

By:

August 29, 2017 8:31 am

Reads:669

Score:5

For most people, their smartphone has become an extension of their arm. It’s the thing that wakes them up in the morning, and it’s the last thing they check before they go to sleep. In many ways, mobile phones have made work life easier for business employees. They can easily be reached by clients, answer …

+read more

Tags: , , , , , ,
Categories: Collaboration, Configuration Management, Endpoint Security, Expert Views, IT Operations Management, Mobile, Mobility, Security, Unified Endpoint Management, ZENworks Configuration Management, ZENworks Mobile Management

An Introduction to ZENworks Mobile Workspace

Gil Cattelain

By:

August 18, 2017 2:57 pm

Reads:964

Score:Unrated

It’s apparent now that BYOD is no longer a trend: It’s a reality. And for the most part, BYOD policies and practices make your end users happy and increases their productivity. The ability to work on personal mobile devices untethers users from the office, enabling them to work almost anywhere at any time they choose. …

+read more

Tags: , , , ,
Categories: Announcements, Endpoint Security, Expert Views, General, IT Operations Management, Mobile, PR Blog, Security, Technical, Unified Endpoint Management, ZENworks, ZENworks Mobile Workspace

Looking for your #ZENworks Dashboard Requests!

jblackett

By:

August 1, 2017 4:53 pm

Reads:693

Score:Unrated

Hello community! We have recently begun looking at a new theme for the ZENworks product family that we are referring to as “Actionable Intelligence”. This means that we want to provide you with a set of dashboards and widgets within ZCC that will help you quickly identify what’s important to you and then perform actions …

+read more

Tags: , ,
Categories: Endpoint Security, Mobile, Security, Unified Endpoint Management, ZENworks, ZENworks Asset Management, ZENworks Configuration Management, ZENworks Endpoint Security Management, ZENworks Full Disk Encryption, ZENworks Patch Management, ZENworks Reporting

Integrating ZENworks with the Apple Volume Purchase Program and License Distribution



By:

July 28, 2017 3:49 pm

Reads:795

Score:Unrated

This document explains the process of integrating ZENworks with the Apple Volume Purchase Program and the license distribution options with emphasis on reserving licenses for specific devices or users.

+read more

Tags: ,
Categories: Configuration Management, Endpoint Security, IT Operations Management, Mobile, Technical, Unified Endpoint Management, ZENworks, ZENworks Configuration Management, ZENworks Mobile Management

Protect Your Business’s Data with ZENworks Mobile Workspace

Gil Cattelain

By:

May 16, 2017 11:58 am

Reads:1,203

Score:Unrated

If ransomware wasn’t already a household name, then it definitely is one now after the recent global cyberattack that spread across 99 different countries. Business leaders everywhere have gotten the message loud and clear that that this type of malware — which encrypts files and holds them until a payment is received — is in …

+read more

Tags: , , ,
Categories: Collaboration, Endpoint Security, Expert Views, General, IT Operations Management, Mobile, Mobility, PR Blog, Security, Technical, Unified Endpoint Management, ZENworks, ZENworks Mobile Workspace

Using ZENworks 10 Configuration Management to Install iFolder and Create an Account on iFolder Automatically



By:

February 13, 2009 1:48 pm

Reads:8,050

Score:Unrated

ssutapalli explains how iFolder can be installed on Windows workstations using ZENworks 10 Configuration Management, and an account in iFolder can be configured to use it immediately.

+read more


Categories: Configuration Management, File Services and Management, iFolder, IT Operations Management, Mobile, Security, Technical, Unified Endpoint Management, ZENworks, ZENworks Configuration Management

RSS