Wireless network (LAN) is becoming increasingly important to facilitating service delivery in NHS departments. The use of Wireless has expanded rapidly over the last few years. Pilots have become successful rollouts and this technology is an enabler for improved patient safety and quality of care. In some examples from the West Midlands the use of secure wireless access to hospital information systems has contributed to a reduced length of stay in hospitals.
Wireless has enabled many innovations, however, it is the simple flow of information where some of the greatest benefit is felt. Secure wireless networking has enabled staff across buildings, campuses and even entire NHS Trusts to access systems and information quicker in order to make decisions and update information immediately. Previously, staff would have had to physically travel back to their base to enter or gain information about the patient. The use of secure wireless can enable full access for staff to their own systems wherever they are working.
Whether it’s clinical staff accessing electronic medical records, guests requiring Internet access or more specific medicinal applications such as location-based services, the modern demand on Wireless in organisations is increasing. This puts pressure on infrastructure as more and more individuals with devices use Wireless as their primary connection method across Healthcare organisations. It is now becoming ever more important to deploy a reliable and easy to manage solution to support mobility.
Wireless and Mobility Solutions provider LAN2LAN is responding to the demand for Wireless within the NHS through its Workshop Programme. A half-day workshop on Wednesday 22nd October has been designed to help to deliver insight into some of the common challenges, and future opportunities, of deploying Wireless as a primary access layer in an organisation.
It is designed for NHS IT managers looking to improve their knowledge and hands on experience of an Enterprise Grade Solution for clinical staff, guests and locations. During the event, led by an experienced Principle Systems Engineer, delegates will learn how to build a secure, reliable and scalable Wireless LAN, designed to support the modern day requirements of an organisation. They will take away an understanding of:
1. The common Wireless implementation challenges
2. Network planning / Wi-Fi network planning scenario
3. Configuration and easy rollout of access points
4. The creation of network policies that enable employees and guests on your network
The event also features practical training on the configuration of wireless access points. As a bonus, delegates will be equipped with the physical hardware to take back to their respective NHS Trusts - taking the session from theory to practice.
This complimentary morning event is being hosted by Aerohive Networks and LAN2LAN on Wednesday October 22nd at LAN2LAN House, Leatherhead, Surrey (Sat Nav postcode: KT22 7NA).
Please contact LAN2LAN on 0870 787 4001 or email email@example.com to attend the event.
LAN2LAN devise clever solutions to solve the IT challenges of wireless and mobility, email and collaboration, security and managed services. Our world-class team of advisors is widely acknowledged for the innovative use of technology in enhancing, improving and transforming businesses. It is this unique combination of experience and personal engagement that sets us apart from traditional product resellers.
Angela Nightingale October 9th, 2014 12:45:07
Only recently, Microsoft announced it would be discontinuing its instant messaging client Windows Live Messenger (formerly MSN Messenger) in October 2014, 15 years after it was first introduced. Needless to say, instant messaging has evolved significantly to offer much more than just the opportunity for real-time, browser-based chat – particularly for enterprises.
Microsoft’s present-day solution is called Lync, which is available either as a standalone product or as a feature of Microsoft’s subscription-based service which offers Office applications and productivity tools via cloud service. Lync is able to deliver streamlined communications for business users, so colleagues and customers from different locations and time zones can connect, using a variety of methods to communicate, and their device of choice.
What makes Lync particularly stand out is its ability to connect people, rather than just fixed-location phone numbers. Once a user has authenticated their Lync credentials, they can be contacted and contact others through Lync via a landline phone, on their PC or a mobile device such as a smartphone or tablet. Plus, with presence notifications, others will be able to identify your availability, willingness to communicate, as well as information about your location, what device they are currently using, and status. Ideal for keeping tabs on the status of remote workers or maintaining contact with a busy, mobile workforce.
Of course, the most obvious use for Lync is for instant messaging (IM). Real-time conversation is still a quick and effective form of communication but Lync can take IM further by allowing old conversation histories to be captured and stored. Chat rooms for specific users can also be created, and text, image, hyperlinks and emoticons can be shared. Conveniently, Lync is also compatible with Microsoft’s consumer communication product, Skype, allowing for compatible audio and IM communication once a Skype contact address is known.
If you have a large or dispersed workforce, audio conferencing is particularly useful, allowing a speaker (or speakers) to communicate with a large group. Those using a computer or mobile device are able to see clearly who has been included as part of the group and active speakers can be easily identified with visual icons, with dial-in callers also able to join in to the conference.
Whether hosting a conference that is attended by dozens of employees, speaking to a project group or in a support scenario, Lync also offers extremely useful web conferencing and content sharing capabilities too. This could mean sharing a PowerPoint presentation or giving a real-time desktop demo, something which is further enhanced by the ability to permit pass over control of your desktop to others you are conversing with. For example, this could prove extremely useful during an informal collaboration project, where all users can contribute, or during a troubleshooting session with desktop support.
For modern organisations, it is becoming increasingly important for businesses to be able to support face-to-face interaction – both with colleagues and clients. Not only can this help eliminate the need to travel, it offers a more personal experience that can be great for team-building or friendlier relations with suppliers, customers and partners. While video conference compatibility with Skype is reportedly on its way, Lync can presently offer high definition video and audio at a quality that will assure that other users can hear and see everything in the conversation.
For a modern, flexible organisation, the tools that Lync offers unifies communications, reduces operating costs and helps bring your business together – no matter where in the world your users are and what device they are using.
Email and Collaboration solution provider LAN2LAN has delivered consulting and support services to UK and international organisations for more than 20 years. We are experts in delivering large email migration and collaboration technology projects in partnership with our clients, providing end-to-end projects, or “enabling” their internal migration team or simply assisting clients with a skills or resource gap.
LAN2LAN has the skills in On Premise (Lync In a Box) and Cloud based Lync to support any deployment. We also have skills in co-existing Lync with an existing PBX/IPT solution. This is generally for the duration of a migration but can be for a longer-term deployment of true co-existence.
Please contact LAN2LAN on 0870 787 4001 or email firstname.lastname@example.org to understand more about Microsoft Lync and how it integrates with On Premise, Cloud and Hybrid email and collaboration applications to improve enterprise communication and productivity.
Angela Nightingale October 6th, 2014 16:59:48
Last week saw the launch of the much-anticipated Apple Watch with both consumers and marketing departments particularly excited about the potential for this new wearable. Enterprises are however preparing for the impact an increased adoption of smartwatches could have to their business security and how their mobile device management (MDM) policies might have to adapt.
Earlier this year, Gartner predicted that 38 per cent of companies will stop providing their own devices to workers by 2016, with half of the world’s companies forecasted to have bring your own device (BYOD) programs in place by 2017.
Although the idea of wearables becoming prevalent in the workplace might have seemed far-fetched just a few years ago, many believe that the Apple Watch will quickly become adopted as a work tool. Smartwatches may have existed for a while but the incredible popularity of Apple products means that the use of wearables for business use is likely to rapidly increase in the near future.
With its currently revealed capabilities, the Apple Watch has plenty of potential business uses that could be incorporates seamlessly into working life. More than just the ability for marketers to send push notifications to customers, the wearable could also enhance employee productivity. In addition to obvious uses, such as email and calendars, this could be streamlining point of sale signature and approval processes, sending schedules or directions to field workers, or discreet notifications and updates to doctors and the like.
Of course, the introduction of a new mobile device means that IT departments concerned about network security will now have something new to contend with. On the plus side, the Apple Watch doesn’t feature a camera, nor have Wi-Fi or cellular connectivity in its own right. Instead, an Apple Watch needs to be paired with a companion iPhone, meaning an internet connection to the watch will have to pass through any corporate VPN network that has already been established.
However, that is not to say it does not pose any security risks. As with any new Apple device, there is always a rush to see who can be first to exploit any weaknesses. Bluetooth, in particular, has a number of documented vulnerabilities where others can control a user’s phone. In turn, there is plenty of concern about what data, if any, could be cached or collected by the watch.
That said, a secure iPhone means an Apple Watch is far less likely to present a security problem. So, as this new device is not due until 2015, now is the time for a business to take a closer look at how it uses BYOD and what MDM best practice policy it has in place.
These days, a feature such as remote wipe is just a first step towards corporate mobile security. A MDM network security solution, such as Fiberlink’s MaaS360, includes a centralised dashboard to monitor, authorise any mobile device that connects to a business network, as well as enforce compliance, encrypt data and blacklist any apps known for malware or that could compromise enterprise information.
Having a head start to put such a policy in place now means a business and its employees will be able to enjoy the benefits that the Apple Watch might bring, with peace of mind at the same time.
To understand more about End Point Security policies or how MaaS360’s cloud platform can help you with the end-to-end management of today's mobile devices, please contact LAN2LAN on 0870 787 4001 or email@example.com
Angela Nightingale September 22nd, 2014 13:35:34
In the world of computer security, the term ‘sandboxing’ refers to programs that are isolated and stored in a separate, safe environment away from other programs. They are stored in this way so that if they were to pose a security threat, that threat would not spread to other areas on the computers and affect other programs. In this isolated environment, developers and researchers are able to run and analyse new or malicious code without threatening the safety of other programs.
This sandboxing method is now also being applied to network security solutions. Using traditional security processes, malicious code may slip past the system. However, using the sandboxing method, network security appliances are able to perform and inspect network traffic in order to identify any malicious code.
As cyber criminals inevitably grow smarter, using the sandboxing technique to identify malicious code is more important than ever before. Cyber criminals are beginning to learn and understand more about the most common methods of security detection and are specifically focusing their efforts on security detection. What sandbox technology does is help to expose invasive new threats, as well as old threats in new disguises.
Cyber criminals are familiar with all forms of security technology, with some now applying advanced evasion techniques in an effort to cheat the system. With this in mind, detecting malware created by cyber criminals is all about inspecting as many layers as possible and from varying angles of the attack, and the best way to do this is by using a combination of sandbox and gateway-based inspection.
What sandboxing does is provide an additional security layer to the modern-day threat environment. If applied in the right way, it is able to efficiently identify any new threats on the network and enable incident response. For it to work effectively, therefore, it must be integrated with gateway security.
Fortinet offers a wide range of high performance network security solutions designed to detect attacks in real time and thwart them before damage is done. FortSandbox, in particular, is an advanced threat protection detection appliance which enables the identification of highly-targeted and tailored attacks that are increasingly bypassing traditional threat defence systems.
With optional integration with the FortiGate infrastructure, FortSandbox analyses files in an isolated environment in order to identify previously unknown threats and uncover the full lifecycle of the attack. Features of FortSandbox include the ability to inspect across all operating environments, pre-filters to reduce load and latency, the ability to provide rich threat intelligence, and the delivery of officially licensed Microsoft components.
FortSandbox can be integrated with FortiGate, FortiManager and Fortimail security appliances to provide an advanced network security solution across the board. Additionally, information from FortSandbox can be shared with FortiGuard Labs in order to receive automated protection updates to aid organisations in reducing the risk of compromise and breach.
LAN2LAN provide specialist consultancy on all aspects of network security. We are a Fortinet Preferred Partner and can advise on any of the products within their range. Please contact us via email firstname.lastname@example.org or call 0870 787 4001 to speak to one of our cyber security experts for the latest advice.
Angela Nightingale September 10th, 2014 10:14:00
Storage solution provider Talon is showing its claws with its ultra fast file storage and collaboration solution across Microsoft platforms. Founded just 18 months ago Talon has been identified as one of the hottest emerging technology vendors by CRN in the USA. Also receiving additional Globee awards for its meteoric customer and partner growth.
According to a recent interview with Shirish Phatak, CEO of Talon Storage at the Globee awards he attributes success to the following;
· The ability to stay focused on addressing a specific use case around distributed branch office collaboration in Microsoft based environments.
· Identifying those who faced critical issues with collaboration and consolidation of very large files - specifically architecture, engineering, legal, design and healthcare industries
Patented Microsoft-based FAST™ “Storage Caching” technology
Talon Storage is a specialist in optimising file and application collaboration over the Wide Area Network (WAN). The patented Microsoft-based FAST™ “Storage Caching” technology solution addresses the challenges of the distributed workforce. It enables reliable file sharing and improves application performance. It’s a patented alternative to traditional WAN optimisation solutions for application acceleration.
What makes Talon unique?
What makes Talon unique is that its FAST™ File Aware solution plugs into a Microsoft (or virtualised) server environment. This enables the individual Microsoft server team to take control. They can then manage their own collaboration and consolidation projects rather than having to work through their organisation’s IT and networking teams.
Talon FAST™ Storage Solutions is the first solutions provider to offer general-purpose TCP application acceleration technology coupled with native Microsoft file and email support as a standard part of its core platform. The result is that Talon FAST™ delivers a “LAN-Like” user performance for file-aware applications & Microsoft-based file sharing infrastructures across the WAN. This ensures enhanced user productivity and enables Branch office server consolidation for global and national enterprise multi-site collaboration environments. This addresses the limitations of WAN latency, bandwidth, and unreliability to deliver datacentre-class application performance to branch offices. This results in faster delivery for applications including Microsoft Office, AutoDesk and AutoCAD, as well as design applications such as Adobe Creative Suite.
Why is Talon being noticed?
It’s Talon Storage Solutions focus on high-performance file sharing and collaboration across Microsoft platform’s that is getting them noticed. Talon is creating the ability for real-time collaboration between remote workers. Allowing the use of enterprise applications with secure access to centralised or off-premise data. This is uncoupling organisations from traditional branch office storage solutions and enabling centralisation.
Talon’s FAST™ technology enables organisations to simplify their IT infrastructure while delivering mobile users and remote offices fast, reliable, and secure access to data centre applications. This results in improved user productivity and cost-effective IT management. By deploying Talon RemoteFAST™ to a Microsoft server, all remote users can enjoy access to corporate storage and servers as if they were in the same branch location. Those that utilise file-aware applications like AutoDesk, Adobe Creative Suite, Microsoft Office Suite and SharePoint can now work collaboratively. As well as experience dramatically improved application performance through Talon’s File Acceleration and Sharing Technology (FAST™) technology.
Teams are no longer bound by the geography of office locations or national boundaries. Organisations that are sharing these large and complex files are seeing time and resource savings as a result. At the same time the organisation is maintaining control over its remote workers at every location across their network.
Is Talon sector specific?
Talon has built is initial market share by focusing upon storage hungry industries who share large and complex files such as Auto CAD. However, its compatibility with existing Microsoft infrastructure makes it a consideration for any organisation looking at an enterprise file collaboration solution. Talon helps organisations with centralising data, while extending file storage into the branch using Talon's patented Microsoft-based FAST™ “Storage Caching” technology. This in turn simplifies IT infrastructure and systems management by reducing branch office IT costs and economical footprint.
As a leading IT network solutions provider and Microsoft Partner LAN2LAN were amongst the first in the UK to partner with Talon to provide its application acceleration. If you would like more information about Talon FAST™ Storage Solutions, please contact us today on 0870 787 4001 or email email@example.com
Angela Nightingale August 20th, 2014 14:37:30
Optimising IT resource is an ever-present challenge for a CFO. Firstly, it is ensuring the correct balance of in-house and out house capability. Secondly, it is ensuring the underlying contracts are suitability flexible to adapt to changes in the organisation, technology and working practices. Thirdly, it is providing a clear set of measures to ensure the objectives are delivered regardless of who or where the service is provided. Finally it is to support the organisations ever increasing demand for IT related support at a lower cost. A tough gig perhaps, but it was ever such the case. However, as consistent as Christmas the industry evolves to deliver solutions.
Take Cloud computing. It has disrupted the traditional IT strategy since its inception. Cloud promises the potential for reduced costs, infinite scalability of resources, and IT agility necessary to meet shifting business demands. Universally appealing to the entire C suite and the reason why it is receiving such management attention in recent years.
Early adopters have realised it’s not a case of simply virtualise and forget. To be effective in delivering the full benefits, Cloud solutions require management. Scalability, adaptability, lower cost and increased innovation aren’t just inherent outcomes from a Cloud solution. They require an end goal, IT expertise, people, and the organisation to combine holistically.
It is this need for a holistic approach that is fueling a growth in a services-orientated delivery model for Cloud but also IT provision generally. Managed Services is the natural extension of a SaaS solution. If you trust someone to provide you virtual hardware, why wouldn’t you trust them to manage the solution against the measures and outcomes you define?
LAN2LAN have seen increasing demand from organisations that are looking for both the tools and appropriately sized partners to manage their IT services. This was tactical at first and often in response to the deployment of a new solution. However, customers are now taking a more strategic view and looking for a single partner to provide overarching management of a range of interdependent solutions. Currently, there is growth in demand for Managed Services for Office 365 and cloud application monitoring.
LAN2LAN Assist has been created to respond to changing customer needs. It’s not new, it simply brings together all of LAN2LAN’s Managed Service’s under an umbrella brand, LAN2LAN Assist. LAN2LAN’s already successful Managed Service covers the full spectrum of security, wireless and collaboration & messaging. Listed below are a few of the service offerings available :-
1. Assist - Virtual IT Manager
The management of the IT and Telecommunications function can be a costly and time-consuming activity. LAN2LAN’s Virtual IT Manager is a flexible service designed to provide a cost-effective alternative to recruiting in-house resources. Virtual IT manager takes responsibility for the entire IT estate, assisting with IT management tasks such as, but not limited to:
· IT & Telecoms system Management
· Board Level Input and Reporting
· IT System Evaluation
· Manage IT & Telecom Vendor Relationships
· Compliance, DR & BCP
· Budget and Planning
· Auditing and Licensing
· Develop IT policies and Procedures
This tailor made solution delivers the appropriate level of IT resource order to run business successfully to an agreed budget.
2. Assist - Remote Management
LAN2LAN Assist Remote Management & Monitoring helps you avoid the risks of expensive remedial action and reputational damage through proactive monitoring of servers and workstations.
3. Assist - Cloud Policy Manager & Analytics
Most organisations are only aware of 10% of the cloud apps running in their enterprise. Our service allows you to discover all of the cloud apps running in your organisation, whether sanctioned or “Shadow IT”, on any PC or Device, on-premise or remote. Our dashboard will give you visibility of users, sessions and activities like “download” or “share” and the content details. Once visible we can create policies to allow you to say “yes” to your user’s favourite apps whilst taking a granular approach to protecting your organisation and its data
4. Assist - Disaster Recovery and Backup
LAN2LAN provides this service to businesses of all sizes, freeing them from the cost and complexity of legacy backup, disaster recovery and archiving solutions.
This solution allows companies to replace their backup, business continuity, disaster recovery and archiving solutions with a single, integrated platform.
Understanding IT and how to maximise its use for your business is a specialist role. However not all companies have the budget or scale to provision this resource. LAN2LAN specialises in supporting clients with a 50 to 2500 user-base and has done so for over 20 years. It’s proximity to customers and agile structure enables it to understand and respond more effectively than large providers. LAN2LAN Assist is a flexible and affordable extension of its IT Managed Service solution for organisations looking to optimise their IT resource.
If you’d like to know more, please email firstname.lastname@example.org or call 0870 787 4001.
Angela Nightingale August 15th, 2014 08:43:57
Enterprise Mobility Management is the new Mobile Device Management, that’s according to Gartner. In the latest 2014 Gartner Magic Quadrant Report they redefine the sector to reflect its evolution.
What is Enterprise Mobility Management?
Gartner defines “Enterprise mobility management (EMM) suites as consisting of policy and configuration management tools and a management overlay for applications and content intended for mobile devices based on smartphone Oss”.
EMM suites provide the following core functions:
· Hardware inventory
· Application inventory
· OS configuration management
· Mobile app deployment, updating and removal
· Mobile app configuration and policy management
· Remote view and control for troubleshooting
· Execute remote actions, such as remote wipe
· Mobile content management
What was Mobile Device Management?
Mobile device management (MDM) includes software that provides the following functions: software distribution, policy management, inventory management, security management and service management for smartphones and media tablets. MDM functionality is similar to that of PC configuration life cycle management (PCCLM) tools; however, mobile-platform-specific requirements are often part of MDM suites.
What is different from Mobile Device Management?
Essentially EMM brings together mobile device management (MDM) with mobile content management (MCM). IT organisations and service providers use EMM suites to deliver IT support to mobile end users and to maintain security policies. The change to EMM is reflects the evolution in the marketplace to a comprehensive platform solution encompassing an enterprise’s mobile security and mobility.
IBM’s Quadrant leader solution
There has been considerable consolidation between vendors in this sector over the last 12 months, most notably for LAN2LAN in the IBM’s acquisition of Fiberlink. Two of LAN2LAN’s strategic partners are now operating together and LAN2LAN can bring to bear its expertise in wireless, security and collaboration & messaging.
Fiberlink’s MaaS360 product has earned it a leadership position in the Magic Quadrant. A position it has lead for 3 years in a row. MaaS360 was selected a Magic Quadrant leader for Enterprise Mobility Management based on completeness of vision and ability to execute.
The benefits of MaaS360
MaaS360 offers an EMM cloud solution and has introduced an on-site solution for organisations that favour a more traditional approach. MaaS360 MDM supports iOS, Android, Windows Phone, Windows 7/8 and Mac OS X.
MaaS360 is a good fit for organisations looking for a SaaS-based product and those who use IBM collaboration, productivity and security technologies. MaaS360 is considered best in class for its cloud shared-processing multitenant architecture, especially for large installations. Reports from customers recommend MaaS360 for ease of use for both end users and administrators. It can be summarised as delivering;
· A proven approach to cloud-based mobility management
· Powerful management & security to address the full mobility lifecycle
· Seamless integration with all existing infrastructure
· Speed and simplicity with an exceptional customer experience
To understand how MaaS360’s cloud platform can help you with the end-to-end management of today's mobile devices, please contact LAN2LAN on 0870 787 4001 or email@example.com
Angela Nightingale July 24th, 2014 08:46:41
Senior Executives from LAN2LAN were quoted in Channel Pro news as Druva, their endpoint data protection partner discussed its European expansion plans.
Danny Williams, head of mobile security at Druva partner LAN2LAN says the argument for a service like Druva’s is compelling: “According to Gartner, 28 percent of data sitting on end point devices and not backed up... Druva sits in the background and won’t inconvenience you when you’re working. But it will back up data in the background, and cleverly it knows how much of compute you’re using, only using spare computing resources. It saves the user interacting with the corporate process of backup.”
Gary Duke, Sales Director at LAN2LAN adds that early indicators point to Druva becoming “one of the key products” in the VAR’s portfolio. “It’s been a good first six months between the two businesses in what we have achieved, and what we’ll achieve going forward,” he says.
Read the full article at: http://www.channelpro.co.uk/news/8558/druva-charts-growth-path-for-emea
Angela Nightingale July 21st, 2014 10:41:52
Today, we explore the evolution of Network Access Control (NAC) and how Portnox addresses the modern network challenges of mobility, BYOD and connectivity.
Today, we explore the evolution of Network Access Control (NAC) and how Portnox address the modern network challenges of mobility, BYOD and connectivity. Network Access Control (NAC) has become the pressure point where the organisational demand for mobility; device interoperability and wireless connectivity meet the need for protection, control and compliance. The trend of Bring Your Own Device (BYOD) is now firmly established and mobility is accepted working practice for many.
Organisations and solution providers have to review their network security solutions to ensure they accommodate the dual needs of flexibility and control. Modern networks don’t look the same as it did, say, 7 years ago. With the advent of Mobile devices (inc. BYOD), NAC is about far more than just Network Access Control these days. It now has touch points within pretty much every security domain in the enterprise. Any unsecured port has the potential to compromise your network and the definitions of where your networks begin and end is becoming increasingly vague.
The traditional approach to network security was to use firewalls to secure the perimeter of your physical network from external threat. The growth of wireless and BYOD creates exposure to internal threats. Wireless network security solutions provide an additional layer of security. However, to migrate risk completely any security solution must focus upon the end point device.
The key is to identifying the right NAC solution is the recognition of the need to address the following challenges:
Challenge 1 - Increasing numbers and variety of devices:
Employees today want to bring their own devices (BYOD), including tablets and mobile phones. Your network often includes unmanaged devices like IP cameras, air-condition controllers and time attendance units. Each connected device is a potential risk.
Challenge 2 - Increasing numbers and variety of networking platforms and layers:
Whether users connect to your network through the wired LAN, Wireless, VPNs or virtual (VDI) servers, you want to know how and when they are attempting to access the network.
Challenge 3 - Increasing numbers of users:
Your network, whether wired or wireless, will be unsecured from inside and vulnerable to internal threats if you rely solely on traditional firewalls. Contractors and guests bring their own devices requiring specific access control and measures.
In fact most security assaults take place at the network level, far below the radar of perimeter security solutions. If an offender plugs an IP device into a physical network port, anywhere in your offices, they are inside your network. They have completely bypassing your perimeter security and you may not even know. Any unsecured port has the potential to compromise your network.
A solution such as Portnox has introduced a higher level of NAC effectiveness to the market. Portnox treats the root of the Network Access Control (NAC) problem - the network's unprotected internal ports. It secures all IP devices connected through the network's switches. Portnox's Network Access Control (NAC) system easily brings together identity and access management with end point control whilst fulfilling audit and corporate compliance requirements.
With the latest NAC solutions like Portnox you can gain complete visibility and control on any connected personal, virtual, wired or wireless devices through a single access control platform that easily integrates with your network. Portnox offers a suite of Network Access Control solutions covering platform, Cloud, BYOD remote, virtual and even elastic networks. Portnox addresses the evolving, modern-network challenges and delivers a trusted network access management framework, for today’s needs and beyond. By using Portnox Platform you are able to manage and accelerate your network evolution ensuring 100% network security from the inside and out.
LAN2LAN are one of Portnox’ five channel partners in the UK. For more information about the next generation of network access control solutions, contact us on 0870 787 4001 or email firstname.lastname@example.org
Angela Nightingale July 3rd, 2014 11:54:02
Celebrating a 20th Anniversary is remarkable for any business. For Specialist Systems Integrator LAN2LAN, 4th July 2014 is a significant milestone. It is 20 years since four colleagues made the decision to start a business. A solution orientated IT business. The founders believed that hardware & software were becoming commodities and that professional services and specialist consultancy would be the way forward.
The calculated risk to back consultancy & professional services and strike out on their own has paid dividends. Today, 20 years later the same four colleagues remain the guiding force behind the LAN2LAN success story.
We asked Gary, John, Pankaj and Steve to talk us through their experience. They explained the ethos behind the business and plans for the next two decades.
LAN2LAN started on £10,000 in an 800 sq ft office in Chobham, Surrey. Within easy reach of customers in London and along the M25 corridor, the business grew rapidly, achieving £680,000 in year one. Turnover now exceeds £10M per annum. Despite two recessions, LAN2LAN has been profitable every year since incorporation. Self financed, from retained profit, the business now employs over 50 staff. LAN2LAN purchased its Head Quarters and Technology Centre in Leatherhead, Surrey in 2013.
Commercial Director Pankaj Vekria believes the success of LAN2LAN is down to three factors: Integrity, Empathy and Caring. Three words you perhaps wouldn't expect to hear from the Commercial Director of a cutting edge IT business. It is perhaps this focus on behavioural characteristics that sets LAN2LAN apart from its peers. A 95% client retention ratio suggests LAN2LAN's strong values and consultative approach is popular with its clients.
Pankaj remarked, "The founders have always remained friends regardless where we’ve been in the business cycle. We are open and honest, that is the way we are as people and we have tried to impart that to our colleagues and customers. Thank you everyone for the last twenty years, long may the journey continue.”
The caring ethos, consistent management and strong financial base make LAN2LAN an attractive employer. Colleague retention is high with average tenure exceeding five years, unusual in IT.
The investment in talent and training has paid dividends. LAN2LAN is now a leading provider of strategic solutions. A centre of excellence for collaboration and messaging, wireless and security technologies with some of the best people in the industry. An example being, LAN2LAN’s Hacker Awareness workshop with experts in IT security, Cyber security, Network security and Cloud security solutions all contributing.
Real world experience and thought leadership are now as much in demand as technical product knowledge according to Sales Director Gary Duke. "We’re now asked to provide insight across the Collaboration and Messaging (stay in touch), Wireless (stay connected) and Security (stay safe) spectrum. These three areas represent the core pillars of LAN2LAN’s expertise. There are very few companies in the UK that can provide specialist skills in all three areas. This gives LAN2LAN a distinct advantage over its competitors, and provides their clients with true end-to-end project ownership & delivery.
The demand for expertise around SaaS and mobility has inspired LAN2LAN. The Cloud trend has driven wholesale change in the delivery of IT services.
Gary Duke is excited about LAN2LAN’s Managed services offerings. “Cloud service doesn't mean connect and forget. SaaS still requires oversight and support. LAN2LAN Assist is an efficient and cost effective alternative to in-house provision. Everything in one place, designed and managed centrally by LAN2LAN, backed by Service Level Agreements"
With the demand for Cloud computing and true mobile working driving the need for new innovative apps and the re-platforming of ‘legacy’ business applications, the founders have launched LAN2LAN Software Services http://www.lan2lansoftware.com to coincide with the 20th Anniversary celebrations. LAN2LAN is confident that it will mark the start of the next chapter in the evolution of the business. What is certain is that the ethos of integrity, empathy and customer service will remain at the forefront of everything they do.
If you would like contact the team at LAN2LAN on any aspect of collaboration and messaging, wireless and security technologies please email email@example.com or call 0870 787 4001
Angela Nightingale July 1st, 2014 16:47:10