T&A in tough environments

March 2014 Access Control & Identity Management

Econz Wireless and Rugged Phones have announced their partnership to provide businesses operating in tough environments with a full set of mobile applications from employee tracking, to time and attendance and payroll integration.

“Rugged Phones offer some of the toughest smartphones available,” says Harry Lane, vice president global channel sales, Econz. “Our suite of mobile apps will enable employers in environments like construction, manufacturing, distribution, and government to not only track their employees while in the field via GPS, but to give them a full time and attendance record of who is on site and when. Fully integrated with their own accounting and payroll system, this gives employers accurate records in real time.”

Chris Hoffman of Rugged Phones says the partnership with Econz Wireless will provide businesses and organisations with an enterprise-class time and attendance system in the toughest conditions. “The TITAN range of Android phones has ratings from IP67 to IP68 for the Titan 5R and 7R. IP68 is the toughest rating that can be awarded to smartphones and means that the TITAN range will operate just about anywhere. All Titan phones are full-featured smart phones/tablets, compliant with US military standard, MIL-STD-810G, which assesses the viability of a product across a broad range of environmental conditions. The addition of the Econz Wireless mobile time and attendance, employee tracking and payroll apps to our offerings is a great fit for our markets which need mobile apps under the toughest conditions.”

Econz Wireless suite of mobile GPS applications include:

* Timecards GPS Lite – Mobile GPS tracking of employees, and basic timecard information.

* Timecard GPS – Mobile time, attendance, and GPS tracking.

* Eservice GPS – Mobile dispatch and work order management system, and GPS tracking.

For more information contact Econz Wireless, +27 (0)82 535 1255, [email protected], www.econz.co.za

SA Companies need a tighter grip on mobiles in 2014

Mobile security and device management will become one of the top challenges for South African companies as attacks on smartphones and tablets are likely to increase again in 2014. So says Richard Broeke, a consultant at Securicom.

“Reports from two major security software vendors in 2013 show a consistent rise in attacks targeting mobile devices, specifically Android devices. A lot of them are phony apps, downloaded from third-party app stores and text messaging Trojans that cause devices to send out SMSes to premium-rate numbers. There is also growing numbers of more aggressive apps that act as spyware, working in a similar fashion as spyware on a computer, to harvest the information the criminal wants.

“Aside from the personal risk and costs associated with these kinds of infections, employees who use unprotected mobile devices to e-mail, store company data, and connect to the Internet or company network, are putting company networks and information at risk,” says Broeke.

“This is where data exists now, outside the organisation on mobile devices. Cyber criminals want access to that data and are therefore focusing on the locations where it exists, namely the mobile world,” says Broeke.

The reason why cyber criminals want access to data on mobile devices is simple – it gives them access to an organisation’s intellectual property, the very thing that makes a business unique and profitable. Companies should protect data that resides on mobile devices for the same reason they have long been implementing measures to protect the data on their endpoints and servers.

“... By not thoroughly investigating the options available to them and trying to save a few rand a month, companies very easily find themselves with an inferior technology, and no real solution to their mobile security or device management challenges.”

For more information contact Securicom, +27 (0)11 849 8712, www.securicom.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.