Webinar (8/27): Your Best Just Got Better - Maximize Your Business and Your Life!

Join Jason Womack, MEd, MA and CEO and Founder of The Jason Womack Company, and Ramon Ray, Regional Director of Development of Infusionsoft, on August 27, 2013 at 3pm ET for a webinar on how to maximize tools, systems and processes to achieve a quality work / life balance.

Your Best Just Got Better: Maximize Your Business & Your Life

Tuesday, August 27th

3 pm to 4 pm EDT

Author of Your Best Just Got Better: Work Smarter, Think Bigger, Make More, Jason shows that working longer hours doesn’t make up for a flawed approach to productivity and performance. Entrepreneurs need to clarify their habits, build mindset-based strategies, and be proactive. Womack’s signature workplace performance techniques offer specific strategies to consistently and incrementally improve performance.

During the webinar, Jason will provide practical methods to maximize tools, systems, and processes to achieve quality work/life balance. He has worked with leaders and executives for over 16 years in the business and education sectors. His focus is on creating ideas that matter and implementing solutions that are valuable to organizations and the individuals in those organizations.



Should You Outsource Your Social Media Marketing? Yes…and No. Main Street Hub - Review

There’s lots of great companies developing services wherein they assist you with a full suite of social media marketing activities.

While there are MANY local experts that help setup your Twitter accounts or get you start on LinkedIn many services are even helping you post online, find content and make you look like a social media rock star. Likeable Local recently launched such a service which I saw launched at a recent New York Tech Meetup

I’ve been looking at another service, Main Street Hub which gives business owners a suite of services to help them be more socially active - it looks pretty good.

Main Street Hub’s services, within various price points includes a hub dashboard to manage your social activity, a service to help you manage what’s said about you on Yelp and Google Plus, a social service which helps you place content on social networks and a service to search customers near your business and market to them.

Services like Main Street Hub are definitely useful for that business owner who has zero time and zero expertise in using social media - but want to quickly start somewhere. What I also like about Main Street Hub is that they are not just a cookie cutter service provider but they focus on a variety of specific industries, such as health car, automotive services and more!

If you have the time to invest in social media or have one of your staff or a smart assistant to post to social media and monitor what’s going on about your business online then you don’t need to outsource your social media marketing. I do think it is worth the money for EVERY business owner to invest a few hours of time with a good online marketing consultant to guide them in how they (the business owner) can better use social media in their business.

Online marketing, including leveraging social media is POWERFUL. It just takes effort, time and simple best practices to do it right.



Should You Outsource Your Social Media Marketing? Yes…and No. Main Street Hub - Review

There’s lots of great companies developing services wherein they assist you with a full suite of social media marketing activities.

While there are MANY local experts that help setup your Twitter accounts or get you start on LinkedIn many services are even helping you post online, find content and make you look like a social media rock star. Likeable Local recently launched such a service which I saw launched at a recent New York Tech Meetup

I’ve been looking at another service, Main Street Hub which gives business owners a suite of services to help them be more socially active - it looks pretty good.

Main Street Hub’s services, within various price points includes a hub dashboard to manage your social activity, a service to help you manage what’s said about you on Yelp and Google Plus, a social service which helps you place content on social networks and a service to search customers near your business and market to them.

Services like Main Street Hub are definitely useful for that business owner who has zero time and zero expertise in using social media - but want to quickly start somewhere. What I also like about Main Street Hub is that they are not just a cookie cutter service provider but they focus on a variety of specific industries, such as health car, automotive services and more!

If you have the time to invest in social media or have one of your staff or a smart assistant to post to social media and monitor what’s going on about your business online then you don’t need to outsource your social media marketing. I do think it is worth the money for EVERY business owner to invest a few hours of time with a good online marketing consultant to guide them in how they (the business owner) can better use social media in their business.

Online marketing, including leveraging social media is POWERFUL. It just takes effort, time and simple best practices to do it right.



Should You Outsource Your Social Media Marketing? Yes…and No. Main Street Hub - Review

There’s lots of great companies developing services wherein they assist you with a full suite of social media marketing activities.

While there are MANY local experts that help setup your Twitter accounts or get you start on LinkedIn many services are even helping you post online, find content and make you look like a social media rock star. Likeable Local recently launched such a service which I saw launched at a recent New York Tech Meetup

I’ve been looking at another service, Main Street Hub which gives business owners a suite of services to help them be more socially active - it looks pretty good.

Main Street Hub’s services, within various price points includes a hub dashboard to manage your social activity, a service to help you manage what’s said about you on Yelp and Google Plus, a social service which helps you place content on social networks and a service to search customers near your business and market to them.

Services like Main Street Hub are definitely useful for that business owner who has zero time and zero expertise in using social media - but want to quickly start somewhere. What I also like about Main Street Hub is that they are not just a cookie cutter service provider but they focus on a variety of specific industries, such as health car, automotive services and more!

If you have the time to invest in social media or have one of your staff or a smart assistant to post to social media and monitor what’s going on about your business online then you don’t need to outsource your social media marketing. I do think it is worth the money for EVERY business owner to invest a few hours of time with a good online marketing consultant to guide them in how they (the business owner) can better use social media in their business.

Online marketing, including leveraging social media is POWERFUL. It just takes effort, time and simple best practices to do it right.



Webinar (8/27): Your Best Just Got Better - Maximize Your Business and Your Life!

Join Jason Womack, MEd, MA and CEO and Founder of The Jason Womack Company, and Ramon Ray, Regional Director of Development of Infusionsoft, on August 27, 2013 at 3pm ET for a webinar on how to maximize tools, systems and processes to achieve a quality work / life balance.

Your Best Just Got Better: Maximize Your Business & Your Life

Tuesday, August 27th

3 pm to 4 pm EDT

Author of Your Best Just Got Better: Work Smarter, Think Bigger, Make More, Jason shows that working longer hours doesn’t make up for a flawed approach to productivity and performance. Entrepreneurs need to clarify their habits, build mindset-based strategies, and be proactive. Womack’s signature workplace performance techniques offer specific strategies to consistently and incrementally improve performance.

During the webinar, Jason will provide practical methods to maximize tools, systems, and processes to achieve quality work/life balance. He has worked with leaders and executives for over 16 years in the business and education sectors. His focus is on creating ideas that matter and implementing solutions that are valuable to organizations and the individuals in those organizations.



Gamifying Social Media: New Widget Turns Facebook Promotions Into A Fun Puzzle

Growing your business is all about getting your name out there. It’s not enough to be the best, the quickest, or the cheapest if no one has ever heard about you. Many businesses strive to increase brand recognition through social media and every successful business knows that every retweet, every follow, and every status update counts. Puzzle Promo, a widget for Facebook from GroSocial, is helping to bring businesses to a wider audience that would normally be out of their reach.

Puzzle Promos are Facebook promotions that ask entrants to Like multiple Facebook pages. Like a puzzle, it reveals the entry form piece by piece as you enter, generating hundreds or thousands of new fans for each page that participates. With a Puzzle Promo, your business’ Facebook page will be connected to anywhere from one to nine other businesses (for a total of ten). When a visitor accesses any one of the pages, the promotion will appear, fragmented between all businesses involved. To gain access to the full benefits of the promotion, visitors must like the Facebook page of each business, revealing pieces of the promotion as they go. To simplify the process, the puzzle is fully available from each page, allowing users to like all the pages at once without having to navigate through page after page.

The first “Puzzle” went live on June 9, 2011. After two weeks, GroSocial wrote a blog entry detailing the results. Some of the highlights include:

  • 8,142 email addresses collected
  • 10,753 wall posts shared by promotion entrants
  • 21,319 total number of fans acquired
  • monthly active users increasing eighteen percent across all four businesses

Those are some pretty impressive numbers for a short, two week run!

Ultimately, Puzzle Promo creates a completely new scenario in which businesses can accrue fans. If Dimitri’s Burger Shack only had a small fan base, and he created a promotion with Phillip’s Crab Hut, both businesses would have the benefit of access to each other’s fan bases. And with newer developments within Facebook itself, once Dimitri likes Phillip’s Crab Hut, all of his friends can be exposed to that page, resulting in a much broader market.

The depths of social media are still being explored, as formats change from blogs to tweets to pictures and videos. Marketing is right on its heels, keeping pace. This type of marketing attempts to “gamify” social media, making visitors active participants, and incentivize interaction. There’s likely to be much more experimentation with social media, and Puzzle Promo is likely just the right stepping stone to achieving more.



When Stealing Is Good: Drawing Inspiration From Competitors

inspiration from competitors

Ever heard the phrase “good artists copy; great artists steal?”

A similar mode of thinking can do wonders for your content marketing. Of course, you should never out and out plagiarize, which is bad for your business from an SEO (search engine optimization) standpoint, not to mention a tad unethical.

That being said, there’s nothing wrong with expanding on and being inspired by your competitors’ great ideas. Just look at pop art, for example. Where would Andy Warhol be without Campbell’s’ marketing team?

But before I digress further, let’s get to it and take a look at how to use competitors’ marketing strategies and materials to come up with your own ideas.

Repurpose Awesome Content From Your Own Perspective

If you’re not already repurposing your own content, you’d best go get started. I’ll wait. Got it? Good.

Anyway, one of the first steps to drawing inspiration from your competitors should be to read their content. When you hit on something where you think, “Wow, I wish I’d written that,” don’t stop there. Instead, read it again and think about how you could write a similar article in your voice, from your perspective. Maybe you reached a slightly different conclusion, or maybe there’s a spot where your expertise can bring something totally new to the table.

Whatever the case may be, try rewriting your competitors’ article from a different angle and see where it takes you.

Hop on the Bandwagon

When there’s a trending topic taking off, get on that bandwagon. While most of us like to think we’re so unique that we can come up with something totally unique that will go viral all on its own, the reality is that it doesn’t quite work like that. No one can know in advance what’s going to garner tons of share, but if there’s already a topic that’s whirling around the internet full steam ahead, use it to your advantage.

It’s a good idea to stay on top of what your competitors are writing about. If there’s a topic that seems to be doing particularly well with fans and followers, make a space in your editorial calendar and add your voice to the conversation.

Take What You Can

And give nothing back, as the pirates liked to say. You don’t need a parrot and an eye patch for this one, but you do need to be able to figure out those little, obvious things that are working well for your competitors.

Has a rival company hit the jackpot with keywords, bumping them up to the top of the search rankings? Find out what keywords they use, and use them yourself. Does a competitor have a website design that’s simply more user friendly than yours? Learn from their example and integrate some of those structures into your own.

Inspiration, Not Plagiarism

Again, I just want to reiterate that the key here is to draw inspiration, not copy and paste. If you find yourself wholesale stealing paragraphs from your competitors’ blogs, it’s time to put down the keyboard and come back to it later.

The difference between copying and stealing is, after all, the difference between a good artist and a great one.

Inspirational Quote Photo via Shutterstock




Gamifying Social Media: New Widget Turns Facebook Promotions Into A Fun Puzzle

Growing your business is all about getting your name out there. It’s not enough to be the best, the quickest, or the cheapest if no one has ever heard about you. Many businesses strive to increase brand recognition through social media and every successful business knows that every retweet, every follow, and every status update counts. Puzzle Promo, a widget for Facebook from GroSocial, is helping to bring businesses to a wider audience that would normally be out of their reach.

Puzzle Promos are Facebook promotions that ask entrants to Like multiple Facebook pages. Like a puzzle, it reveals the entry form piece by piece as you enter, generating hundreds or thousands of new fans for each page that participates. With a Puzzle Promo, your business’ Facebook page will be connected to anywhere from one to nine other businesses (for a total of ten). When a visitor accesses any one of the pages, the promotion will appear, fragmented between all businesses involved. To gain access to the full benefits of the promotion, visitors must like the Facebook page of each business, revealing pieces of the promotion as they go. To simplify the process, the puzzle is fully available from each page, allowing users to like all the pages at once without having to navigate through page after page.

The first “Puzzle” went live on June 9, 2011. After two weeks, GroSocial wrote a blog entry detailing the results. Some of the highlights include:

  • 8,142 email addresses collected
  • 10,753 wall posts shared by promotion entrants
  • 21,319 total number of fans acquired
  • monthly active users increasing eighteen percent across all four businesses

Those are some pretty impressive numbers for a short, two week run!

Ultimately, Puzzle Promo creates a completely new scenario in which businesses can accrue fans. If Dimitri’s Burger Shack only had a small fan base, and he created a promotion with Phillip’s Crab Hut, both businesses would have the benefit of access to each other’s fan bases. And with newer developments within Facebook itself, once Dimitri likes Phillip’s Crab Hut, all of his friends can be exposed to that page, resulting in a much broader market.

The depths of social media are still being explored, as formats change from blogs to tweets to pictures and videos. Marketing is right on its heels, keeping pace. This type of marketing attempts to “gamify” social media, making visitors active participants, and incentivize interaction. There’s likely to be much more experimentation with social media, and Puzzle Promo is likely just the right stepping stone to achieving more.



How to Think Strategically, By Asking Yourself Questions

think strategically

As small business owners we’re great at many things, but strategy is usually not our strong suit.

Early on in my marketing career, I was struggling with a strategic issue and my supervisor told me I needed to “think more deeply.”  That didn’t help one bit.

In the small business world, we tend to operate in a “ready, fire, aim” way. And that’s ok, that’s what gets stuff done. That’s where a lot of innovation comes from. That’s why small businesses can be nimble and solve real-life problems faster than big businesses and that’s what moves our economy forward.

But, the transition from small business to sustainable company requires strategy.

As I’ve worked with many different small business owners, I’ve developed a few processes to make this “deep thinking” process a bit more tangible and more importantly, more doable.

First, An Analogy

Let’s say we were going to build a 10 story building. We first need an architect to draft the blueprint. Then we have a project plan. Prep the ground. Bring in utilities. Lay the foundation. Put up a frame and then plumbing and electricity. Lastly, we finish with sheetrock, paint, etc. That’s the rough idea (clearly, I’m not a builder).

But, what would happen if we tried to install the electricity before the frame was up?

We’d end up with a tangled pile of wires. That’s also what happens when entrepreneurs fly at 100 mph “getting stuff done.” It works. But only to a point.

So, how do we replicate that logical process in our business? How do we get from point A to point B?

That’s a little to vague for most people. So, a slight alteration of the question does the trick:

  • How do we turn a site visitor into a newsletter subscriber?
  • How do we turn a newsletter subscriber into a happy customer?
  • How do we turn a happy customer into a raving fan that refers us?
  • How do we get happy customers to buy more?

How to Think Strategically

Its all about moving a person from where they’re at to where they need to be. Particularly in the marketing world, this has a lot to do with what’s going on in your customers mind and emotions. What emotions does my prospect need to feel in order to justify purchasing my product? Once you’ve identified the pre-purchase state, you can work backwards to create it.

Let’s look at an example. Suppose we sell hiking boots. Here’s how we attack it.

How do we get an average person to purchase hiking boots? In order words, what is the mental state of someone who makes a purchase of hiking boots?

  • First: They must have a need (we need to get them to plan a hike or a camping trip).
  • Second: They must agree that their existing solutions are not adequate for their upcoming trip.
  • Third: They must be able to justify the cost of new boots.
  • Fourth: They must agree that our boots are better than the competition.

Ok, now that we’ve outlined the purchasing state, we must put a plan in place to create that state:

Depending on your business, you may use different media to do this. Some may use one video that walks prospects down this path. Others may use an email series. Others may use a webinar or hangout. That’s another strategic question for you. In order to get prospects from point A to point B, which medium will most easily get them there?

In this example we’ll use an email series:

  • Email 1: Tell about a local hike. Show pictures. Include testimonials from local people talking about how amazing the hike was, how refreshed they felt afterwards, and how much it helped them “clear their head.” Use whatever benefits your prospects need - the goal is to get them to desire and plan that hike.
  • Email 2: Write a review of “hiking shoes.” Include tennis shoes for neighborhood hikes on a sidewalk, cross-trainers for mild dirt roads and hiking boots for strenuous, yet rewarding hikes like the one mentioned in email 1.
  • Email 3: Write about the “cost” of using the wrong equipment. Tennis shoes will wear out 3 times as fast (costing you more) and they don’t support the ankles (therefore costing you more if you get a sprain). Show how a good pair of boots will last years and protect the wearer.
  • Email 4: Write a review of different hiking boots, highlighting the benefits of your boots. Include an offer.
  • Email 5: Stronger offer. Include an expiration date. Remind the prospects of how wonderful it is to go hiking (revive the feelings from email 1). Give a discount or offer bonuses to get people to act now. They just need to justify the purchase now.

Ask Yourself

This is a very simple example. But you can see how asking the right questions in the beginning helps us to frame out the email sequence in a logical way that is both educational and gets the sales job done. It sure beats writing a bunch of emails and hoping they work (just like wiring the building prematurely and then hoping the lights turn on).

In every situation, ask yourself how to get from point A to point B. Here are a few strategic questions every business owner should be asking:

  • How do I get my prospects to choose me over my competitors?
  • How do I turn purchasers into raving fans?
  • How do I turn raving fans into referral machines?

If you can answer those questions with well thought-out plans, you’ll be strategically moving your company from where you are to where you want to be.

Camping Photo via Shutterstock




How to Think Strategically, By Asking Yourself Questions

think strategically

As small business owners we’re great at many things, but strategy is usually not our strong suit.

Early on in my marketing career, I was struggling with a strategic issue and my supervisor told me I needed to “think more deeply.”  That didn’t help one bit.

In the small business world, we tend to operate in a “ready, fire, aim” way. And that’s ok, that’s what gets stuff done. That’s where a lot of innovation comes from. That’s why small businesses can be nimble and solve real-life problems faster than big businesses and that’s what moves our economy forward.

But, the transition from small business to sustainable company requires strategy.

As I’ve worked with many different small business owners, I’ve developed a few processes to make this “deep thinking” process a bit more tangible and more importantly, more doable.

First, An Analogy

Let’s say we were going to build a 10 story building. We first need an architect to draft the blueprint. Then we have a project plan. Prep the ground. Bring in utilities. Lay the foundation. Put up a frame and then plumbing and electricity. Lastly, we finish with sheetrock, paint, etc. That’s the rough idea (clearly, I’m not a builder).

But, what would happen if we tried to install the electricity before the frame was up?

We’d end up with a tangled pile of wires. That’s also what happens when entrepreneurs fly at 100 mph “getting stuff done.” It works. But only to a point.

So, how do we replicate that logical process in our business? How do we get from point A to point B?

That’s a little to vague for most people. So, a slight alteration of the question does the trick:

  • How do we turn a site visitor into a newsletter subscriber?
  • How do we turn a newsletter subscriber into a happy customer?
  • How do we turn a happy customer into a raving fan that refers us?
  • How do we get happy customers to buy more?

How to Think Strategically

Its all about moving a person from where they’re at to where they need to be. Particularly in the marketing world, this has a lot to do with what’s going on in your customers mind and emotions. What emotions does my prospect need to feel in order to justify purchasing my product? Once you’ve identified the pre-purchase state, you can work backwards to create it.

Let’s look at an example. Suppose we sell hiking boots. Here’s how we attack it.

How do we get an average person to purchase hiking boots? In order words, what is the mental state of someone who makes a purchase of hiking boots?

  • First: They must have a need (we need to get them to plan a hike or a camping trip).
  • Second: They must agree that their existing solutions are not adequate for their upcoming trip.
  • Third: They must be able to justify the cost of new boots.
  • Fourth: They must agree that our boots are better than the competition.

Ok, now that we’ve outlined the purchasing state, we must put a plan in place to create that state:

Depending on your business, you may use different media to do this. Some may use one video that walks prospects down this path. Others may use an email series. Others may use a webinar or hangout. That’s another strategic question for you. In order to get prospects from point A to point B, which medium will most easily get them there?

In this example we’ll use an email series:

  • Email 1: Tell about a local hike. Show pictures. Include testimonials from local people talking about how amazing the hike was, how refreshed they felt afterwards, and how much it helped them “clear their head.” Use whatever benefits your prospects need - the goal is to get them to desire and plan that hike.
  • Email 2: Write a review of “hiking shoes.” Include tennis shoes for neighborhood hikes on a sidewalk, cross-trainers for mild dirt roads and hiking boots for strenuous, yet rewarding hikes like the one mentioned in email 1.
  • Email 3: Write about the “cost” of using the wrong equipment. Tennis shoes will wear out 3 times as fast (costing you more) and they don’t support the ankles (therefore costing you more if you get a sprain). Show how a good pair of boots will last years and protect the wearer.
  • Email 4: Write a review of different hiking boots, highlighting the benefits of your boots. Include an offer.
  • Email 5: Stronger offer. Include an expiration date. Remind the prospects of how wonderful it is to go hiking (revive the feelings from email 1). Give a discount or offer bonuses to get people to act now. They just need to justify the purchase now.

Ask Yourself

This is a very simple example. But you can see how asking the right questions in the beginning helps us to frame out the email sequence in a logical way that is both educational and gets the sales job done. It sure beats writing a bunch of emails and hoping they work (just like wiring the building prematurely and then hoping the lights turn on).

In every situation, ask yourself how to get from point A to point B. Here are a few strategic questions every business owner should be asking:

  • How do I get my prospects to choose me over my competitors?
  • How do I turn purchasers into raving fans?
  • How do I turn raving fans into referral machines?

If you can answer those questions with well thought-out plans, you’ll be strategically moving your company from where you are to where you want to be.

Camping Photo via Shutterstock




Eset Endpoint Security

Eset Endpoint Security provides a full range of endpoint protection features and offers administrators the ability to easily secure and protect Microsoft Windows endpoints throughout the network from viruses and spyware, as well as deploy firewall capability, spam protection, web filtering and device control. All this functionality can be managed easily from a central management console and deployed out to the agents waiting on the endpoints.

This product was straightforward to install from both the server and client sides. The first component that needs to be set up is the remote administration server. We installed the server software on one of our Windows Server machines in the SC lab with no trouble at all. The installation was done by running a simple installer file and following a short setup wizard. At the completion of the wizard, we were able to access the main management console application from our server and begin the process of setting all of the policy settings and configuration.

We found deploying the Endpoint Security clients to be just as simple. The client installers are in .msi file format so they can be easily deployed and installed via Microsoft Group Policy. Once the clients were installed, we were able to easily manage them from our remote server.

The remote administration console for this tool allows for comprehensive control over the client applications at the endpoints, as well as monitoring the overall health and status of the endpoint clients. Using this console, we were able to easily manage policy, as well as schedule security scans, update client signatures, rollback configurations or updates, and gather report information. We found the overall layout of the console to be intuitive and it has a clean and organised look.

Documentation included installation guides for the remote administrator console, as well as the client application. We found these guides to be well organised and to include a great amount of detail on installing and configuring the product, though we did notice a lack of screenshots, especially in the remote administrator console guide. We would prefer more visuals, including diagrams, to go along with configuration steps.

Eset offers customers no cost, 12/5 phone- and email-based technical assistance, as well as access to a large area on the website that includes product documentation and a full knowledgebase for troubleshooting. Customers requiring 24/7 technical aid can purchase it as part of an annual contract, which starts as low as c£318.70 and can be customised to meet the needs of the organisation.

At a price starting at around c£12.74 per seat per year for 500 to 999 seats, we found Eset Endpoint Security to be reasonable value for the money. While it does require an on-going subscription cost due to the need for constant updates to anti-virus signatures and other components, we found that its overall ease of use and flexibility provide a lot of value for any organisation. We also found that the administrator console really added to the overall value due to its comprehensive feature set. 



Enterprise Security for Endpoints v10.6

Trend Micro's Enterprise Security for Endpoints, with Enterprise Data Protection add-on v10.6, secures the endpoints both on and off the network with anti-malware, malicious websites blocking and host intrusion protection. It is powered by Trend Micro's Smart Protection Network, a cloud-based service that delivers global threat intelligence and fast performance.

With its central management service and the flexibility to customise endpoint protection with add-on options for desktop virtualisation, data leakage prevention and mobile devices, the company has put together a powerful response to protection of the endpoint. By integrating a full set of data security products within the existing Trend Micro environment, the enterprise data protection add-on provides encryption and data leakage prevention (DLP) for laptops, smartphones, tablets and USB drives. 

This solution delivers the full range of capabilities needed to protect data and defend against threats across the range of end-user platforms, including: anti-malware (reputation-based malware detection for file and web); host firewall and IPS with integrated virtual patching; mobile device and application management, including whitelisting and blacklisting; reputation-based mobile anti-malware and endpoint encryption, including full disk, file and folder; self-encrypting drives (SED) encryption; granular device control with integrated DLP content policy; and integrated device control with filtering across multiple channels. 

Once our system was up and running, the use of features was handled by a web-based dashboard. The Trend Micro Control Manager (TMCM) served as a manager of managers. Here we set policies for the products, as well as policy, DLP, AV, messaging, log files in Control Manager and activity scheduling.

A number of other services are available, including: a global threat database; Smart researchers; reputation services; multiple-layer email reputation; mobile security; virtual desktop protection; office scan damage clean-up services; deep packet inspection; DLP modules; integrated messaging; and endpoint encryption. The features and functions are deep, vast and integrated across other services. 

Trend Micro offers common support features, such as phone and email assistance, a knowledgebase, a FAQs section, and a website full of resources. The maintenance fees were a bit difficult to decipher. According to the company, the first year of maintenance includes email and telephone support eight-hours-a-day/five-days-a-week. After the first year, renewal of standard support and 24/7 support are available for a fee.

We found that the value for the money spent is very good.



Enterprise Security for Endpoints v10.6

Trend Micro's Enterprise Security for Endpoints, with Enterprise Data Protection add-on v10.6, secures the endpoints both on and off the network with anti-malware, malicious websites blocking and host intrusion protection. It is powered by Trend Micro's Smart Protection Network, a cloud-based service that delivers global threat intelligence and fast performance.

With its central management service and the flexibility to customise endpoint protection with add-on options for desktop virtualisation, data leakage prevention and mobile devices, the company has put together a powerful response to protection of the endpoint. By integrating a full set of data security products within the existing Trend Micro environment, the enterprise data protection add-on provides encryption and data leakage prevention (DLP) for laptops, smartphones, tablets and USB drives. 

This solution delivers the full range of capabilities needed to protect data and defend against threats across the range of end-user platforms, including: anti-malware (reputation-based malware detection for file and web); host firewall and IPS with integrated virtual patching; mobile device and application management, including whitelisting and blacklisting; reputation-based mobile anti-malware and endpoint encryption, including full disk, file and folder; self-encrypting drives (SED) encryption; granular device control with integrated DLP content policy; and integrated device control with filtering across multiple channels. 

Once our system was up and running, the use of features was handled by a web-based dashboard. The Trend Micro Control Manager (TMCM) served as a manager of managers. Here we set policies for the products, as well as policy, DLP, AV, messaging, log files in Control Manager and activity scheduling.

A number of other services are available, including: a global threat database; Smart researchers; reputation services; multiple-layer email reputation; mobile security; virtual desktop protection; office scan damage clean-up services; deep packet inspection; DLP modules; integrated messaging; and endpoint encryption. The features and functions are deep, vast and integrated across other services. 

Trend Micro offers common support features, such as phone and email assistance, a knowledgebase, a FAQs section, and a website full of resources. The maintenance fees were a bit difficult to decipher. According to the company, the first year of maintenance includes email and telephone support eight-hours-a-day/five-days-a-week. After the first year, renewal of standard support and 24/7 support are available for a fee.

We found that the value for the money spent is very good.



Eset Endpoint Security

Eset Endpoint Security provides a full range of endpoint protection features and offers administrators the ability to easily secure and protect Microsoft Windows endpoints throughout the network from viruses and spyware, as well as deploy firewall capability, spam protection, web filtering and device control. All this functionality can be managed easily from a central management console and deployed out to the agents waiting on the endpoints.

This product was straightforward to install from both the server and client sides. The first component that needs to be set up is the remote administration server. We installed the server software on one of our Windows Server machines in the SC lab with no trouble at all. The installation was done by running a simple installer file and following a short setup wizard. At the completion of the wizard, we were able to access the main management console application from our server and begin the process of setting all of the policy settings and configuration.

We found deploying the Endpoint Security clients to be just as simple. The client installers are in .msi file format so they can be easily deployed and installed via Microsoft Group Policy. Once the clients were installed, we were able to easily manage them from our remote server.

The remote administration console for this tool allows for comprehensive control over the client applications at the endpoints, as well as monitoring the overall health and status of the endpoint clients. Using this console, we were able to easily manage policy, as well as schedule security scans, update client signatures, rollback configurations or updates, and gather report information. We found the overall layout of the console to be intuitive and it has a clean and organised look.

Documentation included installation guides for the remote administrator console, as well as the client application. We found these guides to be well organised and to include a great amount of detail on installing and configuring the product, though we did notice a lack of screenshots, especially in the remote administrator console guide. We would prefer more visuals, including diagrams, to go along with configuration steps.

Eset offers customers no cost, 12/5 phone- and email-based technical assistance, as well as access to a large area on the website that includes product documentation and a full knowledgebase for troubleshooting. Customers requiring 24/7 technical aid can purchase it as part of an annual contract, which starts as low as c£318.70 and can be customised to meet the needs of the organisation.

At a price starting at around c£12.74 per seat per year for 500 to 999 seats, we found Eset Endpoint Security to be reasonable value for the money. While it does require an on-going subscription cost due to the need for constant updates to anti-virus signatures and other components, we found that its overall ease of use and flexibility provide a lot of value for any organisation. We also found that the administrator console really added to the overall value due to its comprehensive feature set. 



DeviceLock Endpoint DLP Suite

DeviceLock Endpoint DLP Suite consists of three powerful components, the first being the DeviceLock module. This allows administrators to set policy for managing the movement of data from company computers through the use of removable media or external storage, such as smartphones, digital cameras, USB sticks, CD/DVD-R, tablets or printers.

Next, the NetworkLock module allows administrators to keep data from leaving the network through the internet, such as through webmail, instant messaging, social networks or cloud-based services, such as Dropbox.

The final element is ContentLock, which looks inside files for sensitive content - such as account numbers or any other personally identifiable or sensitive information - to keep it from leaving the company network.

Overall, we found this suite to be easy to install and configure. The installation itself took just a few minutes guided by a short setup wizard that we found to be simple to follow. Once installed, much of the administration was done natively in Microsoft Active Directory Group Policy Editor. This product actually plugged in directly to the Microsoft Management Console used for managing Group Policy, so we found it comfortable to configure and manage. 

As for policy management, we found the DeviceLock suite to be quite comprehensive and have many configurable options for policy, which can be pushed out to users, groups, computers or organisational units for granular policy control. Along with to who the policy gets assigned, there are also several scheduling controls to provide additional flexibility. Furthermore, administrators can lock settings down to prevent users from tampering with, disabling, or uninstalling DeviceLock. Lockdown settings will prevent changes even if the user is a local administrator on the PC.

Documentation included a single PDF user manual, which covered the initial installation and configuration through advanced setup and use of the features and functions. We found this manual to be well organised and to include many screenshots and step-by-step installation and configuration instructions.

DeviceLock offers all customers no cost eight-hours-a-day/five-days-a-week phone- and 24/7 email-based technical support. Additionally, customers can access a large web-based help area on the website that includes a full knowledgebase, user forum, webinars, demo videos, documentation and many other resources. DeviceLock does not offer any additional plans, but we found its no-cost support to be more than sufficient.

At a price of about £27.20 per seat for up to 1,000 seats, including first year software support, maintenance and upgrades, we found DeviceLock Endpoint DLP Suite to be excellent value for the money. While it may seem pricey at first glance, it does have a robust feature set with comprehensive policy controls that are easy to deploy and manage. We found its seamless integration with the already existing Active Directory infrastructure to be an excellent addition to the overall value because administrators will feel comfortable configuring and managing the product from the very beginning.



DriveLock

DriveLock from CenterTools provides a full set of endpoint security features. With this, from one single platform administrators can deploy policy that includes control over removable media, applications and devices, encryption and anti-virus. It features granular policy controls that can be applied directly through Microsoft Active Directory Group Policy, which ensures the flexibility needs for almost any type of organisation looking to deploy comprehensive endpoint security.

We found this solution to be quite easy to set up and deploy. We simply installed the server component on a Microsoft Windows Server on our network and were pretty much up and running. The server install took only a few minutes and was guided by an easy-to-follow setup wizard. Once the installation was complete and we configured the product for use with our Active Directory infrastructure, we were able to easily manage settings and policy directly in the Active Directory Group Policy Editor.

The documentation claims: 'be secure in less than four hours', and we would agree that this tool could be set up with a solid base configuration in about that time. Overall, we had an easy time with installation and management during our lab deployment.

While working inside the DriveLock Group Policy Editor, we found a multitude of configurable options that can be deployed directly from Active Directory. Many of these choices could be activated by simply opening a properties dialog box in the management console and checking a box to turn the policy object on.

We found DriveLock to be highly flexible and to contain a fairly comprehensive default policy. We were able to tweak the default policy setting to meet the needs of our environment without much trouble. On top of the granular policy settings, this tool allows policy to be assigned at granular levels as well. Policies can be assigned to users, groups or computers in Active Directory, and policies can also be scheduled with times they should be active.

Documentation included several PDF manuals and guides. A quick-start guide detailed basic installation and setup quite well, with step-by-step instructions and screenshots. All of the guides were well organised and included an excellent amount of detail by way of clear configuration instructions and many screenshots and examples.

CenterTools offers eight-hours-a-day/five-days-a-week phone- and email-based technical support to customers through an annual subscription. Customers can also find a large amount of resources on the vendor website, including technical documentation, video tutorials, a FAQ section, a knowledgebase and user forum.

At a price starting at around £46.67 per client for the licence and around £9.33 per client per year for maintenance and support, we found this solution to be average value for money. While DriveLock does offer a strong feature set with good integration to the already existing Active Directory structure, it can be a little costly on an on-going basis for some organisations.



Endpoint Protector 4

Endpoint Protector 4 from CoSoSys provides endpoint protection through the use of three feature-rich modules: Device Control for endpoints, Content Aware Protection for endpoints and Mobile Device Management.

Device Control allows administrators to control what types of devices may be connected to machines on the network. These include USB devices and flash drives, external hard drives and printers.

Content Aware Protection is a data leakage prevention module that lets administrators define policy to prevent sensitive data from leaving the network through removable media or from being uploaded to the cloud, among other methods.

Finally, Mobile Device Management allows for full control over mobile devices, such as iPhones and Android units. With Mobile Device Management, administrators can enforce security policy, as well as locate lost or stolen devices, and control which apps can be installed.

This solution comes as a hardware or virtual appliance that can be deployed in just a few minutes. Our initial configuration was done simply by connecting the device to the network and navigating to the web-based management interface, which began the easy-to-follow setup wizard. Once complete, a base configuration was in place and we could begin fine tuning the appliance with more granular policy controls. We found the management interface to be well organised and intuitive to navigate with many policy and configuration options.

From the endpoint management settings through content protection and mobile device management, this product features a lot of configurable policy options that we found to be easy to put together, and we could create policies based on certain users and groups in various departments throughout the organisation. This provides the granularity needed to deploy endpoint security in almost any organisation's environment. Device Control can manage Windows, Mac OS X and Linux machines, while Content Aware Protection is available for Windows and Mac OS X. Mobile Device Management can manage both Mac and Android devices.

Documentation included user manuals for the appliance and the management interface, as well as a few other supplemental PDFs for configuration of specific components. There were well organised and included many detailed descriptions, configuration examples and screenshots, but did not include step-by-step procedures on how to actually configure the appliance.

CoSoSys offers basic eight-hours-a-day/five-days-a-week phone- and email-based support to customers at no additional cost. However, customers can also purchase additional aid through annual contracts, which includes access to product updates and technical assistance. 

With a price starting at £5,477 for the appliance (with just the Device Control module), and up to £9,860 for the appliance, Device Control and Content Aware Protection, plus an additional £23 per device per year for Mobile Device Management, Endpoint Protector 4 can quickly become quite pricey. However, we found it to be good value for the money based on its large feature set and ease of use and configuration.



Brother MFC-9000 Geared Towards Providing Small Business High Quality Printing and Low Costs

Choosing the right printer for your business can make a big difference in printing costs. Depending on the number of pages you print a year and the quality of printing desired, your business printing costs can vary greatly depending on the printer you choose. For instance a lower-priced printer with a lower standard page yield  may not necessarily be the best choice for your business if you are printing more than 3000 pages a year.

This brings us to the recent launch of the MFC-9000 all-in-one color printer series by Brother, which has been slated by the company as delivering ‘big-business printing experience’ at small-business prices. Ranging from $400 to $450, the three new models in the Brother MFC-9000 series offer comprehensive office printing solutions.

Key features include:

  • Print, copy, scan and fax from anywhere
  • Print between 19 and 23 pages per minute (ppm) with high-resolution 600 X 2400 dpi, color and black printing
  • Paper tray capacity of 250 sheets
  • Automatic duplex printing in two of the models (MFC-9330CDW and MFC-9340CDW )
  • Wireless printing
  • Mobile printing ready
  • 3.7” Color touchscreen LCD display with web connectivity. In fact using the display you can print directly from your Facebook, Picasa, Flickr, Evernote, Skydrive, Dropbox and Google Drive accounts

The ability to print high-resolution colored print documents in-house using the MFC-9000 printers could save you significant expenses on printing at the local copy center, especially if your business does a lot of good quality printing of brochures and other marketing collaterals.  Also, these printers work on high-capacity printer cartridges which can substantially reduce the cost of per page printing.

The printers also have ‘green features’ such as sleep mode and auto-off mode for reduced energy consumption when not in use.

We have reviewed lower-priced options in the past, such as Brother MFC-J4510DW and Epson Workforce3540, but if you are looking for high-resolution, high-volume and reasonably priced printing, then this new series of printers from Brother may well be worth checking out for your growing business.



Brother MFC-9000 Geared Towards Providing Small Business High Quality Printing and Low Costs

Choosing the right printer for your business can make a big difference in printing costs. Depending on the number of pages you print a year and the quality of printing desired, your business printing costs can vary greatly depending on the printer you choose. For instance a lower-priced printer with a lower standard page yield  may not necessarily be the best choice for your business if you are printing more than 3000 pages a year.

This brings us to the recent launch of the MFC-9000 all-in-one color printer series by Brother, which has been slated by the company as delivering ‘big-business printing experience’ at small-business prices. Ranging from $400 to $450, the three new models in the Brother MFC-9000 series offer comprehensive office printing solutions.

Key features include:

  • Print, copy, scan and fax from anywhere
  • Print between 19 and 23 pages per minute (ppm) with high-resolution 600 X 2400 dpi, color and black printing
  • Paper tray capacity of 250 sheets
  • Automatic duplex printing in two of the models (MFC-9330CDW and MFC-9340CDW )
  • Wireless printing
  • Mobile printing ready
  • 3.7” Color touchscreen LCD display with web connectivity. In fact using the display you can print directly from your Facebook, Picasa, Flickr, Evernote, Skydrive, Dropbox and Google Drive accounts

The ability to print high-resolution colored print documents in-house using the MFC-9000 printers could save you significant expenses on printing at the local copy center, especially if your business does a lot of good quality printing of brochures and other marketing collaterals.  Also, these printers work on high-capacity printer cartridges which can substantially reduce the cost of per page printing.

The printers also have ‘green features’ such as sleep mode and auto-off mode for reduced energy consumption when not in use.

We have reviewed lower-priced options in the past, such as Brother MFC-J4510DW and Epson Workforce3540, but if you are looking for high-resolution, high-volume and reasonably priced printing, then this new series of printers from Brother may well be worth checking out for your growing business.



He’s a Legend Around Here

he's a legend business cartoon

I remember starting a new job and being given the tour by an employee. Not only did I get introduced to pretty much everyone, but my guide also gave me the skinny and her opinion on them all.

“He’s kind of a jerk, and don’t ask about his wife. She likes to drink and made a fool of herself at the last office party.” Then there was the one guy who, I swear, was a Robert Redford lookalike. “That’s Tom. He’s like a legend around here.”

Immediatley, I began to think about this Tom person as a barbarian, Robin Hood, a knight on horseback and finally - as a unicorn.

As it turned out, the guy really was great at his job and a genuinely nice guy. But everytime I saw him after that first day, I couldn’t help but imagine him with a horn sticking out of his forehead.

He’s a legend after all.




He’s a Legend Around Here

he's a legend business cartoon

I remember starting a new job and being given the tour by an employee. Not only did I get introduced to pretty much everyone, but my guide also gave me the skinny and her opinion on them all.

“He’s kind of a jerk, and don’t ask about his wife. She likes to drink and made a fool of herself at the last office party.” Then there was the one guy who, I swear, was a Robert Redford lookalike. “That’s Tom. He’s like a legend around here.”

Immediatley, I began to think about this Tom person as a barbarian, Robin Hood, a knight on horseback and finally - as a unicorn.

As it turned out, the guy really was great at his job and a genuinely nice guy. But everytime I saw him after that first day, I couldn’t help but imagine him with a horn sticking out of his forehead.

He’s a legend after all.




Jamster can\'t shed \'scam\' reputation soon enough and settles with FTC for $1.2 million

Mobile marketing and advertising company Jesta Digital has settled with the Federal Trade Commission (FTC) over a complaint that it duped Angry Bird players into paying for fake anti-virus software, the consumer protection agency announced on Wednesday.

Los Angeles-based Jesta Digital, which does business as well-known ringtone and mobile content brand Jamster, agreed to pay $1.2 million to the FTC and an unspecified amount to mobile users who were charged for installing the bogus Android anti-virus app between August 2011 and Tuesday.

According to the FTC, consumers were tricked into accepting charges for a supposed AV program known as 'Android AV' - which they didn't need and usually didn't receive -  while they played the popular Angry Birds game. Pop-ups pushing the app claimed users' mobile phones were infected by viruses, a common ploy known as scareware.

Instead of actually acquiring any security software, consumers who clicked the ads - or clicked anywhere on their screens, for that matter - received a $9.99 per month charge for ringtones and other content on their mobile phone bills, the FTC alleged in a complaint (PDF) filed this month in a US District Court in Washington, D.C.

The FTC claims that Jamster was able to automatically charge consumers by using a wireless access protocol (WAP) billing technology, which captures phone numbers from SIM cards and then bills consumers without them providing the information themselves to companies.

“Using WAP billing, [Jamster] arranges for its charges to be included on consumers' mobile device bills or deducted from consumers' prepaid mobile device accounts,” the complaint alleged. “In many instances, [Jamster] charged consumers for ringtones or other goods or services without their authorisation or agreement. Among other things, [Jamster] charged consumers who did not click on the 'subscribe' button and charged consumers for products they did not order."

The warning messages users saw while playing Angry Birds was a banner ad containing a robot logo, which looked suspiciously similar to Android's own logo. According to the complaint, on the page where users clicked to download the software, there was fine print notifying them that they could get 20 ringtone and mobile content downloads for $9.99 per month.  

In the complaint, the FTC included evidence that Jamster's executives were aware that the ads were scamming consumers.

In an internal Jamster email that the FTC obtained, it found that only 372 people among the 100,000 consumers who downloaded the rogue app received a link that led them to the marketed software.

In addition, an email sent on 20th January 2012 from Jamster's VP of global marketing operations to the director of global marketing made mention of the shady marketing ploys.

“We are anticipating if more customers are able to get the content that they signed up for, that this will lower refunds and churn, and increase lifetimes,” the VP of global marketing wrote, later adding that the chief marketing officer was “anxious to move our business out of being a scam and more into a valued service”.

SCMagazine.com contacted Jamster about the FTC settlement and case, but did not immediately hear back from the company.

As part of the agreement with the FTC, Jamster is required to automatically refund consumers billed between 8th December 2011 and Tuesday for the shady dealings.

Mobile users who were charged between 1st August 2011 and 7th December 2011 via short code '75555' will be notified by Jamster that they are due a refund and can claim the reimbursement by contacting the company.



Poison Ivy discovered in on-going espionage efforts

The years-old Poison Ivy, best known for attacking security firm RSA, remote access Trojan (RAT) is alive and well, according to new research.

In a new report (PDF), security firm FireEye highlighted the activities of three advanced persistent threat (APT) groups who, since 2012, have used the malware in more than 70 attacks against organisations around the globe.

Darien Kindlund, manager of threat intelligence at FireEye, blogged about the on-going espionage campaigns making use of Poison Ivy in a follow-up interview with SCMagazine.com on Thursday, he explained why the freely available tool continues to serve its purpose in a sophisticated malware marketplace.

Poison Ivy was released in 2005, and was notably used in the 'Nitro' attacks in 2011 to steal intellectual property from numerous chemical companies in the United States and other countries. The malware was also used by hackers to breach security firm RSA that same year, stealing information related to its SecurID product line.

According to Kindlund, Poison Ivy - which has keylogging, screen- and video-capturing, and file-transferring capabilities - is an ordinary piece of malware, but one with significant benefits.

“It's more difficult to know who is attacking [organisations] when they are using a garden-variety remote access tool,” Kindlund told SCMagazine.com.  

It is difficult to determine when RATs are used in APT scenarios due to their wide use, and FireEye released a package of free tools, called Calamine, to help organisations detect when Poison Ivy attacks are potentially a part of a larger espionage campaign.  

After collecting 194 malware samples of Poison Ivy used in targeted attacks between 2008 and 2013, FireEye linked infections with activities to three groups: Admin@338, Th3bug and MenuPass. They are named after the passwords they use to access Poison Ivy once it's installed on victim machines.

FireEye learned that hackers involved in the Admin@338 group leveraged Poison Ivy for APT attacks since January 2008, and used spear phishing emails to target organisations in finance, economic and trade policy sectors.

The Th3bug group primarily targeted higher education and health care sectors dating back to October 2009 by infecting websites victims frequently visited.  

MenuPass also used spear phishing - where weaponised emails crafted for specific staff at organisations are sent to lure targets into clicking malicious links or files - during 2012 and this year. Several exploits have been used in all of the on-going campaigns - for instance, those in Microsoft Word, Java and Internet Explorer - allowing saboteurs to booby-trap vulnerable files or web pages that victims opened or visited.

Kindlund said that that command-and-control server communications, and the fact that weaponised emails contained messages using Chinese character sets, led FireEye researchers to conclude that the groups likely had regional ties to China.

The firm was also able to link attacks with certain groups due to additional evidence, such as passwords the hackers used to access infected machines and decrypt control hub communications.

The Calamine package, meant to thwart long-lived espionage campaigns, consists of tools that decrypt the RAT's network traffic communications so organisations can “understand commands issued by human operators controlling [infected] endpoints”, and receive other insight that could help them profile their attackers, such as information on configuration files used in the attack, the FireEye blog post said.

Kindlund told SCMagazine.com that the human element of the attack is what will provide the most help to organisations tasked with separating sporadic infections from those that are signs of a persistent campaign to steal their company's data.

“With most threat actors, it's all human-driven activities - and humans don't like to change their tactics if what they are doing is working very well,” Kindlund said. “This helps predict what their next attack will look like.”