Page 15 - Telecom Reseller SeptOct 2015
P. 15




March/April 2014
26
Telecom Reseller

September/October 2015
Telecom Reseller 15

Preventing TEM Engagement Friction
Higher Education + Technology = ACUTA
GANGA
CAontinued from page 22
OTMP has conducted several research
create some legal issues. Risk reducing device that could be purchased by
studies to determine customer churn
COLWELL
As a CIO, it is important for
• Professional networking at its best happens at the face-to-face policies must be developed.
employees. IT will need to determine
rates for TEM vendors in the telecom
me to be a part of a group of people who strive to con nually events and via the listserv/community. We provide opportunities to connect • Responsibilities: Does an employee which devices it is able to support.
management industry.  e primary purpose of
evolve as knowledgeable with people who can help you succeed.
using a devBiyceTimwoiththy Cc. oCorplwoerlal,tSeVPapEfp s- and • Geo-Fencing: It may be that security, or
these studies has been to diagnose the cause of
technology professionals.
• High-quality education features presenters at seminars and data have acireenscpyoFnirsti®biAlidtoypttionp–rAoOteTMctPthe
data use needs, require policies to gov-
churn and to establish best practices to improve
device? What if precautions are not taken
ern devices used within prede ned geo-
(www.aotmp.com)
I know of no be er organiza on to be a part of than ACUTA.
conferences who are experts in the eld.
results for enterprises and vendors in the telecom
to protect the device?
graphical areas. Different regions gener-
Keith Fowlkes • Valuable publications bring critical information to you in a timely, pro-active way.
• Rights: The legal rights of employees
management ecosystem.
ally have different laws.
Director of Informaon Technology Services and CIO • Online resources One of the most common sentiments
TEM engagement scope of work should be
• Bandwidth Throttling: Organizations
and organizations differ from country to
Centre College
give you access to solutions that will help you meet the needs of your campus faculty, staff, and students.
expressed by enterprises with in-life engagement
clearly de ned and it should include a RASCI
must determine how to allocate employ-
country, so policy may have to be altered
• Professional development opportunities con ict is that they believed the TEM vendor
(Responsible, Accountable, Supportive,
ee demand for bandwidth across a broad
on a country-to-country basis.
was to perform work or deliver speci c work
Consulted, Informed) matrix to articulate
abound at ACUTA, giving you experiences that will help you grow professionally and advance swath of locations, roles and usage vol-
• Liability: Who is liable for the loss of pri-
products that the vendor indicated was either not
partnership roles throughout the engagement.
your career.
umes.
vate data when protocols are followed?
in scope or not their responsibility.  is is not
Understanding what the service o ering is
www.acuta.org • Business Support vs. Personal Support:
• Privacy: What measures will a company
an isolated phenomenon and is at the center of
and which party is responsible for performing
Organizations must determine the extent
take to protect the privacy of the employee?
many TEM vendor relationships that have gone
the work e ort serves to level-set expectations
Questions: Call Amy at (859) 278-3338.
bad.
from the beginning and reduces solution
to which they are willing to provide
• Look for the second part of this article
Connecting Campus IT Professionals with Ideas and Solutions
Join Today!
technical support for an employee-owned
where we will detail the next three essen-
 e fundamental issue in these cases is that
and role confusion that leads to customer
device.
tials for a successful BYOD policy. % dissatisfaction. n
the customer believes they have purchased a
• DeviceLoss:Devicelossortheftisafact
level of service di erent than the TEM vendor
of life. Therefore, an organization should
is providing. For example, a TEM vendor that
have a plan for protecting (or wiping) a
provides monthly invoice audits may deliver
lost device.
di erent types of audit solutions. One solution
• Reimbursement: How will employees
Inc.
provides so ware con gured to identify invoice
be reimbursed for devices and/or data
Connect and Communicate
charge variances as an audit and the customer
plans?
is responsible for taking action to investigate 
and resolve disputes. Another solution o ers
Essential 3: Build a Legal Policy
the same automated audit features and provides
Framework
A1 TELETRONICS DOES IT ALL!
analysts to visually inspect charges, perform deep
Allowing employee-owned devices into
dive audits and resolve disputes on behalf of the
the work environment will undoubtedly
customer. While both scenarios are audits, if the customer expects the latter level of service and 
only receives the so ware audit, then con ict will 
NenIsXueO.N
To prevent friction caused by misalignment
Continued from page 17
and misunderstanding of expectations, a
to maintain operations. This means each
piece of your internal network is still
TELECOM & 
responsible for connecting you to vital
NETWORKING WE BUY data, and can still present a liability when
Ask the
power problems occur, even though the
data is off-site.
YOUR EXCESS
Telecom Pro Here are a few areas to consider when
REPAIRS
PRODUCTS
moving to the cloud:
• IT & Network Infrastructure
Q• Telephone systems are no longer stand-
: How can I protect mobile devices alone—modems, switches, hubs, routers,
against data loss from an Evil Twin
wireless access points, and other network
hotspot?
devices all work to maintain each per- 
Ason’s connection to the cloud, and the
: 
An Evil Twin is a Wi-Fi hotspot that data and services provided by it. Each of
mimics a free public Wi-Fi hotspot
these devices should be backed up with a
and is meant to capture sensitive data
UPS that can accommodate its electrical
tlroaandsmfoitrtetdhefrodmesairleadptaomp,otaubnlettoofrtmimobei.le
• pNheotnweo. rTkhedecvhiacllenlogeadwsitvhatrhyis gpraeratitcluyl,arfrom 
scmhaelml eroisutehrast mthantycWani-bFiehboatscpkoetds oufptebny an 
ainpepxeparenavsiavileabsletaindabpyubulnicitp,latocelanrgdeusleorasds 
mthayt croenqnueircet tao alinyeaivnatielarbalcetisvigenoalr, wtrhuiechon-
mlinaekesyasnteEmvilfTowr iandveiaqbuleatfeorbcarcimkuinpa.ls use. TECH
Dual-WAN QoS
Firewall
IPv6 Ready Network VPN Content 
• Workstations
Companies with policy that suggests or
Management
Filtering
• While it seems obvious, every worksta-
mandates connecting to free Wi-Fi versus
TRAINING
Upgrade your Router!
INSTALLATION
tion (including the PC, telephone hand-
a carrier network to save money may in
SUPPORT
set, and peripherals) within the building
fact be encouraging employees to risk data
depends on power to function properly.
Voice QoS, Multi WAN Redundancy, Content Filter and Network Security
exposure to an Evil Twin. To prevent such
When cloud storage is involved,  les
risk, it is recommended to always use a
are often saved locally before being
VPN to secure connections and to ensure
uploaded, and can be lost or corrupted
Your company uses the Internet for eve
Vigor 2925n
rything. 
that connections via web portal are HTTPS
when power problems occur.
WAN 1 
 
equipped. Firewalls and antivirus software
Inmanycases, aUPSispresent atthese
DrayTek routers combine two or more Internet links
WAN 2

mayalsohelpfulshoulda uerconecttostations, but has been ignored for several
to create a faster and more secure Internet.
an Evil Twin network unwittingly.
years. These are often found to have a dead Content Filtering prevents loss of productivity and
Q
battery when called upon, leading to data
: Can my employer track a BYOD 
loss and potential hardware damage.
smartphone to identify its location?
u
n
a
u
t
h
o
r
i
z
e
d
c
o
n
t
u
.
n
a
u
t
h
o
r
i
z
e
d
c
o
n
t
e
e
n
n
t
f
t
f
r
r
o
o
m
d
m
d
e
e
g
g
r
r
a
a
d
d
i
i
n
n
g
b
g
b
a
a
n
n
d
d
w
w
i
i
d
d
t
t
WAN 3
h
h
.
ppropriate workstation backup is 
Alargely dependent on the backup runtime
: Perhaps. If the smartphone is From products to training, from installation services to excess purchasing, A1 Teletronics does it all.
.
desired, and how much space is available
registered with MDM software that
Faster data
.
for the installation. Slimline tower line
possesses location based service (LBS)
Better voice
.
Business Continuity
We continue to redefine independent distribution within the telecommunications and networking channel
interactive systems are a popular solution,
capabilities, then it is possible for your
as they provide a favorable mix of runtime,
through an unmatched dedication to quality and service. We’ll help you connect and communicate.
Redundant Internet and more security
employer to identify the GPS location
power conditioning, and space savings.
of your device. Most employers are
Don’t get lost in the clouds
Learn more at www.DrayTekUSA.com
transparent about the use of such features
While it is easy to consider your prob-
and address them in an acceptable
lems solved once critical operations are
ISO 9001
800.797.2983 
use policy or a BYOD enrollment policy.
in the hands of a professional data center,
www.abptech.com | sales@abptech.com | 972.831.1600
www.a1teletronics.com
When in doubt, inquire with your mobile
the job is simply not done yet. A complete
management team to determine if LBS is
protection system on-site is critical, and can
AscdiNatd The global alliance of the it channel
used and under what conditions.
help ensure your link to the cloud is more 
like an escalator than a magic beanstalk. %
As an Independent Distributor, A1 Teletronics, Inc. is not affiliated with the manufacturers of the products it sells except as expressly noted otherwise. Any and all trademark rights associated with the manufacturers’ names and products are owned by the respective manufacturers.
For more visit www.minutemanups.com/blog




p1-24_TR_SepOct_2015.indd 15
28/10/2015 20:36
   13   14   15   16   17