• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • ‘Workspace Aggregator’ Touts Mobile Access To IBM i Apps

    August 19, 2015 Alex Woodie

    A Belgian company named Awingu is touting its capability as a “workspace aggregator” to deliver cloud-based access to a variety of corporate applications and data from any browser-enabled device. Among the applications Awingu says it can tap into and securely deliver are those running on IBM i.

    The explosion of smartphones and other mobile devices is having a huge impact, not only how we live and play, but how we work too. Thanks to the rise of liberal bring your own device (BYOD) policies and mobile-enabled software as a service (SaaS) applications like Salesforce.com, many companies are not only allowing employees to access business apps from their mobile devices, but encouraging it too.

    So-called legacy applications, such as older applications running on the IBM i platform, may need to be modified before they’ll correctly display on today’s handheld devices, let alone enabled for cloud delivery. Many ISVs are making these investments (both on the mobile and cloud front), either on their own or using one of a number of modernization tools that we cover in this newsletter.

    But in many cases, companies are not updating the old green-screen applications that are still heavily relied upon in the day-to-day office grind. These types of workhorse systems are among those that Awingu is targeting with its workspace aggregator solution.

    A screenshot from an Awingu presentation shows the various systems that users can access from mobile devices.

    “Historically, it’s been too costly or difficult to migrate legacy applications to the cloud,” says Dirk Thomaere, vice president and COO of Awingu. “This has been the core barrier that prevents companies from fully migrating to a cloud platform.”

    Awingu describes its solution as a “unified cloud desktop solution.” Users access the solution, which runs on Microsoft‘s Azure cloud, via any HTML5-enabled Web browser. Users are presented with a sign-in screen that’s protected with two-factor authentication. After signing in, a user is presented with access to a range of applications, which could include Microsoft Office products, Google Apps, computer aided design (CAD) programs, Evernote, and an IBM i terminal emulator.

    “Many companies still benefit from legacy in-house applications like AS/400, but they also see the value of moving to a cloud-based platform to empower a mobile workforce,” Thomaere says. “Awingu’s central workspace addresses all these issues in a simple way, while allowing IT assets to be centrally managed with improved security.”

    Awingu says its solution eliminates the need to adapt legacy applications to run in the cloud and also eliminates the need for local clients and local data stores running on laptops, tablets, or smart phones. The company touts that its solution enables “the freedom of BYOD and mass mobility while ensuring data security.”

    Pricing for the service starts at $7 per user per month. For more information see www.awingu.com.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    LaserVault:  WEBINAR: Get Faster, Easier IBM i Backups & Restores GUARANTEED. Aug 20
    Four Hundred Monitor Calendar:  Latest info on national conferences, local events, & Webinars
    System i Developer:  Session Grid Posted: RPG & DB2 Summit - Chicago, October 20-22

    RCAC in DB2 for i, Part 1: Row Access Permissions HelpSystems Acquired By Private Equity Giant H.I.G. Capital

    Leave a Reply Cancel reply

Volume 25, Number 41 -- August 19, 2015
THIS ISSUE SPONSORED BY:

New Generation Software
Profound Logic Software
Storagepipe
BCD Software
LaserVault

Table of Contents

  • Sony Ends MO Production–What Are Your Long-Term Archive Options Now?
  • Linoma Simplifies and Strengthens MFT Lineup
  • SoftLanding Job Scheduler Goes with the Flow
  • ‘Workspace Aggregator’ Touts Mobile Access To IBM i Apps

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Why Open Source Is Critical for Digital Transformation
  • mrc Refreshes IBM i Low-Code Dev Tool
  • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
  • Four Hundred Monitor, March 3
  • IBM i PTF Guide, Volume 23, Number 9
  • Doing The Texas Two Step From Power9 To Power10
  • PHP’s Legacy Problem
  • Guru: For IBM i Newcomers, An Access Client Solutions Primer
  • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
  • Some Practical Advice On That HMC-Power9 Impedance Mismatch

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2021 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.