Two-Step Verification

Source: SANS security tip
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.
Two-Step Verification

PayPal Commerce Matches Stripe With PayPal’s Own Native Shopping Toolkit For Apps

Source: Tech News – Enterprise
email_buy_buttons PayPal’s first acquisition after it separated from eBay in 2015 was of a young startup called Modest, which had built a platform for small businesses to integrate buy buttons across third-party apps. Now, PayPal is taking the wraps off a new product that will integrate Modest’s technology. PayPal Commerce — as the new service is called — launches today in closed… Read MorePayPal Commerce Matches Stripe With PayPal’s Own Native Shopping Toolkit For Apps

Power to the People

Source: Meraki-Cisco

Since the inception of the MX product line, one message has come through loud and clear from our customers and partners: they love the MX for branch deployments. From the original MX50 to the MX60 and the more recent (and very well received) addition of the MX64, we’ve continued to invest in new branch MX models and features. This week, we take a huge step forward in the evolution of cloud-managed branch security with the release of the new MX65 and MX65W security appliances.

The first thing anyone will probably notice about the MX65 is the significant increase in port count. The new models host a whopping 12 Gigabit Ethernet ports, more than twice as many as the MX64. This removes the need for an additional switch in locations where there are only a handful of devices requiring network connectivity, helping to keep the cost and complexity of the deployment to a minimum. Fitting these ports onto the back of the device has resulted in a couple of minor design changes, such as the reset button and USB port being on the side of the unit rather than the back. Best of all, thanks to some phenomenal design work by our hardware team, we’ve accomplished all of this without significantly increasing the size of the unit – it’s the same height and depth as the MX64, and less than an inch wider.


Even more important than the number of ports is how we’ve allocated those ports. While eight of them are standard LAN ports like those found on other MX models, the other four have something special to offer. First we have two dedicated WAN ports, so that administrators can connect two Internet or MPLS connections without sacrificing one of the LAN ports. This not only makes the unit simpler to deploy, it also means that the MX65 is a perfect fit for customers who want to make use of our IWAN features to get full use out of their redundant connections.

The last two ports offer the most striking difference in functionality between the MX65 and previous models. As indicated by the lightning bolt icons to the left of the port numbers, these ports provide Power over Ethernet (PoE). Each port operates on the 802.3at standard, also known as PoE+, and provides up to 30 watts of power to any connected PoE-capable device. These can include phones, cameras, wireless access points, or a variety of other devices. As with the increased port count, this change makes it much easier to deploy the MX65 without the need for additional hardware such as switches or PoE injectors, resulting in a cleaner branch architecture and an easier deployment.

Alamo Front (1)

Last but not least, the MX65W boasts not only a new and improved revision of the MX64W’s 802.11ac wireless chipset, but also a custom antenna design that provides both better range and improved wireless performance. For sites that need wireless coverage that goes beyond what a single unit can offer, you can of course still deploy an MX65 with any of our MR Access Points – and with the new PoE capabilities, you can power up to two APs from the MX65 itself.

To learn more about the MX65 and MX65W and how they fit in with the rest of the MX portfolio, check out the Cisco Meraki website.

Power to the People

BBVA Shuts In-House Venture Arm, Pours $250M Into New Fintech VC Propel Venture Partners

Source: Tech News – Enterprise
rocket chalkboard BBVA — the Spanish banking giant that acquired Simple in the U.S. and last year made a $67 million investment in still-stealth mobile-only bank Atom in the UK — is changing up how it plans to invest in fintech startups in the future.
The company is shutting down its in-house venture arm, BBVA Ventures; and it is taking BBVA Ventures’ portfolio, the $100 million fund it had… Read MoreBBVA Shuts In-House Venture Arm, Pours 0M Into New Fintech VC Propel Venture Partners

Facing An Array Of Challenges, Autodesk Shifts To Subscription Pricing

Source: Tech News – Enterprise
Autodesk loading dock. Autodesk has been around the block a few times, having debuted way back in 1982 in the earliest days of the desktop PC. These days, the company is in the midst of a major transition from a licensing model to a subscription model, while juggling the assortment of challenges a change like this brings to a mature company.
It would be wrong to characterize this is as a total cloud pivot, however. Read MoreFacing An Array Of Challenges, Autodesk Shifts To Subscription Pricing

Mobile Payments Startup Payleven Raises Another $10M

Source: Tech News – Enterprise
payleven devices The days of Square clones popping up, everywhere you looked and capitalizing on Square’s conservative approach to global expansion, are long gone. But those startups are not. And today, one of them is announcing a Series D round.
Payleven, a mobile payments startup originally incubated in 2012 at Berlin’s Rocket Internet, says it has raised a $10 million growth round from a… Read MoreMobile Payments Startup Payleven Raises Another M

Bring your droid to work

Source: Meraki-Cisco

The Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) arena is an exciting technology field with rapid innovation across a wide breadth of platforms. On February 9th we announced the launch of a host of new Systems Manager (SM) features and functionality for these platforms, and as part of this release SM now supports Android for Work.


This provides a major boost to the manageability of Android devices as it makes it much simpler for employees to use their own device for work. It does this without ceding the user’s control of their personal device, while allowing the organization to ensure appropriate security.


An example of one of the areas where functionality has been significantly extended over existing Android controls, is in the area of restrictions. There are now three new categories of Android restrictions available in SM, in addition to the previously available ones.
Keyguard restrictions help secure an Android device when it is locked. Although you may be confident your data’s security when the device is locked, information could still leak out without the correct keyguard settings, for example a notification that displays the content of an SMS even when the device is locked. With keyguard restrictions you can now disable any or all of the following items:

  • Notifications
  • Unredacted notifications
  • Fingerprint access
  • Camera
  • Trust agents
  • All keyguard features

In addition to keyguard controls, an administrator can now also apply restrictions to other system areas. One brilliant addition is the ability to prevent users from installing applications from unknown sources. With the prevalence of malware and other dangerous apps in the Android ecosystems, allowing users to turn off this safety net  is often not desirable. This control lets the administrator decide. The complete list of system restrictions we are announcing in this launch is:

  • Prevent Android Debug Bridge (ADB) access
  • Prevent installation of apps from unknown sources
  • Prevent uninstalling of apps
  • Prevent app control
  • Enforce application verification
  • Disable SMS
  • Disable keyguard
  • Disable screen capture
  • Disable volume adjustment
  • Disable factory reset

Along with the new restrictions, there is now containerization with separate Google Play stores for personal and work apps. This allows separate instances of identical applications to be isolated within the appropriate personal or work container. For example you can have two instances of Gmail with one configured for personal use and the other configured for IMAP access to a corporate mail server.


Administrators can now be confident in the knowledge that corporate data can be erased with the removal of the work app from a device, and users will be reassured that their personal data won’t be affected. A complete wipe of the work profile removes all the contained applications and data meaning off boarding employee devices is straightforward and secure.

Android for Work and the other new features included as part of this launch are available today. If you are a Systems Manager Legacy customer interested in these new capabilities, then you will need to upgrade to the full version. This includes a wealth of features on top of those mentioned in this post, with further information available on the Systems Manager licensing page.

More information can be found on our documentation portal, with upcoming Systems Manager webinars highlighting these features. Alternatively contact us to begin a no risk trial and we will help get you up and running.

Bring your droid to work

WorldRemit Gets $45M At A $500M Valuation To Grow Its Mobile Money Transfer Business

Source: Tech News – Enterprise
worldremit africa A year after raising $100 million, London-based startup WorldRemit has picked up more funding. To compete against the likes of Western Union in the world of money transfers — and tap a remittance market that the World Bank estimates will be worth $610 billion in 2016 — the company has added another $45 million to its coffers. This latest round, a debt round… Read MoreWorldRemit Gets M At A 0M Valuation To Grow Its Mobile Money Transfer Business

Cloud Security

Source: SANS security tip
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.
Cloud Security