About Hanna.Bagley

This author has not yet filled in any details.
So far Hanna.Bagley has created 25 blog entries.

Coretek Services Named AppSense 2015 Partner of the Year, Central Region

2017-07-27T00:00:58+00:00 April 12th, 2016|News, Uncategorized|

FARMINGTON HILLS, Mich. and SUNNYVALE, Calif., April 12, 2016Coretek Services, one of the leading IT consulting and systems integrators, and AppSense, the global leader of secure user environment management (UEM), today announced that Coretek Services has been named AppSense 2015 Partner of the Year, Central Region. The award, presented during AppSense’s annual North American Elevate Partner Conference in New Orleans, La., recognized Coretek Services for its exceptional achievement in the areas of customer engagement, revenue growth and implementation innovation.

We really value the relationship we have with AppSense,” said Ray Jaksic, Chief Technology Officer Coretek Services. “They are truly a ‘channel focused’ organization.  It’s the value their products provide within our solutions and their flexibility in doing what it takes to close deals that has resulted in many great wins for both of our organizations and our customers.”

AppSense continues to be a staple within the Coretek virtual desktop suite of solution offerings and has also proven to be a valuable solution to help secure physical endpoints without impeding end user’s ability to do their jobs.  Coretek has leveraged AppSense Environment Manager for years to provide a “persistent” end user experience without requiring a “persistent desktop image” within VDI. In recent years, Coretek has also leveraged the entire DesktopNow suite with its VDI implementations. The company also now leverages

Performance Manager to optimize the performance of VDI desktops when running applications that are either poorly written or have very high I/O or processor requirements.  This has demonstrated particularly significant successes with graphically intense Engineering Applications.

“AppSense has grown within our solution portfolio to help secure and migrate physical endpoints as well,” added Jaksic. “We have been able to use AppSense to lockdown physical endpoints to eliminate the launch of ‘unknown’ executables, and give all users only the minimal rights necessary to do their jobs without providing full administrative access.”

“We are pleased to recognize Coretek Services as our 2015 Partner of the Year, Central Region,” said Jim Airdo, vice president of channel, AppSense. “Coretek Services continues to demonstrate an exceptional commitment to our mutual customers, driving new opportunities for AppSense solutions and providing sales, technical and support excellence. We look forward to our continued partnership in 2016 the years ahead.”

The AppSense Partner of the Year awards were selected following close evaluation of each partners’ annual contributions based on planned expectations in the areas of engagement, revenue and growth. Commitment to AppSense training, dedicated personnel and overall performance was also considered.


An AppSense Go+ Platinum Partner, Coretek Services offers a complete suite of AppSense UEM solutions including DesktopNow, DesktopNow Plus, DataNow, Application Manager, and AppSense Insight which enable IT organizations to centralize desktop security, management and personalization policies with a prescriptive view into security-related activity. These solutions allow users to have greater desktop personalization while improving security, performance, desktop consistency, and reliability.


About Coretek Services
Coretek Services is a Systems Integration and IT Consulting Company that delivers high value and innovative solutions.  Coretek works with your team to custom-design an IT architecture based on each clients’ unique requirements; the solution encompasses server and desktop virtualization, optimization of a virtual desktop environment, cloud desktop, mobile device management, infrastructure consulting and project management.  Our goal is to help our clients achieve Project Success.  No exceptions. For more information, visit www.coretekservices.com.


About AppSense                                                                                                         
AppSense is the leading provider of UEM solutions for the secure endpoint. AppSense user virtualization technology allows IT to secure and simplify workspace control at scale across physical, virtual and cloud-delivered desktops.  AppSense Solutions have been deployed by over 3,600 enterprises worldwide to 9 million endpoints. The company is headquartered in Sunnyvale, CA with offices around the world. For more information, please visit www.appsense.com.



Media Contacts:

Erin Jones

Avista Public Relations for AppSense



How Healthcare Organizations Get ROI from the Cloud

2017-07-27T00:00:59+00:00 March 8th, 2016|News|

March 8th, 2016 – Like many healthcare organizations today, your internal IT costs may be high as a result of capital-intensive investments in hardware. In addition, you may find that your key resources are spending precious time fixing IT problems when they could be focused on their primary job. When it comes to shifting your organization away from this expensive way of doing business, you’ve probably considered a cloud-based solution. But you may be unsure if it’s the right choice.

At the top of your questions might be whether or not the cloud can provide the level of security required to manage your highly sensitive patient data.

Adopting cloud technology is a viable, sustainable, and cost effective solution for healthcare facilities. At Coretek, one of our primary goals is for clients to realize between a 20-40% savings in the first year of moving to a cloud-based solution. In fact, a return on investment is usually realized within one year of investing in our cloud solution.

Here are just a few of the ways that you get ROI out of the cloud:

OPEX budgeting is predictable

Not only does the cloud free up physical space by not requiring servers, floor space, cooling, heating, power and racks, but IT budgeting becomes predictable. With an operational expenditure model, you can now do new resourcing models without impact to your budget and operations.

New levels of efficiency

In many healthcare facilities, servers are showing their age, applications may be running slower and more and more time is spent fixing broken technology. Instead of trying to be the IT expert managing a closetful of hardware, the cloud keeps you out of react mode and focused on day-to-day priorities. With a cloud solution, ‘tier one’ problem solving becomes automated, saving you valuable time and resources.

Additionally, there are over 80 different products in the cloud today that have been turned into single solutions, and each of these 80 products can now be delivered instantly through one cloud-based solution specific to your needs. With so many ways to streamline processes, automatically comply with regulations, and avoid wasting precious resource time, physicians and clinicians benefit from new levels of efficiency.

Makes HIPPA easy and provides business continuity

In many healthcare facilities, servers are showing their age, applications may be running slower and more and more time is spent fixing broken technology. Instead of trying to be the IT expert managing a closetful of hardware, the cloud keeps you out of react mode and focused on day-to-day priorities. With a cloud solution, ‘tier one’ problem solving becomes automated, saving you valuable time and resources.

Coretek’s cloud solutions are not only powerful, but you can now realize a significant ROI while propelling your healthcare business forward with the most modern technology. For more information on our cloud solutions, click here.

How To Maintain Physical Control of Your Devices

2017-07-27T00:00:59+00:00 March 7th, 2016|News|

March 4, 2016 – In our previous blog post we discussed the importance of containing your data in your company. In this article we are extending the concept of securing your business to the importance of maintaining physical control of your devices.

Why is this important? With the rise of data breaches and the use of BYOD at work, you need to be able to control, monitor, and secure how your employees use corporate and personal devices to share confidential information.

What if you could lock certain functionality by location, which are standard on most mobile devices (cameras, unapproved Wi-Fi hotspots), or even erase all corporate related data when an employee leaves the company? Maintaining physical control of your corporate and BYOD devices is possible through Mobile Device Management (MDM), which monitor, deploy, and secure your corporate environment.

Here is a list on how MDM allows you to maintain control of your employees’ devices at work:

  1. Make changes when you want. With MDM you have the ability to turn off certain features on any devices used for work (e.g. even those personal devices). You might not want employees to use their camera during a quality control service at your company’s manufacturing facility. Also, many companies block employees from accessing networks that are not considered secured (e.g. coffee shops). You control what features are accessible to your employees at any given time to reduce the risk of penetration.
  2. No access granted. With MDM you can limit the functionality of a device based on location and time. If you don’t want files to be shared after working hours you will be able to set that functionality on all mobiles or a select group. Just be aware that your CEO might always be working!
  3. I never got my laptop back. Many companies let employees leave their jobs keeping corporate laptops. This means that they have access to confidential data as former employees. With MDM you can erase the data from any mobile devices at any given time, without it being in your physical possession. So, as soon as that employee resigns, you can wipe out all corporate data and applications.
  4. BYOD. Once a user enrolls into a Mobile Device Management program, the IT staff has the ability to configure different corporate services (e.g. secure e-mail) that employees can use. This means that your staff can continue to use their personal devices both for pleasure and work-related tasks. Only the corporate services (e.g. e-mail, file-sharing) are controlled by your IT team. This is important as you have full control of the corporate data stored and shared via BYOD, but leaves your employees happy that they still control their personal information.

Having control of mobile devices at work is more important than you think. If you don’t have MDM in place your data is vulnerable to attacks, thus putting you and your business at risk. Being able to monitor, deploy certain features, manage specific applications (e.g. access to Wi-Fi, password request), and erase company data is essential to securing your company.

At Coretek we look at how your employees are using mobile devices at work and define what needs to be done to secure your company. We help you design and implement a strategy that meets your needs. At the end of our involvement with you, your IT staff will be prepared to maintain physical control of all devices, while protecting your business.


Containerization of Data: Take Back Control of Your Data

2017-07-27T00:00:59+00:00 March 7th, 2016|News|

February 26, 2016 – Hackers are getting more aggressive every day, just as new gaps in security systems also continue to pop up. It’s estimated that 60% of enterprises allow use of personal devices in the office, opening your company to security threats and data leakage. Your challenge is to provide security as this trend continues to play out.

The risks of losing confidential information and being subject to governmental penalties can put your company at risk (potentially out of business)! Enterprise Mobile Management (EMM) aims to protect your company by managing your employees’ mobile device applications and functionality, like DropBox or Sharefile, aiming to increase security while providing the right tools for your staff to work more efficiently.

Containerization of data.

Have you ever received an excel report from a client prompting you to insert a password to view the document? That’s an example of containerization of data across mobile devices.

Containerization of data describes taking your data protection to the next level through where and how you store your data. Usually, companies store their data inside the cloud or a shared data center. But, with containerization of data, data is encapsulated within a privately controlled corporate environment. Also, the data is encrypted with a security key, so nobody can penetrate the data unless they have the necessary credentials.

E-mail data leakage.

The most common way for companies to lose their data is through email. Most companies allow employees to use their personal devices to receive work related documents or emails. If your employee were to lose their phone, say leaving it behind on an airplane for example, and you didn’t have the proper security protocols in place, a hacker could easily infiltrate your employee’s email and steal confidential data.

Imagine if your CEO were to send a confidential e-mail to the CFO about the company’s 5-year strategy, including budget and revenue projections. Would you want your competitor to have access to that message? Or, what if you were discussing a merger with another company and the deal went off because your e-mail appeared on the front page of your local newspaper? You may think it can’t happen to you, but without proper security, your company is very much at risk.

In a containerized environment, all e-mail is secured, encrypted, encapsulated into that device, and cannot be hacked.

Shared file data leakage.

The other way data leakage can occur is through public applications on mobile devices. Many companies leverage free tools, like file sharing services, to increase productivity, but don’t realize that these unsecure consumer-grade applications are magnets for hackers.

For instance, confidential information on merger and acquisition is often shared between companies across multiple devices, increasing the possibility of data leakage if none of the companies have secure environments in place.

In a containerized environment you can share a file using your secure ShareFile app, and the person receiving the document will be able to open the file using your encrypted and secured server. You even have the ability to expire the document if it isn’t opened in a certain period of time. This is a great way to ensure your data will only get into the hands of the interested parties.

Whether you’re a small company or a big business, it’s imperative to protect your data by containing the information under one secure environment. Enterprise Mobile Management controls where emails can be sent, how they are accessed (prompting for a password), and where documents can be shared. Your data is “contained,” no matter where your employees are and what devices they are using.

For information on how Coretek can help with your Enterprise Mobility Management, click here.

Risks and Costs of Unsecure Mobile Devices at Work

2017-07-27T00:00:59+00:00 February 18th, 2016|News|

February 18, 2016 – Today the average person owns 5 devices, with 3.5 devices (e.g. iPad, laptop) being carried at work. Companies have quickly begun to allow their employees to use personal devices to conduct work-related tasks, but without considering the hidden business risks associated with BYOD.

Allowing your employees to use their personal devices to share data leads to serious concerns around data protection and prevention. Here are the top hidden risks and costs of unsecure mobile devices at work, and why you need to consider Mobile Device Management (MDM).

Containerization of data

Companies allow BYOD because it provides business functionality, flexibility and accessibility to employees. People are able to work more efficiently and be more productive, whether they are in the office or out. Work is no longer a place, it’s wherever you are at any moment in time. That’s why having secure, intuitive access to the company’s data and applications is critical to productivity in the “real world”.

What many companies don’t consider when adopting a BYOD environment are any potential business risks that come from not having any proper security and policies in place – leaving data unprotected and subject to leakage.

When there is not a plan in place for a BYOD approach what gets missed is corporate control over multiple devices. In order to implement a secure and effective strategy, you need to implement a BYOD corporate policy and a solution that includes MDM. Mobile Device Management reduces your business risk by managing all your employees’ devices under one console. You contain the data, monitor it, control it, and protect it. If an issue arises from a personal device (e.g. virus) you will be able to contain and resolve that issue in a secure and timely manner.

Penalties and Fees

When you don’t control the flow of your corporate data you are putting your company at high risk for not meeting compliance requirements for HIPAA, banking, customers, or partners.

Under HIPAA, for example, there are severe penalties that are tied to every individual piece of information that leaks. These penalties – in the nature of fees – are substantial and could shut down your business.

And don’t think that your business is not big enough to be hit. Any industry that has valuable assets (e.g. medical records, phone numbers, social security numbers, and merger information) is susceptible to regulation. Protecting your data across mobile devices will save you money in the long term.

MDM focuses on a cost avoidance approach. It reduces exposure of corporate data, while monitoring any suspicious activity. It can locate and lock lost or stolen data from any device, and can also remove or restore data from any mobile device. MDM also allows you to target different groups within your company with customized policies. For example, your HR staff might need more protection than other departments since they deal with a greater amount of confidential data.

There are real tangible business reasons that drive your business staff to use the personal devices at work in order to be productive – they just need to be secured and controlled. Without anyone meaning to be malicious, companies can lose control of confidential data, putting at risk their customers and their businesses. Mobile Device Management puts that control back in place, regardless of the device your employees are using.

If you are not sure how to start with MDM, partnering with an IT consulting company like Coretek can be cost efficient and reduce your stress. Coretek helps companies understand the risk associated with leaving your data unprotected. Based on your current needs, we provide the most suitable solution to prevent any unpleasant and costly security surprises. For more information, please visit Coretek here.

Load More Posts