SMSEagle NXS-9700-4G & NXS-9750-4G Receives Verizon Certification

Poznań, Poland, November 13th, 2019 – SMSEagle, the leading manufacturer of hardware SMS gateways, today announced that Verizon has officially certified NXS-9700-4G device.
Customers can now use Verizon networks and SMS plans.

“Verizon Wireless is the second largest U.S. wireless communications service provider, that’s why it’s important that SMSEagle users can take advantage of their offer to get the coverage they need,” says Radosław Janowski, CEO of SMSEagle.

(Update)
December 16th, 2019 – Verizon has also officially certified NXS-9750-4G device.

About SMSEagle

SMSEagle is a professional hardware SMS gateway for sending and receiving SMS messages. The device is designed with focus on reliability and stability. It has a Linux on-board, modern responsive web-interface, database backend, and built-in GSM/3G/4G modem. SMS messages are sent/received directly to/from cellular network without using any external 3rd party solutions. SMSEagle has a built-in SQL database for secure storage of messages. Built-in SNMP agent allows to constantly monitor performance of the SMSEagle. The device has a range of built-in plugins that enable additional functionalities and easy to use HTTP API for integration with external applications.

Network Security: Shadow IT Risk and Prevention

Contrary to many opinions discovered online, shadow IT (a.k.a. rogue or stealth IT) is not down to the IT team saying no or refusing to provide required productivity tools necessary for a specific job role. In truth, it is often down to restrictive budgets and senior management decisions on same. Speaking as an IT pro, we do not care what software users need and would happily supply it if the budget is available and the software need is indicated. WE are not responsible for users installing unauthorised software, using unapproved cloud services or adding their own hardware such as memory sticks and external drives to company systems. BUT, as always, we are expected to assume the responsibility and the blame for such practices.

What are the risks of Shadow IT? How can they be reduced?

As Przemysław Jarmużek, systems administrator & support expert at SMSEagle was quick to point out: “The level of risk will depend on the type of Shadow IT and the motives of the user involved” with common dangers including but not limited to the following:

BYOD

The rise of BYOD in the workplace has tied IT’s hands in cases where IT do not have control of the device. Device owners are free to install whatever they wish on their own device and rightly so. In an ideal world, the device would use mobile device management (MDM) to segregate work and personal use by using a virtual partition. This work ‘partition’ could be managed remotely and the partition could be erased or deleted if the device is lost or stolen or if the employee leaves the company.

Consumerisation of Software

Anyone with a credit card can purchase a cloud service or online subscription to a wide array of software and collaboration tools. Many are free and only need an internet browser to access. This is an obvious problem when trying to control the flow of company data, making it almost impossible to track the impact of a data breach. These unauthorised activities could also have an impact on compliance requirements, especially in relation to data protection and requirements for storage of personally identifiable information (PII). The risk of intellectual property loss also increases if third party service providers are breached by hackers.

Licensing

Users installing licensed software from home is also a danger. Note that this activity is sometime used by malicious employees seeking financial gain. They install illegal software on company systems and then send a ‘tip’ to organisations responsible for copyright theft to obtain a percentage of the high financial penalties levied. This point is demonstrated accurately in a TechCrunch article: Software piracy claims can ruin your business and reward those responsible. An old article but all the points raised are still valid today.

Productivity Aims

Many users install or use unauthorised software and tools to improve productivity and lack any malicious intent. They are just unaware of the possible dangers of installing freeware and paid solutions that are not approved or monitored by IT.

Preventing Shadow IT

Radosław Janowski, product manager at SMSEagle said that “IT cannot be expected to have psychic powers and each department head should provide a list of software and tools that they need to fulfil their roles in a productive manner. This will allow IT to supply it and eliminate the requirement for Shadow IT.”

An excellent point. Tell the IT team that you can’t do your job effectively without software X and tool Y. We will listen and respond with updates.

In fact, there are several ways to reduce shadow IT while enforcing the fact that IT are responsible for security on company equipment and on BYOD devices when the owner has signed an agreement allowing remote administration.

  • Admin Access – There is no reason for users outside the IT team to have the ability to install programs. Any and all programs should be installed and managed by IT.
  • Network Inventory Management – IT will regularly monitor hardware and software assets on the network, automatically detecting any additions and reacting accordingly based on potential risk. There are many tools available to accomplish this task and some will aid security patch and update management.
  • Network and port monitoring – to prevent access to unauthorised cloud services.
  • IT will provide a software repository for all approved software and tools. If additions are required by a user or department, it is formally requested.
  • IT will foster an environment of security awareness to include the potential dangers of Shadow IT and ensure that there is an onboarding process for new employees.

However, without senior management support, none of the above will work. Available budgets and claims of IT interfering in all departments no longer hold weight as IT is needed in all departments. IT are responsible for security and if identified security risks are not acted on, then future problems that result from inactivity cannot be blamed on IT. When you consider that a recent Forbes Insights report finds that more than one in five organizations have experienced a cyber event due to an unsanctioned IT resource, is it worth checking if shadow IT is a potential risk in your business? I think so.

SMSEagle at Open Source Data Center Conference 2019

We are happy to announce that SMSEagle is a proud sponsor of Open Source Data Center Conference (OSDC) 2019! The OSDC takes place May 14 – 15, 2019 in Berlin.

The Open Source Data Center Conference 2019 focuses on innovative strategies, forward-thinking developments and new perspectives in dealing with complex data centers. This year’s agenda includes some of the most important representatives of the international Open Source scene.

The program includes inspiring speakers and interesting topics such as:

Nikhil Kathole | Red Hat | Simplifying your IT Workflow with Katello and Foreman
Kosisochukwu Anyanwu | Kinvolk | Virtualisation in Docker, using KVM as Hypervisor
Dan Barker | RSA Security | 5 Steps to a DevOps Transformation
Thierry De Pauw | ThinkingLabs | Feature Branching considered evil
Matt Jarvis | Mesosphere | Introducing Maestro – Kubernetes Operators the easy way

The whole program is available at osdc.de/agenda.

The aim of the event is to present state-of-the-art solutions and pioneering concepts for developers, decision-makers, administrators and IT managers who work with complex IT infrastructures. OSDC attracts more than 150 open source enthusiasts to Berlin every year. Speakers and participants take the opportunity to inform themselves about the latest developments and jointly launch new IT projects. An evening event offers the ideal setting for informal exchange.

More at osdc.de.

Pomagasz innym? My chcemy Ci pomóc!

Darzymy wielkim szacunkiem ludzi, którzy codziennie poświęcają swój czas i energię na to, aby świat w którym żyjemy stawał się lepszym miejscem. Czy to pomagając ludziom doświadczonym przez choroby, głód i biedę, czy też kształcąc nowe pokolenia, które zmienią świat, a może ratując zagrożone gatunki zwierząt.

Rabat dla organizacji non-profit
SMSEagle oferuje 10% zniżki dla zweryfikowanych organizacji non-profit oraz organizacji charytatywnych.

Kto może ubiegać się o zniżkę?
Organizacja kwalifikuje się do otrzymania zniżki non-profit, jeśli jest organizacją pozarządową o charakterze non-profit lub charytatywnym. Publiczna oraz niekomercyjna prywatna instytucja edukacyjna również kwalifikuje się do otrzymania zniżki non-profit.

Jak złożyć wniosek?
Prześlij do nas wiadomość email z linkiem do Twojej strony internetowej, opisującej status pozarządowej organizacji non-profit. Jeśli informacje na stronie nie są jednoznaczne, możemy poprosić o przesłanie nam dodatkowego dowodu potwierdzającego twój status organizacji non-profit. Akceptujemy każdą oficjalną dokumentację, potwierdzającą status organizacji non-profit. Na przykład klienci z USA mogą przesłać dokument 501 (c) (3), podczas gdy klienci z Wielkiej Brytanii mogą przesłać swój zarejestrowany numer organizacji charytatywnej.

 

SMSEagle Launches 4G SMS Gateway Compatible with All Major 4G Networks Worldwide

POZNAŃ, Poland, January 29th, 2019

SMSEagle, a leading provider of hardware SMS gateways, today announced a new suite of hardware, the NXS-9700-4G and the NXS 9750-4G which provide compatibility with almost any 4G/3G network in the world.

The new 4G series of SMSEagle NXS-97xx devices meets the requirements of a transition from 3G to 4G that happens in advanced telecom markets. It answers upcoming 3G network shutdowns in Australia and the U.S. in the following years, and what is more, can also provide access to LTE-only operators like Verizon and Sprint in the U.S.

NXS-97xx-4G is EU-originated product, for automatic sending & receiving of SMS messages. SMS messages are sent directly to the 4G network. This shortens the critical path in comparison to online SMS services, allows connectivity even during an Internet failure and provides confidentiality and privacy of information. Depending on the version, it can be equipped with one or two internal 4G modems with 3G-fallback.

NXS-97xx-4G comes standard with several features that support a flexible, reliable  environment for IT professionals:

  • intuitive GUI for easy configuration
  • over 30 plugins for Network Monitoring Systems (it is a must-have tool for any datacenter administrator)
  • API allows software developers to seamlessly integrate SMS capability into their external systems
  • unique Email To SMS feature, allowing to convert email messages into SMS texts
  • advanced self-monitoring mechanisms that control work of internal 4G modems
  • and many other functions making it one of the most advanced hardware SMS gateway product

Our new products are equipped with all the strength and performance efficiency to support everyday operations,” SMSEagle Product Manager Radosław Janowski said. “Their extensive network compatibility and modem flexibility establishes the NXS-9700/NXS-9750 as the go-to hardware SMS gateway solution for IT professionals, worldwide.”

About SMSEagle

SMSEagle is a leading brand of SMS gateway hardware worldwide. The product allows you to send SMS alerts coming from network monitoring systems, SMS tokens from authentication systems, convert email to SMS messages, send and receive SMS texts using API. The gateway is designed for professionals who rely on reliability and easy integration with existing IT systems

For more information, visit https://www.smseagle.eu/

Bring Your Own Device (BYOD) — Security And Other Considerations For Stakeholders

Bring Your Own Device (BYOD) — Security And Other Considerations For Stakeholders

Today’s employees are always connected, thanks to ubiquitous broadband and a wide range of portable devices, from smartphones, tablets and laptops to fitness trackers and a plethora of smart devices such as watches, cameras and GPS navigators. How necessary is this level of connection?

Table of Contents

Cinemas and restaurants are no longer peaceful, with beeps, chimes, vibrations and other alerts notifying everyone in the vicinity that something else (generally of a trivial nature) has occurred in your vast network of contacts. It makes sense that social addicts want to spread this contagion to the workplace since not being connected can produce a sense of withdrawal not unlike that of those coming off hard drugs. We need someone to like that oh-so-interesting photo of last night’s chicken chow mein. We need someone to know how we feel at work… Or do we?

BYOD Motivated By Cost Savings?

Let’s look at the motives behind BYOD adoption for companies and device users. Visitors to your home quickly request access to your Wi-Fi as most are tied to a set data plan by their mobile carrier, with a monthly cap and corresponding rate per gigabyte of usage. Using Wi-Fi, device users can access broadband Internet and reduce data usage over 3G, 4G or 5G. Therefore, we can safely conclude that users want BYOD to save money on data charges by connecting to the company Wi-Fi.

Employers also want to save money, of course and by allowing employees to use their own devices, do not have to issue company-owned devices. Since it is likely that personal devices are of a higher spec than those purchased for business use, there are also possible productivity benefits.

In an ideal world, the story ends there, everyone involved saves money and lives happily ever after. Unfortunately, there are drawbacks for both parties, ultimately caused by data, user and device management requirements.

Can any company afford to provide Wi-Fi access without considering potential security risks to the network and the data residing on it? No, as every jurisdiction is likely to have regulations and mandatory requirements relating to data security, personally identifiable information (PII) or indeed e-discovery. Therefore, any cost savings in allowing BYOD are likely cancelled out by the management of BYOD devices.

Practical BYOD Issues

As a former network administrator, I appreciate the additional workload a BYOD program can place on the IT team (the team blamed when the network is breached or data is lost).

The problems with BYOD from a security perspective include but are not limited to:

  1. Permission management–to ensure secure access (by user, device or network credentials), a solution aimed at mobile device management (MDM) is best.
  2. Device Management–companies need to decide on the device types and manufacturers they will allow on the network. Additional requirements could relate to the device OS revision/version involved. To allow all mobile device access is a mistake as cheaper brands could use an earlier OS version with known vulnerabilities or apps that can exploit network connections.
  3. Security updates–if the device owner does not encrypt the device or install security updates then it is a weak point on your network.
  4. Viruses, malware and other threats–again, virus scanners and other security tools must have the latest updates to protect the device and, in turn, the company network.
  5. Employee exit procedures–When the owner of a BYOD device leaves the company, the device must be cleaned to remove company data in a secure manner. This can require admin access to the device, a problem for many device owners, who do not like being ‘spied on’.
  6. Lost or stolen devices–If a BYOD device is lost or stolen, there is a potential data loss/breach involved. For this reason, the remote wipe is a useful admin feature. Unfortunately, such control is often a problem for device owners (see (5)).

For employers considering BYOD, device admin is typically the single thorny issue. If a user does not want the company to administer the device (and I wouldn’t) then the company should not allow the device to connect to company Wi-Fi. End of story. If the same employee needs a company device for travel or remote work, then issue a company-owned device as the company can administer it as they desire.

In conclusion, I believe that constant connectivity is not needed, unless you are a volunteer firefighter or an on-call medical professional. For family emergencies, SMS is still an effective way to receive an urgent message. After all, employees can still use their mobile carriers for internet access if needed at work. From a company perspective, is it easier to only allow company-issues devices access to the network? It varies from company to company, but for the most part, when full administration of employee-owned devices is necessary, the resulting admin and security risks may not be worth it. There are also HR (if an employee uses the device on work tasks outside working hours, expect to compensate that employee) and legal considerations (under e-discovery, mobile devices are included, and data loss can result in substantial fines) in some jurisdictions. I recommend you identify all potential risks before embarking on a BYOD strategy. What do you think? Is the use of personal devices an issue in your company?

Register for a 14-days free Trial

SMSEagle is a hardware & software solution that guarantees a swift delivery of your messages to designated recipients, whether it’s for notifications, alerts, or important updates.

  • 14-days free trial
  • Online Access to physical device
  • No credit card required
  • Access to over 20 functionalities

AT&T, Verizon i T-Mobile wyłączają usługę E-mail do SMS. Jakie masz alternatywy?

For years, many businesses and IT departments have relied on email to text services to deliver critical alerts, reminders, or automated messages. Email to text has offered a quick & simple way to send text messages to a recipient’s phone number using an email client.
The method was straightforward: send an email to a mobile carrier’s SMS gateway address (e.g., 1234567890@vtext.com for Verizon) and the recipient’s carrier would convert that email into an SMS and deliver it. No need for additional infrastructure. It just worked.

Read More »

SMSEagle Releases Revision 3 of NXS-97XX Line Devices.

Poznań, Poland, 19.11.2018 – SMSEagle announces Revision 3 of hardware SMS gateway NXS-97xx line devices.

The Revision 3 has minor modifications in hardware that meets demands of highest standards in networking devices. It is unmatched in quality and we believe it will cope with all the challenges faced by demanding customers.

Introduced hardware changes: The NXS-97XX line Rev. 3 products are equipped with a faster Gigabit LAN, 1 additional USB port, 4 additional DI/DO ports and 1 Wire functionality. The device is powered with newer Linux kernel 4.14.

“We strive to provide our customers with products and services that meet and even exceed their expectations. We are committed to continuous improvement.” says SMSEagle Product Manager Radosław Janowski.

NXS-97XX Rev.3 line devices are fully compatible and interoperable with existing NXS-97XX line. The Rev.3 line devices will gradually replace current NXS-97XX Rev.2 line.

More information may be found at the SMSEagle NXS-97XX product page

——————
SMSEagle hardware SMS gateway is a Polish product for automatic sending & receiving of SMS messages. SMSEagle allows you to send SMS alerts coming from network monitoring systems (NMS), SMS tokens for authentication systems, convert email to SMS messages. The device is also equipped with rich HTTP API thus allowing easy integration with any external software. The gateway is designed for professionals who rely on reliability and easy integration with existing IT systems. SMS messages are sent directly from the gateway to 3G network. This shortens the critical path (compared to using online SMS services), and allows sending a message even when internet connection is broken. The external antenna improves signal strength in areas with limited 3G coverage (ex. server rooms, datacenters). Internal SNMP agent allows you to monitor the device’s performance using SNMP metrics.

SMSEagle is exhibiting at ITPartners 2018

IT Partners is a French trade fair organized annually at the Disneyland Paris in Paris, France. This is a leading event for the French IT channel, telecoms and audiovisual, and includes representatives from global IT markets. It covers a number of areas including infrastructure, software and services, mobile communications and networks and the Internet of Things.

This year on 14th & 15th of March SMSEagle was presented at the fair in the booth of our French Sales Partner NMS Distribution.

Photo of NMS Distribution team with Solarwinds, Flowmon and SMSEagle.

NXS-9750 device won IT Product 2018 competition in ComputerWorld Czech Republic

We are happy to announce that SMSEagle NXS-9750 device was awarded the prestigious IT Product award in 2018 of the twelfth edition of the IT Product of the Year contest of ComputerWorld magazine in Czech Republic!

ComputerWorld is a publication website and digital magazine for information technology (IT) and business technology professionals. It is published in many countries around the world under the same or similar names. Each country’s version of ComputerWorld includes original content and is managed independently.

The aim of the competition is to highlight products with characteristics that distinguish them from competing products of the same category. The evaluation emphasizes the positive difference from the competition and the benefits for the customer. This way, both the innovative products and the products with interesting functional improvements, significantly simplified control or, for example, with an exceptionally favorable price can be awarded to the final of the competition.

More information:

IT Product of the Year 2018 contest of ComputerWorld

Product prize description

 

SMSEagle devices can be purchased in the Czech Rep. and Slovakia through our sales partner IT AWACS.

We Care About Giving Back – Why We’re Donating to the Good Factory Foundation

There is a lot of pain in the world today, and at SMSEagle, we believe in giving back in order to help those that may be in less fortunate circumstances.

We’ve recently started monthly donations to The Good Factory Foundation, an organization based in Poland that pioneers social good programs in African countries: Rwanda, Democratic Republic of the Congo, Togo, Burkina Faso and Benin.

“Being involved with this type of organization allows me to really live my values and share what I’ve gained throughout the course of my life. The Good Factory Foundation produces goodness in those parts of the world, where evil takes the hope, joy, health and life away from people” Radoslaw Janowski, Product Manager for SMSEagle said.

The Good Factory was founded by Szymon Holownia, a polish journalist who started this second foundation after the Kasisi foundation – he started these organizations because he believes in the unique goodness of people:

“I dared to start the Good Factory, because after I founded the Kasisi Foundation, I started to really believe in people. […] How about, instead of lamenting on how bad this world is, we could change another little bit of it for better?” Szymon Holownia, Founder of The Good Factory said.

They are indeed changing the world for the better – the foundation has already accomplished many feats of social good, many which include the fight against disease and hunger in their countries of focus.

Here’s what they’ve already accomplished, and what we want to be a part of.

The Good Factory Foundation has several objectives, but they all point to a few key themes – the support of human rights, medical assistance, and the proliferation of education, all of which are goals we believe in here at SMSEagle.

The organization has already done countless acts of good in regions of focus. Here are some statistics for 2016:

In 2016 at the Hospital in Democratic Republic of the Congo, the staff provided ambulatory help to 8127 patients, 4354 people were hospitalized. There were 308 surgeries and 151 surgeries, 6476 people were cured of malaria, 722 children were helped to come to the world, including 179 by caesarean section. At the feeding center in Democratic Republic of the Congo 402 children were cured from the acute phase of hunger, 899 from the moderate phase. Every week the place has about 220 children. At Hospice in Rwanda, 25 patients underwent long-term palliative care. 3500 people benefited from the help of a pharmacy in Saoude, north of Togo, where they received the necessary medicines. In Togo, 167 children were paid for school expenses. In the village of Akata Dzokpe in Togo, 30 leprosy patients were provided with medical care, medicines.

As a business that is committed to social good, we look forward to being a part of more acts of kindness like this, and look forward to the positive change they can help bring to parts of the world that need it most.