Noticias - News


Simplifying Computer Management
  1. Reboot to Restore : Keeping Enterprise Computers Always Business-ready with One-Touch Remediation

    Managing hybridized environments and seamlessly blending traditional and contemporary services, to ensure consistent operations, always throws new challenges at IT admins. In such settings, system administrators and help desk professionals are often spending so much time interacting with service providers, and dealing with the increased volume of help desk requests, that there aren’t many resources left to handle end-user computers.

    This resource crunch represents a major problem as a great deal of work is still getting done on typical workstations and laptop PCs, but who is doing that work and the tasks that users are handling can be extremely varied. As a result, device settings, account permissions and similar small changes can add up one-by-one over time to create an incredibly chaotic and unmanageable environment. IT teams need tools to get end-user devices under control and back in business, otherwise, help desk users will be left scrambling when trying to help individuals with basic problems.

    When you get behind on managing end-user computers, you can end up facing such questions as, “why can’t I sign on to the VPN?” or even, “This software worked yesterday, but I can’t login today. What’s going on?” Wrestling with such mundane issues can be time-consuming, and it can also distract IT users from innovative projects and similarly valuable work.

    Deep Freeze patented ‘Reboot to Restore’ technology allows for one-touch remediation, allowing you to reset systems to working settings quickly and establish a much more stable, secure configuration.

    Five ways how Deep Freeze helps in

    The post Reboot to Restore : Keeping Enterprise Computers Always Business-ready with One-Touch Remediation appeared first on Faronics.

  2. Tech Roundup – February in Review

    While change is constant in the IT world, the headlines frequently cover similar themes. Data breaches, new smartphones and the next big industry disruption are often getting attention. When you look beneath the surface, however, you can find news stories that emphasize the real day-to-day challenges IT workers are facing, not just the big-picture issues or hyped solutions that tend to get media attention.

    Here’s a look at three major news stories from February with an emphasis on incidents that highlight the everyday problems facing IT, particularly the difficulty in gaining visibility into the configuration.

    80 Million Records Added to Compromised List

    Troy Hunt, a cybersecurity expert who is working on a large project for Have I Been Pwned, a site that documents compromised records so consumers can adjust account credentials, has added data from almost 3,000 previously undocumented data breaches to a database on the site, CSO reported.

    According to the news source, Hunt initially began working from a large, 8.8 GB zip file containing an archive of user credentials that were known to be compromised. The credentials were discovered by Hacked-DB, who discovered 3,000 hacked databases linked to various organizations and individuals.

    In total, Hunt has delved through the raw data to identify information that has already been published on Have I Been Pwned and has since updated the list with only new information, which amounts to a staggering 80 million records, the report said.

    What makes this unique is

    The post Tech Roundup – February in Review appeared first on Faronics.

  3. Anti-Bullying Awareness : Empowering Students with Instant Reporting Mechanisms

    Bullying can be defined as any unwanted behavior in which a child/ teen misuses certain aspects – such as physical strength, access to embarrassing information, or popularity – to control or harm other kids. It can include anything from spreading rumors to name-calling to physical aggression. Essentially, bullying is an abuse of power and can have lasting impact on a person’s day-to-day life, mental health and decision-making prowess.

    Faronics products are extensively used in educational environments, and we believe in empowering victims of bullying with means of reporting incidents. If there are multiple communication channels available for students, bullying incidents can be nipped in the bud, preventing any damaging consequences in the future.

    Faronics Deep Freeze Cloud’s Anti-Bullying service is designed to be one such communication mechanism. The service has incident reporting features that allow kids to anonymously report bullying incidents via a PC or a custom mobile campus app.

    Anti-Bullying Service

    Anti-Bullying Service allows students to anonymously report bullying incidents on computers managed with Deep Freeze Cloud.

    To add Anti-Bullying to the Policy, go to

    Add Policy > Anti-Bullying > Select Enable (install and inherit settings from Faronics Default policy) or Enable (Install and use below settings).

    Selecting this option installs Anti-Bullying on all computers using this Policy.

    Selecting Enable (install and inherit settings from Faronics Default policy) or Enable (Install and use below settings) installs Anti-Bullying on the computers whenever the computers check-in. The computers check-in based on the heartbeat specified in Cloud Agent Settings.

  4. Simplifying Endpoint Maintenance : 5 Tasks You Need To Automate Now

    For Enterprise IT teams, the primary focus is always ensuring availability, perform troubleshooting and manage security mechanisms. Endpoint maintenance is equally critical, but gets overlooked, due to lack of time/ resources. Apart from that, maintenance usually consists of multiple repetitive, mundane but critical tasks which need to be done on a regular basis. Unnecessary manual intervention doesn’t just slow operations and stifle innovation, it forces IT decision-makers to overlook/ under-prioritize critical security tasks, often pushing off patches and updates, something that could put the organization at risk. This isn’t an isolated problem either: Approximately 75 percent of respondents in a recent Ponemon Institute study said they have fallen behind on patching processes. The scale and complexity of IT environments and endpoint configurations today burdens enterprise IT teams with a hectic overload. They are left scrambling trying to keep up with all the applications, software and services at their disposal.

    Endpoint maintenance is highly critical for robust security and business continuity. For example, the Equifax data breach was caused by an unpatched software vulnerability that the IT department simply didn’t have time to address. Speaking to the U.S. House Committee on Energy and Commerce, Subcommittee on Digital Commerce and Consumer Protection, now former Equifax CEO Richard Smith had to take ultimate responsibility for a massive data breach that impacted more than 140 million consumers. This incident is a reminder that business and IT leaders have an equal stake in in preventing data breaches, with IT needing better processes and corporate executives

    The post Simplifying Endpoint Maintenance : 5 Tasks You Need To Automate Now appeared first on Faronics.

  5. Endpoint Management Starts with Control and Visibility : Deep Freeze Cloud can Help

    The IT security threat landscape has become more and more difficult for businesses to deal with. Threat vectors are getting more sophisticated and targeting weak points with precision. Increased technical complexity is leading to a wide range of insider threats, as users can inadvertently subvert policies and best practices without even knowing it. What’s more, a simple, small human error can lead to large data breaches due to a minor configuration change. There are a variety of factors contributing to the complexity of endpoint management, but one underlying question connects all of them : Do IT departments have the optimal visibility or control over their operating environments?

    Visibility Matters

    For smart endpoint management, IT teams need to be able to control the endpoint configurations, because users nowadays work with multiple devices. With more companies offering branch locations, remote work and similar strategies, the typical enterprise user may hop between a few laptops, desktop PCs and mobile devices on a regular basis. Throw in the high levels of turnaround in today’s business climate, and you’re looking at an extremely fluid device landscape.

    On top of all this, a few select trends are shifting the power dynamic in technology decision-making. These include: