Encom Blog

  • Intel Core X Series CPU

    intel-i9-750

    The Intel® Core™ i9 Extreme Edition Processor

    The dawn of a new breed of extreme desktop processors is here, elevating everything you do to new heights. Powered by a massive 18 cores and 36 threads, this processor enables extreme single-threaded performance with the updated Intel® Turbo Boost Max Technology 3.0. This technology now identifies the two best performing cores to provide increased single and dual-core performance. The new Extreme Edition boasts 44 PCIe lanes and support for multiple discrete graphics cards, Thunderbolt™ technology, and high-speed storage like Intel® Optane™ technology. And of course, it is fully unlocked for extreme performance.

    The ultimate platform with unprecedented scalability. The ultimate platform with unprecedented scalability.

    Intel® Core™ X-Series Processor Family

    Something for every enthusiast! The new Intel® Core™ X-series processor family is designed to scale to your performance needs by delivering options between 4 to 18 cores for extreme performance, the latest technological advancements, and headroom for the future. This platform comes ready to install Intel® Optane™ memory and Intel® Optane™ SSDs for amazing system responsiveness. Support for immersive 4K visuals, four channel DDR4 2666 memory, Thunderbolt™ 3 delivering a 40Gb/s bi-directional port for almost any peripheral you want to connect and up to 8 SATA ports for a RAID storage array makes this the ultimate desktop platform.

    Game, Stream, Record

    Enter the realm of extreme performance where game play is so life-like it is difficult to tell where reality ends and the game begins. Surrounded by multiple high-res displays and premium audio sound, you are totally immersed in the action of your AAA game title or the latest virtual reality thriller. Play extreme, live extreme, game extreme on a computer with an unlocked Intel® Core™ X-series processor. And because modern gaming extends beyond just gameplay, you want to simultaneously share your gameplay with the community and the world. Record all the action capturing that once in a life-time maneuver that brought you to victory, and convert your game play into a sharable format to immediately post on your social media page. That is extreme mega tasking and the power of the Intel® Core™ X-series processor.

    intel-core-x-300

    Unleash Your Ultimate Creative Genius Now with an Intel® Core™ X-Series Processor

    Your creativity is limitless, and once you are in the flow of ideas, you need a system that will keep up. You need the uncompromising performance in a PC powered by the Intel® Core™ X-series processor. The Intel® Core™ X-series processor family with 8, 12 or even 18 cores delivers amazing performance when multiple real-time workloads are stacked. Spend more time creating while your Intel® Core™ X-series processor powered system simultaneously handles uploading massive 4K files, rendering effects and other compute intensive workloads in the background. And with the updated Intel® Turbo Boost Max Technology 3.0, you have the control to give priority to the apps that need the power of the two best performing cores. Quad channel memory also delivers improved responsiveness and decreases start up time when you are working with large files and content creation applications. With an Intel® Core™ X-series processor you can focus on creating with the confidence that your results will be as remarkable as you imagined.

    Quad-Core Newcomers to the Family

    The new family of Intel® Core™ X-series processors introduces two quad core processors for broader expandability of the platform. The Intel® Core™ i5-7640X and Intel® Core™ i7-7740X enable customers to invest in a more powerful enthusiast platform that provides more headroom and scalability up the X-series stack when they are ready. These two processors will start with a slightly higher base frequency and provide all of the ingredients, like higher memory speed and larger socket, for better overclocking performance compared to their mainstream counterparts.

    Intel® X299 Chipset and Intel® Core™ X-Series Processors for the Ultimate Platform

    The Intel® X299 chipset paired with the Intel® Core™ X-series processors provide a world class platform for gaming, content creation, and over-clocking. Whether it is responsiveness, expandability or performance you crave, this platform has you covered. Integrated USB 3.0 makes moving files to your tablet and smartphone blazing fast. The platform also provides RAID support on PCI Express and Serial ATA storage devices, fast data transfers with support for PCIe 3.0 storage devices and finally, Intel® Optane™ memory support. Want to push the envelope with overclocking? The Intel® X299 chipset and Intel® Core™ X-series processor family bring new unlocked base clock capabilities. Unlock your individual cores and memory frequencies to amazing levels while having the flexibility to keep other areas within specification. With support for Intel® Extreme Memory Profile (Intel® XMP), Intel® Extreme Tuning Utility (Intel® XTU), and the Intel® Performance Tuning Protection Package Plan the capabilities of the Intel® X299 chipset and new Intel® Core™ X-series processors are a threat to every overclocking world record.

    Intel-corex-750

    Call Us:01 4545 465

  • Fujitsu LIFEBOOK U937

    Fujitsu Notebook LIFEBOOK U937 is the lightest laptop on the market. This full featured notebook is setting new standards, weighing less that 1Kg and with a casing made from magnesium, ensuring a strong, professional and unimaginably lightweight portable PC. Fujitsu Notebook LIFEBOOK U937 is the lightest laptop on the market. This full featured notebook is setting new standards, weighing less that 1Kg and with a casing made from magnesium, ensuring a strong, professional and unimaginably lightweight portable PC.

    A Lightweight powerful business companion with Intel’s 7th generation Core processors and options of up to 20GB of memory, 512GB of SSD and an ‘all-day’ battery life of up to 11 hours!

    • Be ultra-mobile: The LIFEBOOK U937 is light enough to carry anywhere and keeps working as long as you do
      • Lightest notebook in FUJITSU range: 15.5mm starting at 920g.
      • Fantastic viewing: Anti-glare FHD 13.3 inch display with optional glare touch.
      • Tough as nails: robust magnesium housing.
      • Work ALL DAY without power socket full-day battery run-time.
    • Perform to the max: with performance at this level there is no need for a separate desktop PC.
      • Blazing performance despite slimline design PCle SSDs to process data faster.
      • Up to 7th generation Intel Core i7 vPro Processor.
      • Full set of interfaces with full sized HDMI & LAN connector and USB type-C port replicator to have the same performance back at the office.
    • Stay Secure: The LIFEBOOK U937 keeps your company data secure wherever you are. Choose either:
      • Embedded Palm Secure technology: super secure contactless biometric authentication.
      • Fingerprint sensor.
      • Also features Smart Card reader and TPM 2.0

    Call Us:01 4545 465

  • New iPad Pro

    Apple has launched a new iPad Pro: an entirely new size of iPad with a 10.5-inch screen. It comes in silver, space grey, gold and rose gold with 64GB Wi-Fi model, and 64GB Wi-Fi + Cellular model. Apple has launched a new iPad Pro: an entirely new size of iPad with a 10.5-inch screen. It comes in silver, space grey, gold and rose gold with 64GB Wi-Fi model, and 64GB Wi-Fi + Cellular model.

    iPad Pro. Everything you want modern computing to be. Now even better! No matter the task, the new iPad Pro is up to it — and then some. It offers far more power than most PC laptops, yet is delightfully simple to use. The redesigned Retina display is as stunning to look at as it is to touch. And it all comes together with iOS, the world’s most advanced mobile operating system.

    apple-300-1

    • The most advanced display on the planet: iPad has always offered the ultimate Multi-Touch experience. The redesigned Retina display on iPad Pro sets a whole new standard. It’s not just brighter and less reflective — with ProMotion technology, it’s also far more responsive. So whether you’re scrolling through pages in Safari or playing an intense 3D game, everything feels utterly smooth, fast and immersive.
      • A new 10.5‑inch display: The new 10.5-inch iPad Pro comes with a screen nearly 20 per cent larger than the 9.7-inch model, so you get more room to do more. It also delivers a full-size onscreen keyboard. Yet it’s just as portable as ever.
      • apple5-300

      • ProMotion: You’ve never seen or felt anything like it: The new iPad Pro Retina display features ProMotion technology, with support for a 120Hz refresh rate. So films and videos look spectacular, while games play smoothly without distracting artefacts. Fast, it turns out, is incredibly beautiful. And however you use the display — with your finger or Apple Pencil — everything will feel more responsive.
      • Enhanced brightness, with a wide P3 colour gamut, custom-designed anti-reflective coating and a new dock making multi-tasking easier.

      apple1-300

    • More powerful than most PC laptops.The A10X Fusion chip with 64‑bit architecture and six cores puts incredible power in your hands. So you can edit a 4K video on the go. Render an elaborate 3D model. Or create and mark up complex documents and presentations. Easily. All on a device that still delivers all‑day battery life.
    • Apple Pencil: Now even sharper.The increased refresh rate of the new iPad Pro display makes Apple Pencil feel even more responsive and natural. No other digital pencil lets you write, mark up and draw with such pixel-perfect precision. iOS 11 makes Apple Pencil even more useful.
      • Instant Notes: When inspiration strikes, write.
      • Instant Markup: Sign documents, annotate PDFs or draw on a screenshot.
      • Inline Drawing: Easily sketch, draw or write directly alongside text in Notes and Mail.
      • Searchable Handwriting: Easily search for handwritten text and characters.
    • iOS 11: A monumental leap for iPad. iOS 11 brings iPad to life like never before. New features and capabilities let you get more done, more quickly and easily, making it a phenomenally powerful and personal experience.
    • apple8-300

      • Dock: The all-new Dock makes it easier to access your favourite and recently used apps and files.
      • Files: The new Files app brings all your files together no matter where they are.
      • Drag and Drop:Drag and Drop gives you a new way to move things around. It’s beautifully designed for Multi-Touch.
      • App Switcher: The redesigned App Switcher makes changing apps as quick as a swipe.
      • Multitasking: Multitasking is more powerful and intuitive than ever.
      • Apple Pencil: iOS 11 makes Apple Pencil even more useful. Easily sketch, draw or write directly alongside text in Notes.
      • Augmented Reality: iOS is now the world’s largest augmented reality platform. Games and apps now offer fantastically immersive and fluid experiences that go far beyond the screen.
    • Apps: The power of iPad. Times 1.3 million: iPad is a powerful way to work, play and learn. With over a million apps designed to take advantage of its large Multi-Touch display and powerful chip, it can transform the way you do the things you love.
    • Design: Less than half a kilo...A ton of capability: even though it’s packed with amazing performance, an advanced display, two cameras, ultra-fast wireless and all-day battery life, iPad Pro is still sleek and compact. So you can go just about anywhere and do just about anything.

    Find the iPad that’s right for you. Contact Encom now for information on the new IPad, its accessories and what it can do for you.

    apple4-700

    Call Us:01 4545 465

  • The Era of Windows Mixed Reality

    Windows-Mixed-Reality-700

    Windows Mixed Reality is an amazing new experience combining the thrill of virtual reality with a phenomenal sense of presence.

    Now, you can travel the world. Get inside the games you love. Even move across time and space. With quick, easy set-up you’ll jump from wonder to wow—and be exploring a wide selection of games, 360 degree videos, and over 20,000 2D apps—in just minutes.*

    Windows Mixed Reality: easy setup, affordable gear, a range of hardware choices, and immersive experiences

    • Easy setup
      • Existing high-end VR headsets with external cameras are cumbersome to set up. For more people to experience VR one of the barriers that needed to be removed was the need for external markers. That is why the Windows Mixed Reality headsets will be the first to deliver VR experiences with built-in sensors to track your physical position without requiring you to purchase and install external sensors in your room. You don’t need to spend hours to set up a single room in your house with a large play space, just plug and play. This also means these experiences are portable – whether you are traveling for work or visiting friends and family, just pack your PC and headset and you can share the magic of mixed reality.
    • Affordable gear
      • A variety of Windows Mixed Reality headsets and motion controllers will be available from HP, Lenovo, Dell, and Acer. Headset and motion controller bundles will be compatible with existing and new PC models. Along with its partners, Microsoft are committed to making mixed reality affordable.
    • Range of hardware choices
      • When it comes to deciding which hardware is right for you, customers value choice in brand, industrial design, and features. That is why Windows Mixed Reality is created as a platform for you to enjoy experiences across multiple devices that meet your mobility and performance needs.

    PCs that will be compatible with Windows Mixed Reality: Customers can choose the PC that’s right for them – Windows Mixed Reality PCs and Windows Mixed Reality Ultra PCs. Here is some context on what makes the two experiences different:

    • Windows Mixed Reality PCs: will consist of desktops and laptops with integrated graphics. When plugged into these devices, immersive headsets will run at 60 frames per second.
    • Windows Mixed Reality Ultra PCs: will consist of desktops and laptops with discrete graphics. When plugged into these devices, immersive headsets will run at 90 frames per second.

    Both configurations will support today’s immersive video and gaming experiences such as traveling to a new country, exploring space, swimming with dolphins, or shooting zombies. Use your Windows Mixed Reality motion controllers to enjoy a world of discovery and imagination.

    • Immersive experiences
      Microsoft are working with an incredible set of partners to bring the most immersive experiences to the Windows Store, working with 343 Industries to bring future Halo experiences into mixed reality.

    Call Us:01 4545 465

  • What kind of panoramic camera is right for you?

    Panoramic cameras-

    Panoramic cameras are fixed cameras that provide wide-area coverage – between 180º and 360º – with a single camera. You can use them to monitor activity and detect incidents in large areas, track the flow of people, and improve area management. And because just one camera plays the role of many, your installation and system costs are kept lower.

    But what kind of panoramic camera is right for you?

    AXIS M3007-P Network Camera Single-sensor fixed mini dome with 360°/180° view. AXIS M3007-P Network Camera
    Single-sensor fixed mini dome with 360°/180° view.
    (See video below).
    • Single-sensor cameras tend to be smaller, which means they’re easy to place. They’re well suited for indoor monitoring of retail stores, hotels, schools and offices, and for outdoor installations at hotels, gas stations, boutiques, restaurants, schools and offices. One important benefit provided by single-sensor cameras is the elimination of blind spots when monitoring smaller areas.
    • Multisensor cameras offer higher pixel density, which provides better image quality or wider coverage. They’re appropriate for sizable indoor areas at railway stations, metro stations and airports, for example, and for outdoor areas such as squares, stadiums, university campuses, school yards and outdoor parking lots. They’re also ideal for perimeter surveillance around critical infrastructure, public or governmental buildings, banks and health care centers.
    • Multidirectional cameras offer the greatest flexibility since they can monitor multiple directions simultaneously. Their camera heads can be positioned independently from each other, making them ideal for wide areas both indoors and outdoors, for outer corners of buildings, and intersections of hallways or roads.
    AXIS M3007-PV Network Camera Single-sensor fixed mini dome with 360°/180° view. AXIS M3007-PV Network Camera
    Single-sensor fixed mini dome with 360°/180° view.
    AXIS M3027-PVE Network Camera Single sensor, outdoor-ready fixed mini-dome with 360°/180° view. AXIS M3027-PVE Network Camera
    Single sensor, outdoor-ready fixed mini-dome with 360°/180° view.
    AXIS M3037-PVE Network Camera Single-sensor, outdoor-ready, day/night fixed mini dome with 360°/180° view, microphone and speaker. AXIS M3037-PVE Network Camera
    Single-sensor, outdoor-ready, day/night fixed mini dome with 360°/180° view, microphone and speaker.
    AXIS P3707-PE Network Camera Multidirectional, 360° multisensor camera. AXIS P3707-PE Network Camera
    Multidirectional, 360° multisensor camera.
    AXIS Q3708-PVE Network Camera Multisensor 180° view in challenging light conditions. AXIS Q3708-PVE Network Camera
    Multisensor 180° view in challenging light conditions.
    AXIS Q3709-PVE Network Camera Multisensor 180° view in 4K. AXIS Q3709-PVE Network Camera
    Multisensor 180° view in 4K.

  • Axis Perimeter Defender: High-security, scalable perimeter protection

    AXIS Perimeter Defender is a flexible, scalable video analytics application for perimeter surveillance and protection. It’s designed for demanding large-scale installations.

    AXIS Perimeter Defender  includes several types of intrusion detection and loitering. It enables detection of multiple events occurring simultaneously in different places. AXIS Perimeter Defender includes several types of intrusion detection and loitering. It enables detection of multiple events occurring simultaneously in different places.
    • AXIS Perimeter Defender gives you an edge where security starts – at the perimeter of your facilities. It’s ideal for reinforcing physical access control for high-security facilities such as chemical plants, power plants and prisons and for critical infrastructure.
    • AXIS Perimeter Defender provides accurate detection capabilities with support for multiple detection scenarios. This includes several types of intrusion detection and loitering. It enables detection of multiple events occurring simultaneously in different places. It analyses detected events, dismisses non-threatening ones and notifies security staff of potentially critical situations.
    • AXIS Perimeter Defender can be integrated into as many cameras as you want, here and now, and add more cameras as your needs grow. As AXIS Perimeter Defender analyzes video-footage data on the cameras themselves, it does not require a central server for processing.
    • Installing and setting up AXIS Perimeter Defender is fast, simple and cost-effective. You can deploy and configure it simultaneously on multiple cameras. AXIS Perimeter Defender supports a range of alarm outputs and integrates with your video management systems, providing you with immediate feedback on potential security incidents. And it has all the features needed for easy implementation, including intuitive system-design tools and automatic calibration. Support and upgrades are included in the license.

    AXIS Perimeter Defender wins best new product in the Video Analytics  category from the Security Industry Association Awards AXIS Perimeter Defender wins best new product in the Video Analytics category from the Security Industry Association Awards

    AXIS Perimeter Defender detects four different types of events:

    • Intrusion: When one or more people or vehicles enter a predetermined zone
    • Zone crossing: When a person or vehicle passes through two predetermined zones in a predetermined order and direction.
    • Loitering: When a person or a vehicle remains in a predetermined zone for more than a certain number of seconds.
    • Conditional zone crossing: When a person or a vehicle enters a predetermined zone without starting in or passing through one or more predetermined zones.

    AXIS Perimeter Defender can also detect multiple events occurring simultaneously in different places within the range of a single camera.

    Call Us: 01 4545 465

  • Dedrone-high level perimeter security

    Early detection of drones and possible drone threats is an important component of perimeter security. Encom partnering with Dedrone are implementing counter-drone technology for customers that require the highest levels of perimeter security. Dedrone drone detection software platform is a cost-effective way to protect your most precious assets. Early detection of drones and possible drone threats is an important component of perimeter security . Encom Partnering with Dedrone are implementing counter-drone technology for customers that require the highest levels of perimeter security. Dedrone drone detection software platform is a cost-effective way to protect your most precious assets.

    Dedrone is an automatic Anti-Drone Solution offering a future-proof software platform that mitigates all drone threats.

    Dedrone provides an automatic, integrated, and self-contained platform that delivers drone classification and countermeasures to secure against drone threats and their operators 24/7. DroneTracker is the only modular system on the market that can be:

    • Customized to address site-specific threats.
    • Adapted for easy integration to an existing security program.
    • Accommodate unique building structures, landscapes, and other exterior conditions.

    Dedrone solutions are suitable for use in a wide variety of areas:

    • Stadiums: When airspace is unprotected, rogue drones can interrupt play, threaten the safety of spectators and infrastructure, and pose unique legal implications for athletes and performers.
    • Prisons:It remains important to prevent the dropping of contraband into the inner courtyards at anytime during the day or night. Objects dropped and gathered by inmates pose a serious threat to other inmates and prison employees.
    • Government: A no-fly-zone cannot keep people with criminal intentions from flying their drones in restricted area. Upgrading traditional security concepts to implement counter-drone technology is essential for the latest security threats.”
    • Air Traffic: Drones pose a serious risk when flown near airports. A drone crash in to an aircraft will cause damage to both vehicles.
    • Utilities: Sensor-based drone detection software helps monitor drone traffic and identify authorized drones from unauthorized. The risk of the wrong drone near an oil or gas storage facility could be deadly and cause billions of dollars in infrastructure and environmental damages. Dedrone has the most advanced and proven drone detection software in the world.
    • Data Centers: Drone protection for data centers is no longer theory – it’s a practice in place today since any drone user is capable of causing millions in damages. Drones threaten the physical security of data centers, and consequently, their cybersecurity.
    • Industry: Drones threaten the security of enterprises in multiple ways. They are inexpensive, quiet and reach places that were previously not accessible or difficult to reach. Threats can include loss of industrial secrets, unwanted publicity, failure of computers, internet, or GPS, danger to the health and safety of employees or destruction of property.
    • VIP: Effective protection against paparazzi and other unauthorized drones.

    For a complete Perimeter Security Solution read about Axis Perimeter Defender: High-security, scalable perimeter protection.

    Call Us:01 4545 465

  • Smartphones - Keys for Access Control

    Using smartphones as keys for access control Using smartphones as keys for access control offer a cost-effective, simpler way for companies to manage identification credentials

    Mobile devices are everywhere. The number of mobile phone users alone is expected to reach over 4.7 billion in 2017. Two out of every three business people today are using mobile devices like smartphones for an ever more diverse set of applications.

    20 percent of organizations expect to adapt use of smartphones as an option to traditional physical access cards by 2020.
    “Predicts 2017: Identity and Access Management” Gartner,

    High expected growth for usage of smartphones as digital access control keys is expected because:

    • Mobile technology is already widely used for identification, authentication, authorization and accountability in computer information systems.
    • Using mobile devices as keys aligns perfectly with the mobile-first preferences of today’s workforces. Using mobile devices as keys not only delivers a convenient user-experience. It also helps boost operational efficiency and satisfaction of today’s mobile-enabled workforces.
    • It represents a more cost-effective, simpler way for companies to manage identification credentials as it eliminates numerous manual tasks related to handling, printing, distributing and disposing of physical identity badges.



    HID Global’s Mobile Access and AXIS A1001 Network Door Controller and AXIS Entry Manager


    Axis have launched its integration of HID Global’s Mobile Access with its AXIS A1001 Network Door Controller and AXIS Entry Manager software. The Axis and HID mobile access control solution meets business demands to support mobile-enabled workforces. The solution enables mobile devices such as smartphones to function as credentials, allowing people to gain access to secured buildings, rooms and areas.

    By integrating HID Global’s Mobile Access with its software and door controller, Axis has created a solution which combines the convenience expected in a mobile-first world with the levels of security demanded by businesses and their employees.

    The HID and Axis mobile access offering is the first IP-based, end-to-end solution. It encompasses everything necessary for small-, medium- or enterprise-sized organizations to deploy mobile access control. The solution includes:

    • AXIS A1001 Network Door Controller, which makes yes/no decisions about who may enter, in which areas and at what times.
    • AXIS Entry Manager access control software, which is integrated with HID Mobile Access® Portal and used to set up the systems, add new users and manage mobile IDs.
    • Bluetooth enabled readers from HID Global®.
    • HID Mobile Access® Portal.
    • HID Mobile Access® App, which is available through the Apple® App Store and Google® Play.
  • Improve your Cyber Security

    Concern about cyber crime via IP camera networks is real and there is no single solution for staying safe. Effective cyber security is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And about partnering with Suppliers and Technology experts that offer support to you at every level. Encom partnering with Axis and Milestone offer this possibility. Concern about cyber crime via IP camera networks is real and there is no single solution for staying safe. Effective cyber security is about assessing risks and consequences and taking appropriate steps. It’s about products, people, technology and ongoing processes. And about partnering with Suppliers and Technology experts that offer support to you at every level. Partnering with Encom, Axis and Milestone offer your business this possibility.

    With the frequency of cyber attacks making headline news, no wonder cybersecurity is top of mind. Cybersecurity threats to businesses are at an all-time high, escalating in frequency and level of sophistication.
    In this article we will examine:

    • How to spot the symptoms of poor cyber health
    • Tactics for protecting your data and network
    • Reasons your video surveillance system would be valuable to a cyber criminal
    • Building an internal company culture concerned about cybersecurity
    • Resources to help make improvements or maintain the current system
    vjfna/lgnrea/ 42% of individuals say end user failure to follow policies or carelessness were to blame when asked for an example of human error during a security breach.

    Spotting the symptoms of poor network health


    Cybersecurity for your Network Camera installation and your IT go hand in hand. At Encom we have 25 years experience helping business to look after and integrate both areas to provide the best possible security solution.

    If you have a strong, hardened network paired with policies, processes, and people all proactively monitoring and responding to cyber threats – and aligned with your organization’s stated cybersecurity goals – then you are in great shape! For the rest of us - read on.

    • Your IT and security teams are not aligned:
      It is important to get IT and Security teams to have aligned policies and processes with clear password management, ownership and responsibility to review security measures, have advance encryption methods applied to video streams and have hardware and software aligned with IT policies.
    • Your network users are not following policies and procedures:
      Have you policies and procedures in place that are documented and easy to understand? Are new and existing employees properly trained?
    • Your installation and maintenance plans are not clearly documented:
      Physical installation and maintenance can cause problems if your installer does not understand cybersecurity. Security, IT, facilities and maintenance departments need to be aligned on a documented installation and maintenance plan.
    • Your technology vendors aren’t talking to you about cybersecurity:
      Does the equipment you choose fit into your IT policy or are you trying to work your policy around your vendors? Are they talking about cybersecurity and best practices guides, performing tests and evaluating their product risks.

    10 best practices for a healthy network


    Creating and maintaining a secure network is a team effort and requires support from many different departments. You can’t do it alone. Once a plan is in place, communicate it through the organization and keep it top-of-mind when selecting and installing new devices on the network. Creating and maintaining a secure network is a team effort and requires support from many different departments. You can’t do it alone. Once a plan is in place, communicate it through the organization and keep it top-of-mind when selecting and installing new devices on the network.

    Along with your IT, security and facilities management teams, you can work to mitigate many of the common risks associated network’s cybersecurity.

    • Use strong, unique passwords:
      Set strong, unique passwords with a minimum of eight characters. Don't rely on the default settings of IP based devices. Ensure good password management, change passwords on a regular basis or use certificates in lieu of passwords.
    • Deploy and install devices in the recommended way:
      Where possible, cameras should be installed where they’re out of reach to a potential attacker. Unused services should be disabled and only trusted applications should be installed.
    • Define clear roles and ownership:
      Have clear rules and procedures established for which employees have particular access rights. Assign responsibility for reviewing security measures to ensure best practices. To reduce exposure, any device that accesses video should not be allowed to access cameras directly, unless it is required by the solution. Clients should only access video through a Video Management System (VMS) or a media proxy.
    • Use the latest applicable firmware:
      Bugs or flaws in operating systems found on workstations, servers, cameras, printers, and other network devices can put your organization at risk. Install patches and security updates and have a well-documented maintenance plan.
    • Perform a risk analysis:
      A cyber threat analysis will define how much you can lose and how much you should spend on protection. Make an analysis of potential threats as well as the possible damage and costs if the system is attacked. Include both internal and external threats.
    • Gain knowledge on system protection and possible threats:
      Take a closer look at the exact systems that run on your network. Work with your entire supply chain of vendors to understand any possible threats to your network in using your selected devices.
    • Change your devices’ factory default settings:
      Do not rely on any device’s default settings. Change the passwords and the default administrative account IDs. Enable and configure the device protection services and always disable any services you will not be using.
    • Use encrypted connections:
      Encrypted connections should be used on all networks, even local or ‘internal’ ones.
    • Secure the network:
      Understand your firewalls and filters. Taking the time to secure your network from the backbone helps to support all your other efforts to implement cybersecurity best practices.
    • Maintain your systems and processes:
      Monitor all devices on a regular basis and enable system notification when applicable and supported. You should also check access logs regularly to detect any attempts for unauthorized access.Once the plan is executed, it will need to be reviewed and assessed regularly. When it comes to the fast-paced world of technology, new updates, features and best practices are created all the time. Be sure to document your maintenance procedures to ensure existing and future colleagues understand your processes.

    To download the Axis E-book about Cybersecurity click here.

    To take the Online Cybersecurity Course click here.

    For more information on any of our products phone us now.

    Call Us:01 4545 465

  • Cyber-attack and Ransomware - What you need to know !

    ransomware-700

    Read More about Symantec Endpoint Protection Read More about Symantec Endpoint Protection

    After last weeks Cyber-attack the 'experts' are now telling us that these attacks are not over yet. Below is a list of things you can do to reduce the risk to business systems and personal computers. Training and educating staff, ensuring updated Content Scanning and Antivirus software is installed and having the latest hardware with in-built security will all help to minimize your exposure to problems.

    What can I do to protect myself from ransomware?

    User Education

    One of the primary vectors of these threats is “Spear Phishing” attempts, where an unsolicited e-mail will come from an unknown sender with an attachment that is then executed. Educating your users as to proper handling of unknown or suspicious files is crucial.

    Employ content scanning and filtering on your mail servers.

    Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.

    Maintain a current patch level for any operating systems and applications that have known vulnerabilities.


    Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.

    Install and configure Host Intrusion Prevention

    • IDS or IPS systems can detect and prevent the communication attempts that the malware uses to create the public and private encryption keys required to encrypt the data.
    • The Symantec Endpoint Protection (SEP) client IPS system blocks this type of communication traffic by default.

    Install, configure and maintain an endpoint security solution

    • With the endpoint being the final line of defense from any threat, a multi-faceted security solution should be employed. This solution should have protections for not just file based threats (traditional AV), but should also include download protection, browser protection, heuristic technologies, firewall and a community sourced file reputation scoring system.
    • Symantec Endpoint Protection 12.1 (SEP 12) users can leverage the supplied “High Security” Virus and Spyware Protection policy that was generated automatically during installation of SEP 12 to provide protection for ransomware threats.
    • For additional protection from new ransomware variants, the “High Security” policy can be edited and the Download Protection feature can be modified to act on files that have not been proven to be good by the Symantec user base. The options that would need to be altered are located in the “Download Protection” – “Download Insight” - “Also detect files as malicious based on their use in the Symantec Community” section. Enabling the two check boxes next to “Files with:” and “Files known by users for:” and using the default values of 5 and 2 respectively will force the SEP 12 client to treat any file that have not been reported to Symantec by more than 5 users or have been reported for less than 2 days to be treated as unproven files.
    • The handling of these files is set on the “Actions” tab under “Unproven files” and the setting of “Specify actions for unproven files:” should be set to “Quarantine risk”.
    • People using another endpoint AntiVirus solution should refer to their vendor for information on how to configure their real-time scanning options to be in-line wherever possible with “High Security” Virus and Spyware policy and the prevalence of any files as determined by their user base.

    Block your end users from being able to execute the malware

    • SEP users can leverage the Symantec supplied example Application and Device Control policies to prevent files from being run in the root and/or subfolders of the users %AppData% directory variable to prevent the downloaded threat from being launched. The policy prevents launch attempts of files that have been extracted from compression formats that the threat has been spreading in, blocks Auto-Run, access to script files and the execution of files from removable volumes.
    • Software restriction policies enforced via GPO can be created and configured to accomplish the similar tasks.

    Limit end user access to mapped drives

    The current ransomware threats are capable of browsing and encrypting data on any mapped drives that the end user has access to. Restricting the user permissions for the share or the underlying file system of a mapped drive will provide limits to what the threat has the ability to encrypt.

    Deploy and maintain a comprehensive backup solution.

    The fastest way to regain access to your critical files is to have a backup of your data. Backups of data should take place not only for files housed on a server, but also for files that reside localy on a workstation. If a dedicated peice of backup software is not an option, simply copying your important files to some sort of removable media and then removing that media from the system will provide a safeguard for your data being impacted by these types of threats.


    My data’s been encrypted by Ransomware, what now?

    • Do not pay the ransom! Paying the ransom may seem like a realistic response, but it is only encouraging and funding these attackers. Even if the ransom were paid, what guarantees do you have that you will actually regain access to your files? Remember that these are the same aggressors that are holding your files hostage in the first place. Paying the ransom can actually increase the likelyhood that you will be directly targeted for additional extortion attempts.
    • Remove the impacted system from the network and remove the threat.
    • With a multitude of variants it is unrealistic to list the exact steps, but most security vendors have detailed write-ups for the threats that include removal instructions. Removal is best done with the system off the networks to prevent any potential spread of the threat.
    • Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.

    Can I regain access to my files without paying the ransom or restoring from backup?

    • The answer is most likely no. There are earlier variants of these threats that simply hid the ransomed files, left copies of the original files with the Volume Shadow Copy service or left copies of the private encryption keys locally or in memory. It is certainly worth the effort of researching the details of the variant you encountered to see if there are options for you, but for the majority of instances, these options are no longer the case as the threat writers have updated their methods using the funds from earlier rounds of extortion.

    Can I “Brute-Force” my way into my encrypted files?

    • No, the current threats employ an RSA-2048 bit encryption key. Brute-forcing the key is simply not possible currently.

    For more information on any of our software please call our team and we will be happy to talk you through the most suitable options for you.

    Call Us:01 4545 465

  • Windows 10 Enterprise and GDPR

    Does your business process sensitive data, operate in a regulated industry, or develop software in-house? If so, you must get the increased security, controls and IT support that you need with Windows 10 Enterprise E3. Delivered as a cloud service and managed by Encom Does your business process sensitive data, operate in a regulated industry, or develop software in-house? If so, you must get the increased security, controls and IT support that you need with Windows 10 Enterprise E3. Delivered as a cloud service - managed by Encom

    Why you need to upgrade to Windows 10 Enterprise:

    • In light of the recent cyber-attacks the need for greater security has become even more apparent. Enhanced security measures need to begin now. With Windows 10 Enterprise you get the most secure version of Microsoft’s OS.
    • General Data Protection Regulation (GDPR). In May 2018 new regulation will be implemented throughout Europe. Windows 10 Enterprise offers built in security, controls and IT support delivered through the cloud.

    Why Microsoft Enterprise?

    • Microsoft take a principled approach with strong commitments to privacy, security, compliance and transparency.
    • Moving to the cloud makes it easier for you to become compliant with privacy regulations by managing and protecting personal data in a centralized location.
    • Microsoft is the industry leader in privacy and security with extensive expertise complying with complex regulations.

    windows-10-enterprise

    What you need to do now!
    Discover: Identify what personal data you have and where it resides.
    Manage: Govern how personal data is used and accessed within your organisation.
    Protect: Establish security controls to prevent, detect and respond to vulnerabilities and data breaches.
    Report: Keep required documentation, manage data requests and breach notifications.

    The Windows 10 Defense Stack

    Pre-Breach

    • Device Protection: Device Integrity and Control
    • Threat Resistance: Smart Screen, Windows Firewall, Microsoft Edge, Device Guard, Windows Defender
    • Identity Protection: Windows Hello, Credential Guard
    • Information Protection: BitLocker and BitLocker to Go

    Post-Breach

    • Breach detection investigation and response: Conditional Access, Windows Defender ATP
    Talk to Encom today about your requirements to meet the new regulations for GDPR. Let us help you to implement changes to your IT systems to ensure you are compliant and have the highest level of security and data protection. Talk to Encom today about your requirements to meet the new regulations for GDPR. Let us help you to implement changes to your IT systems to ensure you are compliant and have the highest level of security and data protection.

    Call Us: 01 4545 465

  • Notebooks-7th Generation Intel® Core™ processor

    7th-generationTired of your old laptop. Encom are offering great value on the latest up-to-date range of notebooks and 2-in-1's to solve your challenges with productivity, security and battery life.

    • Get Performance and Portability: Seize portable possibilities with new 7th Generation Intel® Core™ processor-based laptops. Equipped with unprecedented power and responsiveness, you’ll be able to take your productivity, creativity and entertainment to the next level and experience amazing graphics and gaming.
    • Razor-Thin Meets Ultra-Fast: Get powerful laptop performance in a light, transformable device, giving you the agility to work wherever you need.
    • A Visual Feast: Intel® HD Graphics and Iris™ Plus Graphics let you watch your favorite videos in high resolution, edit the smallest details of your photos, and enjoy vibrant gaming experiences. Plus, 4K Ultra HD (UHD) with Iris™ Plus Graphics offers up an immersive viewing experience like never before.
    • Energy that Lasts: Long-lasting battery life gives you impressive performance. With up to 10 hours on a single charge,1 your laptop can keep up with you wherever you go.
    • Robust Data Security: Intel is enabling a new level of security for businesses and consumers with Intel® Authenticate Solution. By using hardware-enhanced enterprise-grade factors of authentication, consumers can be free of the annoyance of using passwords for logging into their PC and for secure online transactions and payments, and gain more peace of mind and strong protection for personal information.

    Desktops and 7th Generation Intel® Core™ processors


    • General Performance , Speed and Responsiveness:
      • Desktop 7th Gen Intel Core processors offer up to 20% better performance compared to previous generation
      • Mobile 7th Gen Intel Core processors offer up to 20% better performance versus a 3 year old PC
    • Entertainment
      • Mobile 7th Gen Intel Core processors offer up to 5.5 x faster 4K 360° video creation versus a 3 year old PC
      • High-fidelity Audio
      • Smooth 360° video play back while multitasking.
      • 4K Ultra HD HDR Support and premium 4K Ultra HD Content.
    • Mobility and Flexibility
      • Simple versatile and fast connectivity with other devices using thunderbolt 3 technology.
    • Security
      • 7th Gen Intel Core processor based PCs with windows 10 and McAfee provide improved hardware enhanced worry free computing for IP, data, identity and privacy protection usages.

    And there's more...

    Get the best possible computing experience with a 7th Gen Intel Core Processor add a 4K monitor for clearer gaming, an Intel Solid state drive for high speed storage and Thunderbolt peripherals for fast and easy connectivity.

    • 4k Monitors
      • Up to 35% faster 4K Ultra HD 360° video creation versus a 3 year old desktop.
    • Thunderbolt Peripherals
      • Remove the burden of multiple wires. Thunderbolt 3 technology offers a simple versatile one-wire connectionto your PC for power, data and dual 4K HD displays
      • Plus, Intel Wireless Docking based on WiGig offers support for up to 2 full HD monitors ad numerous USB peripherals for today's thin and light weight mobile devices.
    • Intel Solid State Drives
      • Combined with the high speed storage capabilities of an Intel Solid State Drive get the performance you need without the lag time or moving parts of a traditional hard drive.
  • Intel Optane Memory

    Intel® Optane™ memory is the first of its kind: a system accelerator that delivers a whole new breed of speed. Paired with a 7th Gen Intel® Core™ processor, it creates a transformative computing experience that you cannot do without. Intel® Optane™ memory is the first of its kind: a system accelerator that delivers a whole new breed of speed. Paired with a 7th Gen Intel® Core™ processor, it creates a transformative computing experience that you cannot do without.


    By remembering the applications and tasks that you use most often, the intelligence of Intel Optane memory personalizes performance and responsiveness.

    • Deliver fast, smooth, and easy experiences: Make everyday tasks up to twice as responsive with Intel Optane memory.

    • Accelerate everything: Improve launch times by up to 5x for web browsers, up to 5.8x for e-mail, and up to 67 percent for games.
    • Optimize mega storage: Add Intel Optane memory to a hard disk drive-based computer and deliver up to 14 times better storage performance.

    Accelerate Your Experience

    This game-changing technology intelligently accelerates new 7th Gen Intel® Core™ processor-based systems while affordably maintaining mega-storage capacity, to deliver a responsive computer experience with short boot times, fast application launches, extraordinary gaming, and responsive browsing.

    Intelligent System Acceleration

    Optimize your computer responsiveness from system boot to application launch. Intel® Optane™ memory is a smart and adaptable system accelerator that adjusts to your computing tasks making everything you do faster, smoother, easier. Its intelligent software automatically learns your computing behaviors to accelerate frequent tasks and customize your computer experience.

    Read More about Intel® Optane™ Memory

  • Computers for Business

    New devices powered by 7th Gen Intel core vPro Processors deliver serious business compute, hardware-enhanced security and give control with remote manageability New devices powered by 7th Gen Intel core vPro Processors deliver serious business compute, hardware-enhanced security and give control with remote manageability

    High-performing devices based on the 7th Generation Intel® Core™ vPro™ processors streamline productivity and performance for serious business compute by enabling maximum multitasking efficiency and up to 10 hours of unprecedented battery life.
    For employees on the go, 7th Generation Intel® Core™ M vPro™ processors deliver the optimal combination of performance, battery life, and wireless capabilities in a razor-thin device. Built in Intel® vPro™ technology provides hardware-enhanced security, remote manageability, and productivity-enhancing capabilities to keep you moving forward.

    • HARDWARE-ENHANCED SECURITY With Intel® Authenticate, get in front of security with hardware-enhanced identity protection, customizable multifactor authentication options to fit your policies, and an end-to-end solution that’s easy to deploy.
    • REMOTE MANAGEABILITY With Intel® Active Management Technology (AMT), peace of mind starts with your processor. Put time back in the bank with remote maintenance that’s no sweat, wireless manageability for your mobile workforce, and secure drive wiping to simplify PC lifecycle transitions.
    • SIMPLE COLLABORATION With Intel Unite®, here’s to meetings that start without calls to IT, intelligent spaces that make workplace transformation scalable, and an extensible platform that streamlines existing tools – such as Skype for Business and Zoom.

    For information and the best advice on what products suit your business needs call our team now!

    Call Us:01 4545 465

  • Jabra Evolve 75

    Designed to support concentration in the open office, the Jabra Evolve 75 manages office sounds and interruptions with active noise cancellation and integrated busylight Designed to support concentration in the open office, the Jabra Evolve 75 manages office sounds and interruptions with active noise cancellation and integrated busylight

    Experience the new Evolve 75 and prepare to be amazed

    • Outstanding sound delivers crystal-clear calls and music: HD voice for calls. World-class speakers for music.
    • Boost productivity by reducing noise and interruptions: Best-in-class ANC and integrated busylight act as a ‘do not disturb’ sign.
    • Freedom to move around: Dual Bluetooth® connectivity to two devices at the same time for calls and music. Flexibility to move up to 100ft/30m away from your connected device.

    The Jabra Evolve series now offers a new premium wireless headset for modern office workers, the Jabra Evolve 75. Boasting a unique combination of features including superior Active Noise Cancellation (ANC) and an integrated “do not disturb” busylight, Jabra Evolve 75 is the best wireless headset for concentration in the open office.

    The headset is the latest addition to the successful Jabra Evolve series, which has sold more than 2.5 million units worldwide. The range was developed to reflect the way people work and enable focused and distraction-free performance in open office settings. The Jabra Evolve 75 takes this promise to the next level by combining the strongest parts of the Evolve range: wireless freedom, great sound, ANC and a busylight.

    The Jabra Evolve 75 comes equipped with world-class speakers for music and high-definition (HD) voice for crystal clear calls. Dual Bluetooth® connectivity supports calls and music by allowing the user to simultaneously pair the headset with two connected devices, such as a computer and smartphone. With a wireless range of 100 feet for laptops and 33 feet for smartphones, the headset also enables the flexibility and freedom to move, allowing workers to multi-task without the noise and interruptions from colleagues that stifle concentration and productivity.

    Recent research from Jabra found that knowledge workers lose 24 minutes each day due to noise and interruptions, while 78 percent believe their productivity is negatively impacted. The Jabra Evolve 75 is the ultimate business tool for sound and freedom, helping workers collaborate, concentrate and remain productive in busy, open place offices without the need for designated quiet rooms.
    “The premise behind the open plan office is to foster collaboration and improve communication among employees. But despite their many benefits, they have become breeding grounds for unsatisfactory labour output”, commented Holger Reisinger, SVP, Jabra Business Solutions. “Interruptions from colleagues and the noise generated in these environments are negatively impacting workers and contributing to lacklustre performance. Increasingly, knowledge workers are being forced into isolation to do their jobs. The Jabra Evolve 75 provides businesses with an alternative solution to support an open office philosophy that’s conducive to better performance.”

    Certified for modern office use

    The Evolve 75 meets Open Office and Outdoor requirements for Skype for Business from Microsoft and is also certified for Skype for Business, Cisco and other leading Unified Communications (UC) platforms.

    For IT-decision makers, the hassle-free and easy-to-use headset increases UC adoption by seamlessly and intuitively bridging the gap between the mobile phone and computer. The Jabra Evolve 75 is also compatible with Jabra Direct – free cloud-based software that lets users personalize and manage the headset.

Items 1 to 15 of 124 total

Page:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. ...
  7. 9