Archive for the ‘RFID biometric mobile’ category

Important considerations for a ransomware attack

October 31st, 2020

This post contains general information only offered in good faith and cannot consider every customers’ environment or risk. Synergy Software Systems is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, consult a qualified professional advisor. You acknowledge that Synergy Software Systems shall not be responsible for any loss sustained by you or any person who relies on this publication.

If your network experiences a ransomware attack, then it is likely that your IT staff will want to immediately research and work to stop the attack before they get assistance from an outside incident response firm. This guidance is to help you to prepare your strategy, policies and and responses procedure and checklists to aid your first responders to identify important response priorities for containing a ransomware attack and to avoid common pitfalls that can hinder later investigation and recovery activities.

• Notify your incident response partner and cyber insurance agent (if you have these relationships in place).
• Be aware of any statutory and legal or contractual requirements e.g. to notify authorities, or trading partners relying on your services or integrated systems perhaps with SLAs and financial penalties, or perhaps GDPR related.
• Stop any malicious encryption software that may still be running.
• If you suspect servers and workstations are still encrypting data, power down as quickly as possible to reliably stop further encryption.
• If continued encryption is not a concern on a system, leave the system powered on but disconnect it from the network (as RAM may contain forensic data).
• Disconnect network attached storage (NAS) systems from the network immediately and until you can validate that all systems are free of ransomware.
• Isolate critical systems to prevent further spread of the malware.
• Isolate backups and backup servers.
• Shut down servers or disconnect them from networks.
• Shut down wide area network tunnels.
• Disable any employee remote access services that do not use multi-factor authentication (MFA).
• Disable VPNs or whitelist source IPs to known employees.
• Disable Remote Desktop Protocol (RDP) services or whitelist source IPs to known employees.
• Disable existing domain administrator accounts.
• Create new domain administrator accounts for critical IT staff.
• Disable all other domain administrator accounts (to prevent logins and use of issued Kerberos tickets).
• Disable malware command-and-control channels.
• Disable outbound web traffic.
• Disable all other outbound services/protocols through the firewall.
• Collect and retain logs that are not already in a centralized archive.
• As Windows security event logs can by default be overwritten within days, copy the folder c:\windows\system32\winevt\logs from any domain controllers, RDP servers and other key impacted servers to a safe place.
• Since many firewall logs and VPN are also overwritten quickly, work to export VPN access logs and firewall traffic logs to a safe place.

DEVELOP A RECOVERY STRATEGY
At this point evaluate and develop an investigation and recovery strategy. Examples of key next steps include:
• When needed, completing contracting with a legal firm and/or incident response firm
• Determining the state of storage systems and status of online and offline backups
• Creating an inventory of impacted systems
• Prioritizing applications for recovery
• Creating an inventory of sensitive or high-risk data that could have been stolen
• Evaluating potential risk to cloud email accounts or other cloud services

PITFALLS TO AVOID
In the case of an incident, your organization will want to avoid the following.
• DESTROYING CRITICAL DATA
Many times, IT staff may delete encrypted files or impacted virtual machines to free space for recovery, only to learn that the associated backups are missing or corrupt. Be sure to retain copies of all encrypted or impacted files and systems until after backups are validated and restores are complete, even if it means you have to slow down recovery to add temporary storage and copy potentially unneeded data.

• DESTROYING EVIDENCE
Deleting files or virtual machines, or performing other recovery activities before taking steps to preserve disk images, logs and other evidence, can destroy artifacts that could be used later to help tell the story of how the attacker got in and what data they stole.

• OPTIMISTIC ASSUMPTIONS
There is often a tendency to underestimate an attacker early on and to assume that it is unlikely that the attacker accessed some critical system or set of sensitive data. Perhaps because of a belief that the data would have been too hard to find or too difficult to extract. The organization, may then base its decisions about investigation and notification activities on these optimistic assumptions.

• LEAKING INFORMATION TO THE ATTACKER
Be aware that the attacker may be monitoring your communications during and after the attack. For example, don’t disclose your insurance policy’s ransom coverage limit in a public board meeting discussing the community’s response options, or the attacker will increase their demand to match the policy limit. Social media comments by staff may worry your customers. So, consider also how you will handle communications to your trading partners.

As cybercrime becomes ever more targeted and resourced ensure you have a strategy in place- just in case. Review the security tools you use. Define policies and ensure they are followed for example:
• use of secure regularly changed passwords, or dual authentication passwords
• back ups
• training of new users, and refresher training

Install and use security systems e.g.
• Physical access controls
• Firewalls,
• Anti-malware tools
Consider whether cloud migration or managed services are a better option.

Synergy Support during covid-19 lockdown

April 6th, 2020

As a precautionary measure instructed by our Government for COVID-19 to be Safe at Home to protect our staff and to protect the community Synergy, consultants are instructed to work from home for at east the next two weeks.

To help us to provide continuous support please follow these guidelines to ensure our queries are recorded and assigned to be addressed in addressed as soon as possible.:

1. Send an email with a clear description in the email Subject line”, which will be helpful to track the email chain.
2. Please mention any internal issue/ticket number assigned, the user, and as much detail as possible e.g. transaction detail such as: order number, vendor code, item code – take a screenshot – copy any error message and attach those details to the email. Better still record the steps e.g. with e.g. webex, or task recorder.
3. If you are not on your work telephone number, or email, e,g when working from home yourself, then ensure you provide contact information for us to reach you.
4. To understand the issue, we may need to connect to the user PC through a screen sharing app such as Microsoft TEAMS, or Go To Meeting. Please ask your admin take appropriate action to ensure we can dial in remotely to your systems if needed, Even when located elsewhere they will also able to join such sessions.
5. Every request is given a ticket number and is then assigned to a consultant. For follow up communication please mention the ticket number. That will make it easier for us to find and review the details and actions to date. It’s possible that more than one consultant may be involved and they will be working remote from each other. This will save time for everyone .
6. Once the support request/ issue is resolved, upon receipt of confirmation email, the request will be closed.
7. When needed to discuss pending issues we will also be available to have a conference call via Microsoft Teams. issues @ mutual agreed time.
6. All support request to be sent to Axapta.support@synergy-software.com and we suggest copy in the lead consultant and account manager with whom you normally deal’
7. Please circulate this information to respective users and department heads, so that everyone working from home is aware that we are still available to support you as best we can and that they know how to help us, to help them.

SnapLogic iPasS integration as a service – from Synergy Software Systems.

October 20th, 2019

Business Intelligence Managers/Analysts, Data/ETL Engineers, and Information/Data Architects are tasked with empowering business users to make use of
data to drive smart decisions and innovations. Data-driven initiatives can be challenging considering the explosion of data volumes due to the proliferation of sensors, IoT, and mobile computing.

Moreover, a growing number of groups within the business want access to fresh data.

To fully harness their data, organizations must also have a cloud strategy for their digital transformation efforts, namely to migrate data from
on-premises environments to the cloud. Considering the tremendous business value of unlocking that data, it’s imperative to prioritize and streamline these
data integration and migration projects.

Gone are the days when IT needed hundreds of coders to build extract, transform, load (ETL) solutions and then maintain those by writing more code. Modern integration platforms eliminate the need for custom coding. Now, data integration projects deploy and scale, often as much as ten times faster.

iPaaS platforms ease the pain because they’re designed for flexibility and ease of deployment for any integration project. A drag-and-drop UX coupled with a powerful platform and hundreds of pre-built connectors out of the box.

The connectors are always up-to-date, so the IT organization doesn’t spend an inordinate amount of time maintaining every integration by hand. This saves an incredible amount of time, money, and frustration across the team and projects and greatly reduces risk.

Not all integration platforms are created equal. Some do simple point-to-point cloud app integrations while others transform large and complex data into a data lake for advanced analytics. Some stgill require extensive developer resources to hand-code APIs while others provide self-service, drag-and-drop offerings that can be used by IT and business leaders alike. Some are best for specific tactical projects while others provide a strategic, enterprise-wide platform for multi-year digital transformation projects.

Organizations must address four key steps during the data migration and integration process:
1. Capture data that supports both the known use cases as well as future undefined use cases (think IoT data to support a future machine learning
enabled use case).
2. Conform inbound data to corporate standards to ensure governance, quality, consistency, regulatory compliance, and accuracy for downstream
consumers.
3. Refine data for its eventual downstream application and/or use cases (once its been captured and conformed to corporate standards).
4. Delivery of data needs to be broad and prepared to support future unknown destinations.

For decades, IT has been tasked to manage integration projects by writing tons of custom code. This onerous task is even more complex with the proliferation of SaaS applications, the surge in big data, the emergence of IoT, and the rise of mobile devices. IT’s integration backlog has exploded. Not only is the deployment too much work, but there is a growing cost to maintain all of the integrations.

Deploying a tactical or departmental data warehouse solution should take days, not months. Moreover, enterprise-wide data transformation projects should take months, not years.

The best data integration platforms:
– Support multiple app and data integration use cases across cloud, on-premises, and hybrid deployments
– Offer the flexibility to be used in cloud, hybrid, or on-premises environments, regardless of the execution location
– Provide a self-service user experience aided by AI, machine learning, hundreds of pre-built connectors, and integration pipeline
templates (patterns) resulting in greater user productivity, and faster time-to-integration
– Have an underlying, scalable architecture to grow with evolving data and integration requirements
– Support different data modes such as streaming, event-driven, real-time or batch

The SnapLogic iPaaS offering is functionally rich and well-proven for a variety of use cases. It supports hybrid deployments and provides rich and differentiating features for analytics and big data integration (Hadooplex). Clients score SnapLogic as above average for cloud characteristics, functional completeness, ease of use and ability to meet SLAs.” Gartner

SnapLogic is a U.S.-based integration platform company. In mid-2013, it transitioned from a traditional software business to an iPaaS model with the release of the SnapLogic Elastic Integration Platform which provides a large set of native iPaaS capabilities that target the cloud service integration, analytics and big data integration use cases.

The flagship Enterprise Edition features a set of base adapters (Snaps), an unlimited number of connections and unlimited data volume.

Synergy Software Systems has been an Enterprise Solutions Integrator in the GCC since 1991. We are pleased to announce our formal partnership to represent Snap Logic in the MEA region.

Do you need to integrate with Azure? with SAP Data Warehouse Cloud? with Workday? With Odette compliant auto mamufacturers………..?.

To learn more call us on 009714 3365589

Gartner recognized SnapLogic as a Visionary in its Data Integration Magic Quadrant

August 7th, 2019

Gartner recognized SnapLogic as a Visionary in its Data Integration Magic Quadrant! This comes on the heels of being recognized as a Leader in three top analyst reports for the best integration platform as a service (iPaaS) solutions – the Gartner Magic Quadrant, Forrester Wave, and G2 Crowd Grid.
We believe these collective recognitions testify to the fact that SnapLogic is unrivaled when it comes to integrating cloud applications and on-premises data in one unified platform.

Gartner commended SnapLogic for:
• Our powerful integration convergence and augmented data integration delivery
• Our easy accessibility to diverse user personas
• Our pricing model simplicity and trial version

Synergy Software Systems is a Middle East partner. . This solution speeds up deployment of complex solutions with multiple jntegrations and significantly improves and simplifies the management and maintenance of integrations.

Whether for EDi to Odette standards for the automotive sector, or for streaming high volumes of data, or for ETL processes to bring data from multiple, enterprise systems into a data lake or Enterprise BI or Corporate performance management system, Snap Logic provides a multitude of pre built “Snap integrations: for a low code, configuration approach to integration.

Synergy Software Systems has provided integrated solutions in the region. Digital revolution is proving new opportunities and challenges. Robotic Processes Automation, Predictive analytics, ML AI, IoT, RFID, cloud services, data lakes, and mobility are now standard components of any solution. However digital revolution also requires agility and rapid robust deployment and ease of update and maintenance. Integration ETL, and streaming data from multiple systems at enterprise scale needs a new ‘productized’ low code approach to integration.

Snaplogic is a key tool for successful agile deployment of Enterprise integration, Corporate Performance management, EDI, BI and RPA solutions.

There are already major clients deploying Snap Logic in the UAE.

To learn more . Call us on 00971 43365589

Biometrics – privacy and security concerns

June 18th, 2019

On Monday last week a US Customs and Border Protection (CBP) subcontractor suffered a data breach that exposed the photos of tens of thousands of travelers coming in and out of the United States, through specific lanes at a single Port of Entry over a one and a half months period, in what was described as a “malicious cyber-attack.”

The database of traveler photos and license plate images was transferred to a CBP subcontractor’s network without the federal agency’s authorization or knowledge, the CBP explained. The subcontractor’s network was then hacked. BP said its own systems had not been compromised. Fortunately no other identifying information was included with the photos, and no passport or other travel document photos were compromised.

Images of airline passengers from the air entry and exit process were also not involved.

CBP’s “biometric entry-exit system,”is the government initiative to biometrically verify the identities of all travelers crossing US borders. which it is racing to implement so as to use facial recognition technology on “100 percent of all international passengers,” including American citizens, in the top 20 US airports by 2021.

The concern is whether that is urgency is ignoring vetting, and regulatory safeguards, and privacy legislation. Only last month, Perceptics, the maker of vehicle license plate readers used by the US government and cities to identify and track citizens, was hacked, and its files were dumped online. It is not clear whether the attacks were connected.

Wifi 6 what is it? Why does it matter?

April 13th, 2019

Wireless speeds will soon get a lot faster thanks to the introduction of Wi-Fi 6 later this year.

Wi-Fi 6 is the next evolution of wireless local area network (WLAN) technology and it will improve upon older Wi-Fi standards, especially with the coming release of 5G wireless technology. With Wi-Fi 6 and 5G emerging onto the market at roughly the same time, it would make sense that they’re somehow related; while both promise similar improvements, they’re distinctly different technologies.

The name Wi-Fi 6 is part of a new naming convention the Wi-Fi Alliance to make these more easily understood by Wi-Fi users, making it much like the 3G/4G/5G naming convention used by cellular data networks. Behind the Wi-Fi 6 name is the latest version of the 802.11 wireless networking standard: 802.11ax. This new Wi-Fi standard is reportedly up to 30% faster than Wi-Fi 5,. Speed hasn’t been the main benefit touted by the Wi-Fi Alliance and other industry experts; Wi-Fi 6 also brings lower latency, more simultaneously deliverable data, and improved power efficiency.

Latency is a significant problem especially for mobile, internet and cloud users i.e. just about everyone. Orthogonal Frequency Division Multiple Access (OFDMA), h is an improvement on Orthogonal Frequency Division Multiplexing (OFDM). OFDM is used by Wi-Fi 5, 4, and older standards to encode and transmit data form multiple clients or access points (APs) and to contend for the ability to transmit data; once the network is idle, data can be transmitted. OFDM is a popular and reliable way to decentralize access, but it has a major problem in that it can lead to serious latency.

OFDMA, makes a major change and puts the transmission coordination in the hands of 802.11ax APs. The AP centrally schedules data transmission and is able to further divide frequencies so as to transmit data to/from multiple clients at the same time. The aim is to reduce latency and increase network efficiency—especially in high-demand environments like stadiums, conference halls, and other public spaces. OFDMA broadcasts multiple signals at the same time, and can also increase the unit interval, which means outdoor Wi-Fi deployments will be faster and more reliable.

Wi-Fi 6 will extend the capabilities of Multi-User Multi-Input/Multi-Output (MU-MIMO). MU-MIMO was previously available only for downstream connections and allowed for a device to send data to multiple receivers at the same time; Wi-Fi 6 will add MU-MIMO capabilities to upstream connections to allow more simultaneous devices on one network. MU-MIMO, is already in use in modern routers and devices, but Wi-Fi 6 upgrades it. The technology allows a router to communicate with multiple devices at the same time, rather than broadcasting to one device, and then the next, and the next. Right now, MU-MIMO allows routers to communicate with four devices at a time. Wi-Fi 6 will allow devices to communicate with up to eight. As an analogy compare adding MU-MIMO connections to adding delivery trucks to a fleet, You can send each of those trucks in different directions to different customers. “Before, you had four trucks to fill with goods and send to four customers. With Wi-Fi 6, you now have eight trucks.

Extending the truck analogy OFDMA allows one truck to carry goods to be delivered to multiple locations. The network look at a ‘truck’ and see that it has only allocated e.g. 75 percent of the load capacity of that truck and this other customer is on the same route, so it fill up that remaining space with a delivery for the second customer. In practice, this is all used to get more out of every transmission that carries a Wi-Fi signal from a router to your device.

How fast is it?

– The short answer: 9.6 Gbps. compared to 3.5 Gbps on Wi-Fi 5.

– The real answer: both of those speeds are theoretical maximums that you’re unlikely to ever reach or need in real-world Wi-Fi use. The typical download speed in the US is just 72 Mbps, or less than 1 percent of the theoretical maximum speed. The fact that Wi-Fi 6 has a much higher theoretical speed limit than its predecessor is still important because that 9.6 Gbps can be split up across a whole network of devices which means both more devices or more potential speed for each device.

When Wi-Fi 5 came out, the average US household had about five Wi-Fi devices in it. Now, homes have nine Wi-Fi devices on average, and various firms have predicted we’ll hit 50 on average within several years. Those added devices take a toll on your network. Your router can only communicate with so many devices at once, so the more gadgets demanding Wi-Fi, the more the network overall is going to slow down. At first, Wi-Fi 6 connections aren’t likely to be substantially faster. A single Wi-Fi 6 laptop connected to a Wi-Fi 6 router may only be slightly faster than a single Wi-Fi 5 laptop connected to a Wi-Fi 5 router. Devices are more likely to maintain fast speeds on busy networks

As more and more devices get added onto your network, current routers might start to get overwhelmed by requests from a multitude of devices, Wi-Fi 6 routers are designed to more effectively keep devices up to date with the data they need. Each of device;s speeds may not be faster than they can reach today on a high-quality network, but they’re more likely to maintain those top speeds in busier environments. In a home where one person is streaming Netflix, another is playing a game, someone else is video chatting, and a whole bunch of smart gadgets — a door lock, temperature sensors, light switches, and so on — are all checking in at once the top speeds of those devices won’t necessarily be boosted, but the speeds you see in typical, daily use will get likely be better. Exactly how much fast will depend on how many devices are on your network and just how demanding are those devices. In a cloud world working on html 5 pages rather tcpip protocol, and with growing use of social media, digital storage, streaming video, AI, and querying data lakes its essential that the underlying infrastructure keeps up. We are seeing similar evolution with databases, chips and memory.

Wi-Fi 6 introduces some new technologies to help mitigate the issues that come with putting dozens of Wi-Fi devices on a single network. It lets routers communicate with more devices at once, lets routers send data to multiple devices in the same broadcast, and lets Wi-Fi devices schedule check-ins with the router. Together, those features should keep connections strong even as more and more devices start demanding data.

Wi-Fi 6 will also:
• Increase the number of transmit beamforming streams to eight in order to increase network range and throughput;
• use both the 2.4 GHz and 5GHz bands simultaneously to greatly improve performance;
• use 1024 quadrature amplitude modulation (1024-QAM) to increase throughput for emerging use cases (Wi-Fi 5 uses 256-QAM);
• implement individual target wake time (TWT) to improve battery life and reduce power consumption for Wi-Fi devices;
• introduce spatial reuse technology that will allow devices to more easily access a Wi-Fi network in order to transmit data.

Wi-Fi 6 allows devices to plan out communications with a router, reducing the amount of time they need to keep their antennas powered on to transmit and search for signals. That means less drain on batteries and improved battery life in turn. This is a feature called Target Wake Time, which lets routers schedule check-in times with devices.
Your laptop needs constant internet access, so it’s unlikely to make heavy use of this feature (except, perhaps, when it moves into a sleep state). This feature will be more valuable for smaller, already low-power Wi-Fi devices that just need to update their status every now and then. (Think small sensors placed around a home to monitor things like leaks or smart home devices that sit unused most of the day.)

Wi-Fi generations rely on new hardware, not just software updates, so you’ll need to buy new phones, laptops, and so on to get the new version of Wi-Fi. new devices will start coming with Wi-Fi 6 by default. As you replace your phone, laptop, and game consoles over the next five years, you’ll bring home new ones that include the latest version of Wi-Fi. There is one thing you will have to make a point of going out and buying: a new router. If your router doesn’t support Wi-Fi 6, then you won’t see any benefits, no matter how many Wi-Fi 6 devices you have. (You may however see a benefit, though, connecting Wi-Fi 5 gadgets to a Wi-Fi 6 router, because the router may then be capable of communicating with more devices at once.)

A new security protocol called WPA3. WPA3 makes it harder for hackers to crack passwords. For a Wi-Fi 6 device to receive certification from the Wi-Fi Alliance, WPA3 is required. (so be aware that it may not be included in uncertified devices.)

So where does 5G fit in ?
5G is the umbrella term for the fifth generation of mobile network technology, and it encompasses a lot of different elements. Cellular, or mobile networks, rely on licensed spectrum bands, auctioned off to the highest bidder. Carriers, like Verizon or AT&T, pay to use those bands. To roll out coverage they build a network of connected base stations capable of sending out a strong enough signal that it can serve multiple people (thousands in urban areas) at once. To recoup their investment, we pay them subscriptions.

Wi-Fi relies on unlicensed spectrum which is free to use, but the signal is relatively weak. We pay an Internet Service Provider (ISP) to deliver the internet to our door and then use a router to fill our house with Wi-Fi. We the same frequency band as our neighbors and that is a problem, when you live in a very densely populated area. The two frequencies that Wi-Fi uses are 2.4Ghz and 5Ghz. The 2.4Ghz has a lower potential top speed but it penetrates better, so it has a longer range than 5Ghz.

(Note that that 5Ghz Wi-Fi has absolutely nothing to do with 5G mobile networks.)

In every day life, most of us rely on Wi-Fi both at home and in the office — or in coffee shops — and mobile networks when we step out the front door and move out of range of the router. (Though for security reasons I would never recommend anyone to se a public hotspot)

Smartphones switch automatically and we don’t have to give it any thought, we just want a good connection at all times. That will continue to be the case for the vast majority of people after 5G rolls out. The difference is that both mobile networks and Wi-Fi are going to get faster. The prospect of download speeds between 1Gbps and 10Gbps, and upload speed or latency of just 1 millisecond, has us excited about 5G. The reality is that we will not get anywhere near the theoretical top speeds. The speed of your 5G connection will depend on many factors including: where you are, to what network you connect, how many other people connect, and what device you use.

The aim is to achieve a minimum download speed of 50Mbps and latency of 10ms. That will represent a major improvement over current average speeds, but just as with 4G LTE, 5G coverage is going to expand slowly. It’s also going to work hand-in-hand, not just with Wi-Fi, but with earlier generations of mobile network technology, so 4G LTE will continue to be offered as a fallback and will continue to evolve and get faster.

Hilton Engineering Conference London February 2019

February 18th, 2019

This conference for Hilton Chief Engineers took place at the beautiful Hilton London Metropole from 11th-15th February 2019.

Principal Consultant Ramesh Kulkarni represented us there together with John M. Clark Vice President – SynergyMMS Division Systems Associates, Inc.

SynergyMMS is rolling out globally across the group. Inigma, the next generation of this mobile, multi-language Facility management solution was presented at the show.

This cloud solution is rapidly installed with minimal training needed, no server, cost, no annual maintenance, no server license, no user licenses, just a simple per room monthly subscription.

Ask us about the ‘snagging solution; for new hotel openings, refurbishment, or extension projects.
0097143365589

EAM, field service, IOT and Holo lens -ask Synergy Software Systems, Dubai

February 17th, 2018

The digital world is already here and what seemed science fiction few years back we now accept as everyday. Voice activated commands on our smear phone now also query our databases and update our dashboards, remote medical checks are done at an atm, artificial intelligence and big data influence our live every time we log onto google, amazon, facebook or ring a callcentre.

We have been investigating IoT for over a year, particularly with regard to condition monitoring for asset management and several of our team were involved in recent training that included a hands on session for Microsoft Field Services. This is built on the Dynamics 365 platform as an extension of CRM and offer comprehensive features for field service: help desk, engineer scheduling and mobile operations. Field service is aimed at service companies with a large field force of service engineers and is typically integrated with erp systems and thus the overall project can be quite complex. To reduce the risk and implementation time we offer a proven accelerator.

We also offer a Enterprise Asset Management suite which is successfully deployed in several leading UAE companies for a number of years particularly for asset tracking.

In Dynamics 365/2012 for Ax EAM also needs to consider that both engineers and equipment may be sued is production or on projects. Thus engineering and maintenance scheduling also has to consider in house planned and breakdown maintenance and servicing and more complex overhauls and asset structures, the impact of equipment downtime on production schedules and much more. We offer a Microsoft certified isv integrated suite of EAM modules built on the Ax 2012/D365 platform that covers both field service and mobile as well as in in house maintenance.

Predictive maintenance and SCADA integration and extensive condition monitoring., embedded and Power BI analytics are no longer rocket science.

At a recent client 4 day workshop we demonstrated HOLO lens assisted reality to support engineers. This can for example be used to provide step by step guidance or for collaboration from the field with an OEM a remote manufacturer, or your chief engineer.

GDPR Affects All European Businesses – What about the G.C.C. and U.A.E.?

August 19th, 2017

See our previous article on this topic for why your company may be affected if you are a branch of a European company, or have branches in Europe, or trade with a European company.

From May 25, 2018, companies with business operations inside the European Union must follow the General Data Protection Regulations (GDPR) to safeguard how they process personal data “wholly or partly by automated means and to the processing other than by automated means of personal data which form part of a filing system or are intended to form part of a filing system.”

The penalties set for breaches of GDPR are up to 4% of a company’s annual global turnover.
For large companies like Microsoft that have operations within the EU, making sure that IT systems do not contravene GDPR is critical. As we saw on August 3, even the largest software operations like Office 365 can have a data breach.

Many applications can store data that might come under the scope of GDPR. the regulation has a considerable influence over how tenants deal with personal data. The definition of personal data is “any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.”
GDPR goes on to define processing of personal data to be “any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.”

That means that individuals have the right to ask companies to tell them what of their personal data a company holds, and to correct errors in their personal data, or to erase that data completely.

Companies therefore need to:
– review and know what personal data they hold,
– make sure that they obtain consents from people to store that data,
– protect the data,
– and notify authorities when data breaches occur.

On first reading, this might sound like what companies do – or at least try to do – today. The difference lies in the strength of the regulation and the weight of the penalties should anything go wrong.

GDPR deserves your attention.

The definitions used by GDPR are broad. To move from the theoretical to the real world an organization first needs to understand what personal data it currently holds for its business operations, and where they use the data within software applications.

It is easy to hold personal information outside of business applications like finance and erp and crm e.g. inside Office 365 applications, including:
• Annual reviews written about employees stored in a SharePoint or OneDrive for Business site.
• A list of applicants for a position in an Excel worksheet attached to an email message.
• Tables holding data (names, employee numbers, hire dates, salaries) about employees in SharePoint sites.
• Outlook contacts, and emails. Skype business,
• Social media sites
• Loyalty programmes
• T@A systems
• E commerce sites
• Mobile apps e.g. What’s App

Other examples might include contract documentation, project files that includes someone’s personal information, and so on.

What backups do you have of the customer’s data?
What business data do your staff hold on BYOD devices e.g. in What’s App?

Data Governance Helps
Fortunately, the work done inside Office 365 in the areas of data governance and compliance help tenants to satisfy the requirements of GDPR. These features include:
• Classification labels and policies to mark content that holds personal data.
• Auto-label policies to find and classify personal data as defined by GDPR. Retention processing can then remove items stamped with the GDPR label from mailboxes and sites after a defined period, perhaps after going through a manual disposition process.
• Content searches to find personal data marked as coming under the scope of GDPR.
• Alert policies to detect actions that might be violations of the GDPR such as someone downloading multiple documents over a brief period from a SharePoint site that holds confidential documentation.
• Searches of the Office 365 audit log to discover and report potential GDPR issues.
• Azure Information Protection labels to encrypt documents and spreadsheets holding personal data by applying RMS templates so that unauthorized parties cannot read the documents even if they leak outside the organization.

Technology that exists today within Office 365 that can help with GDPR.

Classification Labels
Create a classification label to mark personal data coming under the scope of GDPR and then apply that label to relevant content. When you have Office 365 E5 licenses, create an auto-label policy to stamp the label on content in Exchange, SharePoint, and OneDrive for Business found because documents and messages hold sensitive data types known to Office 365.

GDPR sensitive data types

Select from the set of sensitive data types available in Office 365.
The set is growing steadily as Microsoft adds new definitions.
At the time of writing, 82 types are available, 31 of which are obvious candidates to use in a policy because those are for sensitive data types such as country-specific identity cards or passports.

Figure 1: Selecting personal data types for an auto-label policy (image credit: Tony Redmond)

GDPR Policy

The screenshot in Figure 2 shows a set of sensitive data types selected for the policy. The policy applies a label called “GDPR personal data” to any content found in the selected locations that matches any of the 31 data types.

Auto-apply policies can cover all Exchange mailboxes and SharePoint and OneDrive for Business sites in a tenant – or a selected sub-set of these locations.


Figure 2: The full set of personal data types for a GDPR policy (image credit: Tony Redmond)

Use classification labels to mark GDPR content so that you can search for this content using the ComplianceTag keyword (for instance, ComplianceTag:”GDPR personal data”).

Caveats:
It may take 1-2 week before auto-label policies apply to all locations.
An auto-label policy will not overwrite a label that already exists on an item.

A problem is that classification labels only cover some of Office 365. Some examples of popular applications where you cannot yet use labels are:
• Teams.
• Planner.
• Yammer.

Microsoft plans to expand the Office 365 data governance framework to other locations (applications) over time.
Master data management
What about all the applications running on SQL or other databases?
Master Data Management MDM is a feature of SQL since SQL 2012. However, when you have many data sources then you are relay into an ETL process and even with MDM tools the work is still significant.

If you have extensive requirements then ask us about Profisee our specialist, productized MDM solution built on top of SQL MDM that allows you to do much of the work by configuration.

Right of Erasure
Finding GDPR data is only part of the problem. Article 17 of GDPR (the “right of erasure”), says: “The data subject shall have the right to obtain from the controller the erasure of personal data concerning him or her without undue delay.” In other words, someone has the right to demand that an organization should erase any of their personal data that exists within the company’s records.

Content searches can find information about someone using their name, employee number, or other identifiers as search keywords, but erasing the information is something that probably also needs manual processing to ensure that the tenant removes the right data, and only that data.

You can find and remove documents and other items that hold someone’s name or other identifier belonging to them by using tools such as Exchange’s v Search-Mailbox cmdlet, or Office 365 content searches.
What if the the data ahs to be retained because the company needs to keep items for regulatory or legal purposes, can you then go ahead and remove the items?
The purpose of placing content on-hold is to ensure that no-one, including administrators, can remove that information from Exchange or SharePoint.

The GDPR requirement to erase data on request means that administrators might have to release holds placed on Exchange, SharePoint, and OneDrive for Business locations to remove the specified data. Once you release a hold, you weaken the argument that held data is immutable. The danger exists that background processes or users can then either remove or edit previously-held data and so undermine a company’s data governance strategy.

The strict reading of GDPR is that organizations must process requests to erase personal data upon request.
What if the company needs to keep some of the data to satisfy regulations governing financial transactions, taxation, employment claims, or other interactions? This is a dilemma for IT. Lawyers will undoubtedly have to interpret requests and understand the consequences before making decisions and it is likely that judges will have to decide some test cases in different jurisdictions before full clarity exists.

Hybrid is even More Difficult

Microsoft is working to help Office 365 tenants with GDPR. However, I don’t see the same effort going to help on-premises customers. Some documentation exists to deal with certain circumstances (like how to remove messages held in Recoverable Items), but it seems that on-premises customers have to figure out a lot things for themselves.

This is understandable. Each on-premises deployment differs slightly and exists inside specific IT environments. Compared to the certainty of Office 365, developing software for on-premises deployment must accommodate the vertical and company specific requirements with integrations and bespoke developments.

On-premises software is more flexible, but it is also more complicated.
Solutions to help on-premises customers deal with GDPR are more of a challenge than Microsoft or other software vendors wants to take on especially given the industry focus of moving everything to the cloud.

Solutions like auto-label policies are unavailable for on-premises servers. Those running on-premises SharePoint and Exchange systems must find their own ways to help the businesses that they serve deal with personal data in a manner that respects GDPR. Easier said than done and needs to start sooner than later.

SharePoint Online GitHub Hub

If you work with SharePoint Online, you might be interested in the SharePoint GDPR Activity Hub. At present, work is only starting, but it is a nway to share information and code with similarly-liked people.

ISV Initiatives

There many ISV-sponsored white papers on GDPR and how their technology can help companies cope with the new regulations. There is no doubt that these white papers are valuable, if only for the introduction and commentary by experts that the papers usually feature. But before you resort to an expensive investment, ask yourself whether the functionality available in Office 365 or SQL is enough.

Technology Only Part of the Solution

GDPR will effect Office 365 because it will make any organization operating in the European Union aware of new responsibilities to protect personal data. Deploy Office 365 features to support users in their work, but do not expect Office 365 to be a silver bullet for GDPR. Technology seldom solves problems on its own. The nature of regulations like GDPR is that training and preparation are as important if not more important than technology to ensure that users recognize and properly deal with personal data in their day-to-day activities.

Support for Microsoft Dynamics in the U.A.E. – Dubai – and the G.C.C and more -Synergy Software Systems

June 9th, 2016

“Go with Synergy and sleep at night.”

That mantra was propagated by our customers in the 90s and is still the message today – that is why:
– we have many customers who have been with us over 10 years and some over 15 years.
– we received the Highest Customer Satisfaction Award from Microsoft
– we attained President’s Club status (top 5% of Partners globally)
– we are the only Dynamics Ax partner in the Middle East accepted into Ax Pact
– we are the only Middle East Dynamics partner to attend Connect at Seattle last year
– we regularly work with Microsoft’ s global platinum partners to assist their deployments in this region.

The reasons are simple.
Our business is built on support, not on selling licenses.
We don’t outsource,
We don’t use temporary staff
We don’t use freelancers
All our consultants are centralized, in large modern offices, in the heart of Dubai
We support customers globally with web dial in and screens sharing.
We maintain a support infrastructure for testing, patching analysis.
We participate in the Microsoft TAP programme for beta testing
Even the support receptionist is a Microsoft certified consultant
We support an manned CRM helpdesk -even the
If we can’t support it ourselves then we don’t implement
Those who implement and our know your people and your business and your build are there to support you.
We have the depth and breadth of skills that a small company cannot offer.
On average our consultants have more than 10 years experience
Our Dynamics team has more than 300 man years of relevant experience and numerous certifications

Synergy Software Systems -“Working together”
Find out why so many companies have benefitted from our post implementation project review to stablise their system to provide a firm platform to take them forward, so that they can leverage the full power of Microsoft Dynamics.
Let us help you to sleep at night.