Welcome!

Blog Feed Post

One Solution, One Vendor: Wavelink Avalanche Enables Mobile Task Workers Regardless of Device Type or Operating System

SALT LAKE CITY - March 26, 2014 - To support the management of an increasing variety of mobile devices ranging from consumer iOS, Android and Windows devices to rugged mobile computers, Wavelink today announced the newest version of its enterprise mobility management software, Avalanche.

There are two types of mission-critical users in the enterprise: the operational task worker, who uses the traditional ruggedized devices, and the customer-facing task worker for whom companies are evaluating a wider spectrum of device options—which includes consumer devices. Deployed in an on-premise configuration or through the cloud, Avalanche 6.0 secures and manages all types of devices and enables access to the data and applications needed for both front and back room work. With just a single solution, workers efficiency and productivity is maximized.

"The device landscape of the mobile workforce has become increasingly fragmented, with consumer devices working alongside mission critical, ruggedized devices," said Stephen Brown, Director of Product Management at Wavelink. "Although the devices have become more varied, all task workers still need access to the same sets of information, whether they work in the warehouse, retail floor or in the field. With Avalanche 6.0, IT professionals can enable task workers to use the appropriate devices, without compromising security or the access to the data and applications workers need to perform their jobs."

"While many vendors have expanded their solution range and have productized "holistic" end-to-end mobility solutions, many rely heavily on partners to fill the gaps in their product portfolios, and do not possess truly integrated mobility solutions," says Eric Klein, senior analyst, mobile software for VDC. "An integrated approach is most effective in managing the complexity that comes with expanding mobile deployments, particularly those that have diverse deployment environments where several mobile technologies are being leveraged. Such an approach can not only yield operational advantages for IT, but can enable a comprehensive and unified IT management solution that combines a broad set of device agnostic management features with network monitoring and enterprise-grade security."

As part of the Wavelink Mobile Enterprise Productivity Suite, Avalanche 6.0 is a deeply integrated mobility solution that interacts with all Wavelink solutions, including application streaming and voice-enabled applications. This gives IT professionals the ability to manage mobile devices, applications and data from the warehouse to the front room using one solution. With the Wavelink Mobile Enterprise Productivity Suite, enterprises gain a solution that takes them through the entire lifecycle of a mobile deployment and the growing day-to-day needs of the enterprise. With Avalanche 6.0 organizations see an increase in productivity and efficiency of both mobile task workers and the IT professionals that support them.

Wavelink Avalanche 6.0 features:
- One solution for managing mobile devices for both task and knowledge workers
- The easiest way to manage Wavelink Terminal Emulation, Velocity and Speakeasy-enabled mobile users
- Redesigned Avalanche console for a better user experience
- Simplified creation of deployment packages
- Package Builder 6.0 (for rugged mobile computers) - allows users to track templates and builds for future reference and revision
- On-premise and cloud-based deployment options

Tweet This: New #EMM solution from @Wavelink: Avalanche 6.0 supports both consumer and ruggedized devices for task workers.

For more information, please visit http://www.wavelink.com/avalanche.

###

Follow us on Twitter: @wavelink
Watch our videos on YouTube: http://www.youtube.com/user/wavelinkcorp
Like us on Facebook
Read our blog: http://www.wavelink.com/blog/

About Wavelink
Wavelink, a business unit of LANDESK Software, Inc., is the leading provider of multi-vendor mobile device management, wireless infrastructure management, terminal emulation, voice enabling and mobile application development software. Wavelink has more than 7.5 million active client licenses in use world-wide.

Wavelink solutions solve the unique challenges found in deploying, managing and controlling today's enterprise mobility systems. These solutions facilitate peak performance from frontline staff. Wavelink offers a platform to manage, provision, update, secure and troubleshoot ruggedized mobile computing platforms from a single, easy-to-use console.

Wavelink products ease the growing chaos around mobility, heterogeneity, and the challenges around more demanding end-user computing environments. Inside the four walls, or in the field, Wavelink leads mobility.

Copyright © 2014, LANDESK Software, Inc. and its affiliates. All rights reserved. LANDESK and its logos are registered trademarks or trademarks of LANDESK Software, Inc. and its affiliates in the United States and/or other countries. All other trademarks are the property of their respective owners.

Media Contacts:

Gemma Randazzo
Wavelink
Global Public Relations
Tel: +1 801-316-9063
Email: [email protected]

Jason Deal
Lois Paul and Partners
Global Public Relations
Tel: +1 512-784-7103
Email: [email protected]

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
In his session at @DevOpsSummit at 20th Cloud Expo, Kelly Looney, director of DevOps consulting for Skytap, showed how an incremental approach to introducing containers into complex, distributed applications results in modernization with less risk and more reward. He also shared the story of how Skytap used Docker to get out of the business of managing infrastructure, and into the business of delivering innovation and business value. Attendees learned how up-front planning allows for a clean sep...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Historically, some banking activities such as trading have been relying heavily on analytics and cutting edge algorithmic tools. The coming of age of powerful data analytics solutions combined with the development of intelligent algorithms have created new opportunities for financial institutions. In his session at 20th Cloud Expo, Sebastien Meunier, Head of Digital for North America at Chappuis Halder & Co., discussed how these tools can be leveraged to develop a lasting competitive advantage ...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...