![]() ![]() Staff in the field are equipped with the ruggedized Samsung Galaxy Xcover 3 and Xcover 4, while other employees can choose between several BlackBerry Android phones and iPhones. ![]() To ensure that’s always the case, Evides has implemented a Choose Your Own Device (CYOD) policy for approximately 500 of its 700 employees. Our employees need to be able to find their way quickly to the source of any distribution problem, and to report when the problem is fixed.” “If there’s a leak or interruption anywhere in our infrastructure, it needs to be addressed as quickly as possible. “We have a very high service level we need to achieve,” says de Blok. Everything from the water quality to its reliability to the overall customer experience needs to be smooth and seamless. The company’s customers, de Blok says, have very high expectations – and Evides prides itself on exceeding them wherever possible. “One of our larger markets is Rotterdam, where we operate Western Europe’s largest water processing refinery.”īetter Coordination Through BlackBerry UEM: Because the service it provides is so critical, Evides cannot afford even minimal downtime in its infrastructure. “In the market for industrial water-on-demand, we are one of the strongest players in Northwestern Europe,” explains Alexander de Blok, Evides Head of Systems and Application Management. It counts several major fuel companies amongst its clients. This can vary from offering a temporary supply of industrial water, to implementing and operating entire water treatment plants. It counts approximately two and a half million consumers and businesses amongst its clientele.Įvides also provides tailored water services for large industrial companies in the Netherlands, Belgium, and Germany. To find out more about Blackberry Workspaces and how they could help protect your company, clients, and staff, please speak to one of our Xeratek consultants.Evides is one of the Netherlands’ largest water companies, supplying much of the country’s southwest with drinking water. Workspace tracks all file activity – what was accessed, when, where, by who, on which device, and what activity was performed – with this information being easily available in report form to administrators.ĭocuments can be edited in the app or on the device, and there are additional add-on products that can be incorporated to provide a seamless and secure experience. In this way, you can even collaborate with external users without any risk. The industry-leading Digital Rights Management (DRM) technology travels with every file, which is protected by 256-bit encryption and can only be accessed by authorised users, meaning administrators can control everything a user can do with a file, even after it’s downloaded.Īt the same time, individuals or groups can be allowed access (or restricted), with security rules that can be set to different levels in order to allow Workspaces to operate as a secure access portal for collaboration. ![]() You can securely store, share, collaborate and control your corporate IP without moving files into the cloud, which can be time-consuming and costly. These new regulations, and the resulting focus of consumers on their data privacy and protection, combined with the resurgence of global security threats, and high-profile instances of cyber hacking and corporate data breaches, have meant that we are all looking for added protection and support from our devices and software.īlackberry Workspaces enables you to work safer without compromising on productivity or collaboration. With this in mind, many companies have been performing audits of their devices and software to ensure that this data is protected and audits the data itself to see if the information is necessary. And it’s not just about data collection it’s about what information you keep, how you access it, where you keep it, how you share it, how you delete it, how you process it, and how you move/transfer/edit it. With the recent introduction of GDPR (General Data Protection Regulations) in the European Union, there has been a lot of focus on data privacy and security. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |