Benefits of Virtual CIO Services

VCIO Services offers an affordable and effective way to fill the CIO role. Learn more about 5 benefits of using a VCIO.

 MOST BUSINESSES SPEND 6 –8% OF REVENUE ON TECHNOLOGY

1.Predictable technology budgets, both short and long-term. An effective virtual CIO will take the time to understand your organization’s core goals and help you accomplish those goals by creating a planor Technology Roadmap, that syncs your goals, needs and expectations with the right technology to meet them. Here are Bizco we host Quarterly Business Reviews to help make sure you’re headed in the right direction.

2. Decreased operating costs and improved productivity. As a VCIO we can help you cut operating costs through your enterprise without hindering operations. You can spend a fraction of the costs and still get an entire team of technology experts on call whenever you need them.

3. Regularly reports findings and recommendations, with costs, to be considered for budget inclusion. As part of your team, you’ll be able to use us in consultative and advisory conversations. Not only do you have the ability to ask if a potential technology investment is right for your business, but we are constantly learning and advising what works best with your business’ goals.

4. Ensures security, including business continuity, disaster recovery and compliance. Wouldn’t you want to prevent incidents from happening and ensure that sensitive files or information don’t fall in the hands of cyber-attackers? We will constantly be working on the security of your business by creating secure policies and implementing the right patches and updates in a timely manner to prevent vulnerabilities.

5. Finds ways to make technology contribute to the bottoms line. We are here to understand your core goals and contribute to meet those goals. Through creating efficiencies, business process optimization, and strategic technology direction, we can reduce your overall costs and drive revenue.

Contact us today to learn how we can benefit you as a VCIO.

Email us at lnksales@Bizco.com or call 402.323.4888.

Panasonic Releases the NEW Toughbook CF-33

Panasonic just added a new addition to the Toughbook family with the revolutionary CF-33. Inspired by the increasing demands of mobile professionals, the Toughbook 33 delivers rugged mobility in a highly customizable package that also includes a generation of backward compatibility. The nature of these jobs requires a laptop that’s thick and rugged, and in today’s world of versatile hybrid notebooks, consumer-facing devices simply don’t have this advantage. Boasting a magnesium alloy chassis and a fully rugged design, the Toughbook 33 is for those whose jobs require a laptop meeting military-grade MIL-STD-810G standards. 

This is a laptop that, according to Panasonic’s claims, can withstand drops, shocks, vibration, rain, dust, high temperatures, low temperatures, humidity and, of course, an ‘explosive atmosphere’.

The Panasonic Toughbook 33 gets with the times in more ways than one, too. Not only are the processors up-to-date, but there’s a choice between 256GB and 512GB of storage space with RAM configurations of 8GB and 16GB available.

The Toughbook 33 has a 12-inch screen that’s equipped with a QHD (2,160 x 1,440) resolution. It’s a capacitive multi-touch screen which can be used while wearing gloves, and it also supports an IP55-rated digitizer pen. In the flesh, the Toughbook 33’s screen is among its standout features. The 3:2 aspect ratio might seem like a step backwards from the 16:9 standard followed by previous Toughbooks, but for its target audience, this format better accommodates legacy applications that haven’t been updated. Panasonic choose this to make the tablet easier to handle, and for better viewing of business applications such as Computer Aided Dispatch (CAD) for law enforcement officers. Other benefits of a 3:2 over a widescreen include less vertical scrolling, more closely resembles the size and feel of 8.5 x 11 paper, and less interference around airbag zones for better vehicle‐occupant safety.

This laptop’s display is rated at a brightness of 1,200 nits, which is a lot more obvious when you’re looking at it head-on than it is in photos. As a result, you don’t have to worry about sunlight getting in the way of, say, accessing your Computer Aided Dispatch and completing tasks quickly and efficiently.

With such a bright, vivid screen, and powerful processors, it’s safe to say we were concerned about the battery life on the Panasonic Toughbook 33. So it was a relief to hear that – if nothing else – the battery is a swappable component of Panasonic’s latest professional-grade workhorse.

Not only can you store two batteries at a time in the Toughbook, but an upgrade makes it possible for the battery life to last 20 hours, as opposed to the default battery’s 10 hours of longevity. In our hands-on demo, we got to take a look at the charging dock, which can apparently handle four battery units at a time.

Luckily, switching the batteries out is relatively painless. By simply sliding off a panel located on the back of the tablet, the interchangeable batteries of the Toughbook can be removed and replaced in a matter of seconds.

For more information on the CF-33 visit ToughOnline.com or call 877-868-4461.

Are tech problems creating headaches or problems in your conference rooms?

 Maybe a refresh of your presentation technology can help!

Bizco’s team of experienced audio-visual system design and integration specialists can review your specific needs, propose effective solutions and provide you with a system installation that can make your technology challenges disappear! 

When you need to communicate…the equipment MUST work and be simple to use.

Bizco knows that the “key” to planning for presentation success starts with understanding the size and shape of your room, and then matching the right technology to it, based on your specific presentation needs. – Is your old speakerphone just not cutting it?  Can your old projector connect to and display today’s digital laptops?  Are you using the latest in web and video conferencing to save time and money? 

Involving a professional AV system design team is even more important when you are planning new construction.  Should you install a floor box under your conference table?  Will all the needed conduits and electrical outlets be located precisely where you need them?  Will the conduit and box sizes be adequate to support your future AV and IT needs?   

To give your company the perfect match of technology for your needs, Bizco will start by listening and learning from you about how and what you present, then match your needs to the requirements of the rooms where you work.  In many rooms, installing the correct type and number of microphones will make conference calling and audio-for-video conferencing a breeze!  Matching the right size display or screen to the room’s depth will let those at the back of the room see clearly.  How about connecting your laptop or portable tablet?  Do you know that wireless presentation devices now exist, so that your presenters can be completely “cord free?” 

When it comes to communicating, time really is money, and you can never get back meetings that “went wrong” because you didn’t have the right presentation tools or when the AV didn’t work as expected.  So before you invest any technology dollars in something that “might work,” let Bizco’s team of AV Professionals discuss your needs with you!  We will listen….then evaluate, discuss and explain the AV solution options that will perfectly fit your needs and budget.   

Call Bizco, and make “wasted meetings because the AV didn’t work” a thing of the past!

When should you involve an “AV Systems Design Team” when planning or upgrading your AV presentation systems?

Bizco’s AV Systems Design Team is a group of technology experts who spends all day-every day researching and evaluating the very latest in AV presentation technologies. — Does the latest wireless gizmo actually perform as advertised?  Is today’s “good deal” at the electronics store really your best “value?”  How large a display do I need for my conference room?  Will adding more microphones help when I make conference calls?

The answer to all these questions is “maybe.” – That is, until your specific room requirements and presentation needs are taken into consideration, and a definite “answer” can be determined.

Too many times companies complain that they own or still use the wrong or outdated AV technology, and consistently waste their employee’s precious time and talent on meetings that “didn’t go as planned.”   — Bizco’s AV Design Team can help you avoid the frustration; and in many cases for a lot less investment than you might think! 

Bizco’s AV Systems Design Team will evaluate the technologies that you use now.  Ask the right questions about how you most effectively communicate (and find out why in some cases you don’t,) and then will match the best performing current technology offerings with your specific room requirements and budget. 

We can help you be smarter about the latest in tech too!  AV manufacturers often bring us their latest models to evaluate, and we can pass-along “real world” tests and experience of how equipment actually performs in the field to you. – Maybe a new presentation “gateway” would be the perfect match for your presenters using wireless tablets!  

One of the most important times to involve Bizco’s AV Systems Design Team is in advance of new construction or remodeling.  We can help you, your architect and General Contractor plan for, locate and properly document important AV and IT infrastructure needs like floor boxes, conduits, electrical locations and power schedules.  Plus evaluate camera, speaker and microphone placements, and how each, done properly, can positively interact with room lighting, window coverings and HVAC systems.

When it comes to communicating, time really is money, and you can never get back meetings that “went wrong” because you didn’t have the right presentation tools.  So before you invest any technology dollars in something that “might work,” let Bizco’s team of AV System Design Professionals discuss your very best options and their costs with you!   

Call Bizco at 402-323-4842, and be confident that you have maximized every dollar of your technology investment!

Bizco Mobile Device Management: Are your devices secure?

In 2014, over 2.1 million smartphones were stolen with 1 in 10 of phone theft victims reporting loss of confidential company data. Are your companies mobile devices equipped with the latest technology to keep this from happening?
With Bizco Mobile Device Management powered by MaaS360, you can rest assured your data is safe.
MaaS360 is the fastest and most comprehensive way to configured devices for enterprise access and secure corporate data on smartphones and tablets –all from a single screen. It’s an easy-to-use cloud platform with all of the essential functionality for end-to-end management of today’s mobile devices including iPhones, iPads, Androids, Kindle Fire Devices, Windows Phones and BlackBerry smartphones.

What can it do for you?
• SMS, email or URL over-the-air (OTA) enrollment
• Passcode & encryption enforcement
• Email, VPN & Wi-Fi profiles
• Device restriction settings
• Remote locate, lock & wipe (full & selective)
• Jailbreak & root detection
• Policy updates & changes
• Compliance reporting

Maas360 allows businesses to maximize the functionality of mobile devices through app deployment and management, corporate content distribution and advanced malware and jailbreak / root detection. Interested in learning more? See the full details on what Bizco Mobile Device Management powered by MaaS360 can do for you here! For more information feel free to call us at 402-323-4800 or email us at sales@Bizco.com

By: Brad Osborn, Service Manager, Bizco Technologies

 

Do you know how to keep your computer safe?

Thanks to the ongoing advancement in technology, the world is more connected than ever. From the various mobile devices such as Laptops, Tablets, Smart Phones, Digital Cameras, and In-Car Wi-Fi to the Desktops, Workstations and Servers we utilize both at home and in our places of business.
Hundreds of new viruses are written and released every day. Unfortunately, there is no 100% bulletproof remedy for any network. Although Antivirus applications, Firewalls and other security appliances will significantly help protect your network, it also comes down to Education, Behavior and Awareness to make a significant impact in protecting the infrastructure.
Anyone that uses a computer or device on a corporate network is also responsible for helping to maintain a secure environment.
What do all these devices have in common?
-Many of these devices are in an, “always on & always connected” state and without adequate protection and proper safety practices, these devices are in an elevated state of vulnerability.
-They’re a potential breeding ground for Viruses, Malware, Ransomware and other malicious attacks.

What is a Virus?
-A virus is a small program, application or script, that contains malicious code used without permission to self-replicate across your machine, modify data and therefore “infect” a given device. Due to this self-replication, a virus can spread rapidly infecting hundreds to thousands of files in a matter of seconds.
-One example of a virus is also classified as Ransomware. Once a machine becomes infected with this highly advanced and sophisticated virus, all user data is encrypted, rendering said data completely unusable and unrecoverable unless a ransom is paid and decryption key is provided. Unfortunately, there is no guarantee that paying the ransom will restore your data to a useable state and in most cases, the data is completely destroyed and the machine must be wiped and rebuilt.

What are Viruses capable of?

While not all viruses are created equal, some are certainly more damaging than others. Here are just a few characteristics of a virus:
– Corruption of data
– Complete loss of data
– Stealing of cached information, such as usernames, passwords, banking information, etc. (identity theft)
– Attach to your personal and/or corporate address book, to send spam
– Spread to other machines and devices on the network, also resulting in corruption or total loss of data
– Significant amount of downtime, resulting in productivity and profit loss

What happens if I become infected?

Depending on the severity of the infection, many machines can be cleaned and returned to a normal, working state, without the need to wipe and rebuild. This
process can take several minutes to several hours depending on the extent of the infection. For highly infected machines, where system files, registry entries and other
data has been modified, the machines must be restored to a factory state to ensure the infection has been completely removed.

This can also take several hours to complete, depending on the degree of recovery and additional software that needs to be installed, as well as additional
configuration including joining the machine to the network, installing printers, configuring email, etc.

In more severe cases where multiple machines, including Servers, are infected, the recovery process can take several hours, to an entire day. There are many
variables that come into play when rebuilding a workstation, compared to restoring a Server from backups, which ultimately contributes to the total recovery time.
It is important to note, that even a single machine becoming infected can significantly and negatively impact overall productivity and more importantly,
profitability for the company.

How do I avoid becoming infected?

These are the most important steps you can follow to minimize risk as well as ensure you and your company remain productive and profitable while minimizing
downtime and added cost:

– Email
– If you don’t recognize the sender, DO NOT open the email under any circumstance.
– If you receive an expected or unexpected email from someone you know containing an attachment that when opened you receive any sort of alert, error, warning or notification, do not acknowledge the alert or click any buttons.
– Example: A Microsoft Word or Excel document, that prompts you to “Enable Macros” –Do Not  Enable-
– If you receive an email containing a link (in the body of the email) that you do not recognize or are not sure of, Do Not Click.
– If you receive an email with an attachment (Word, PDF, etc.) with a link embedded in that attachment, Do Not Click.
– If you receive an email with the subject line, “Invoice, USPS/UPS/FedEx Tracking Number, Order Number, Delivery Confirmation,” etc., Do Not Open.

– Websites
– Only visit known, good websites that you are familiar with.
– Avoid at all costs, any form of Adult or Torrent websites. Accessing these sites will expose your machine and the network you’re on to viruses and other malicious tasks.
– If you’re redirected to a different website than you intend to visit, close your web browser immediately. For example: You’re trying to visit, “msn.com” and are redirected to, “bestshoppingdeals.com”. This is a sign either a false link was clicked, a web address was misspelled or your machine is infected.
– When typing an address into the address or search bar, double check your spelling. Many malicious sites are based on commonly misspelled domains and can lead you to a malicious website causing your machine to become infected.
– Example: You type, “youutbe.com” and meant to type, “youtube.com”
– If you receive a pop-up while surfing the internet, do not acknowledge or click on any part of the pop-up. Many times these will advise you to download a piece of software to, “fix errors on your PC for free”, or “scan for viruses”, or ask you to “click here to claim your prize”. These are all scams attempting to entice you into vising a malicious site or spending $29.99 for a software download that will only cause more harm to your PC and your wallet. This is also known as “Scare-ware”.
– To close out of a website or pop-up that you’re unfamiliar with, Right Click the Task Bar > select Task Manager > Select the Application or Programs Tab > Select Internet Explorer, Firefox or Google Chrome > Select End Task

– Downloads
– Do not download or install 3rd party applications without permission from management or assistance from your IT provider.
– This will ensure that both the site and software are legitimate prior to download or installation.
– Unfortunately, many application installers will have other applications “bundled or attached” to the installation. This causes unwanted applications like toolbars, coupon printers and similar, to be installed without permission. Many times there is an option to opt-out of the bundled application installs, however this option is often well hidden.

– Passwords
– Use a strong password containing a combination of lowercase, uppercase, numbers and special characters that are a minimum of 8 characters in length.
– Never use a password that contains identifiable information about you that could be easily guessed by someone you know. For example: “Mary_1976” or “896MarcySt” or “Password1234” or “P@ssw0rd”
– Bizco is a proponent of the website http://correcthorsebatterystaple.net which helps you generate secure passwords.
– Change your password every 90 days.
– Never use the same password for multiple accounts.
– Example: Domain login credentials, banking accounts, personal email, etc. If an attacker has the credentials to access one site or device, they will likely try these elsewhere as well.
– Never store any login credentials or account information (via Excel, Word or Notepad), on your local machine.
– If your machine becomes infected, this information is fair game.

– Social Engineering
– If you receive a phone call from someone posing as “Microsoft”, “Apple” or “Google” etc., do not, under any circumstance, provide any information or give them access to your machine. Hang up immediately! This is becoming more common and unfortunately, many have fallen victim to not only their machines becoming infected, but their wallets being a few hundred dollars lighter. These types of callers will use scare tactics to lure you into providing personal information and gaining access to your machine.
– If you receive a call from anyone other than your primary IT provider (Bizco), offering any type of technical support services, do not under any circumstance, provide any information or give them access to your machine.

For more information call 402-323-4888 or email directsales@Bizco.com

By: James Dedrickson, Remote Engineer, Bizco Technologies

Why you’ll love the new Sharp AQUOS BOARD Interactive Display

Are you looking to make the change from analog to digital? We have the perfect seamless approach for you! There’s no denying the elite style the new Sharp AQUOS BOARD Interactive Display will bring to your office! Keeping your office and facility up to date can be challenging, but our experienced team of Audio Visual Designers and Project Managers are here to help you execute your dream plans!

Why is it the best?
• The interactive display seamlessly integrates with and leverages your existing infrastructure and software investments.
• It works great with your existing video conferencing and AV control systems.
• Directly annotate and save within PowerPoint without having to use or purchase a third party overlay or application.
• Up to 100 participants can view and participate in a presentation while in the same room or remotely through VPN using tablets, smartphones or computers.

With the Sharp AQUOS BOARD Interactive Display, you will have the top capabilities for your presentations. This is much more than your typical interactive white board. The highly responsive touch pens allow several people to write on the same touch screen at the same time, making collaboration a breeze. Partnered with the Sharp Touch Display Link Software, which enables multifaceted wireless communication, the AQUOS BOARD is the perfect tool of technology for you!
Interested in learning more? See the full details on why IT Professionals Love the Sharp AQUOS BOARD Interactive Display here! For more information feel free to call us at 402-323-4800 or email us at sales@Bizco.com.
By: Nate Wagner, Account Manager, Bizco Technologies

Natural disasters are not the main cause of data loss

People often think that it will be a weather related catastrophe that will bring down their network and cause data loss, however, a localized event is much more likely. In 2014, 88 percent of downtime was caused by isolated hardware failures or local power outages, not major destructive events such as fires and floods.

While you may think that you are immune from these issues, it is important to note that many businesses have a hard time recovering from the loss of income associated with a major data loss. In fact, according to the Red Cross, 40 percent of small businesses are so devastated after a major data loss that once they shut down, they never reopen.

My team can help you through a phased exploratory and developmental process to build your BCDR strategy. The outline shown here is a high level overview of our Bizco BCDR process. We look forward to the opportunity to come in and meet with you to discuss in more detail how the Bizco Team can help you protect your investments, employees and company with a BCDR plan tailored to your needs. Our goal at Bizco is to partner with you to evaluate your network and its vulnerabilities and then craft a unique BCDR (Business Continuity / Disaster Recovery) solution. Our preference is to focus on Business Continuity first, so that Disaster Recovery does not occur.

The Bizco BCDR Approach

Phase I–Complete BizAnalysis which would include reviewing all of your current equipment and processes to identify any weaknesses. Answering questions such as: Do you have redundancies in place for power outages? What type of on-going maintenance do you do to keep your network healthy and up and running? How will your employees work and keep the business running if they cannot get into the office?

Phase II–Complete a BizReview. During this meeting we would provide you with an overview of the findings from our analysis and provide solutions and timelines for suggested changes to insure your company is protected.

Phase III–Solution Implementation. After we have determined our plan we would work with you to communicate the integration of the new processes and technologies to your team. It is crucial that the entire organization is briefed on the new processes and how to react when a disaster incident occurs.

For more information call 402-323-4800 or email sales@bizco.com.

By: Brad Osborn, Service Manager, Bizco Technologies

Are your employees trained to avoid cybercrime?

 phishing blog post

The estimated annual cost of cybercrime to the world economy in 2015 was $450 billion dollars. That is a staggering amount in losses. The most concerning aspect is that 90-95% of all successful cyber-attacks begin with a phishing email. It’s been estimated that around 156 million emails are sent each day, 16 million make it through the filters, and 800,000 of them are not only opened, but the phishing links are clicked, and out of those who clicked it is estimated that around 80,000 share compromising information. On top of this, each quarter some 250,000 new phishing URLs are identified.

 Whether it is for legal, audit, educational or security reasons, many organizations have enlisted security awareness training companies to help them reduce the risk of successful phishing attacks. With hundreds of millions of phishing emails being sent each day, it is an overwhelming endeavor on behalf of the defenders. Employees can be an effective line of defense if educated properly, and when data-driven analytics help direct appropriate training to the right audience.

 Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place to effectively gauge the click rate patterns from an employee perspective blind spots can be created. Meaningful phishing assessment metrics should go beyond the click rate, and understand human patterns relative to their job and work environment.

 The adage is true that the security systems have to win every time, the attacker only has to win once.

Contact Bizco today to set up awareness training for you team to avoid phishing attacks. Let us help you conquer cybercrime! Call 402.323.4828 for more information.

Subject Matter Expert Report: Nimble Storage

nimble blog bizco

Is your storage up to par?

By: Joe Heinzle, Senior Architect, Bizco Technologies

Storage demands in the modern business are growing faster than ever. Document imaging, photos, video and records retention are contributing to rapid storage consumption and inadequate storage performance impedes productivity.

What can it do for you?

  • Provides shared storage to leverage your multi-host virtual environment.
  • Predictive use algorithm speeds access to deliver near-SSD performance with low-cost SATA hard disk and make all-SSD systems even faster.
  • Compression and de-duplication technology reduces the storage footprint and reduce data-replication impact on networks.
  • Lowers TCO via upgradable hardware. No need to replace the entire systems as your storage needs grow.
  • InfoSight central management predicts and prevents issues that may lead to downtime. Measured 99.9999% uptime across the installed base.

A Nimble Storage Hybrid-SAN solution delivers high performance at a lower cost than any comparable traditional brute-force solution, even out-pacing solutions using all-SSD or high performance spinning disk to attain performance goals.

Nimble Storage leverages a combination of fast Solid State Disk (SSD) storage, data compression and low-cost SATA spinning disks to provide a hybrid solution that delivers performance comparable to systems using 100% SSD at a lower cost to all-SSD.

Adding more value to your business is 99.9999% uptime, data compression, data deduplication, hardware upgradability and InfoSight online support and management tools.

 

Nimble Storage also meets the needs of the large enterprise with all-SSD solutions and system expansion up to 3.5 petabytes of capacity while still delivering sub-millisecond access times.

 

Let Bizco Technologies’ engineering team assess your environment and recommend a storage solution that will meet your business needs. Contact us today at 402-323-4888, help@bizco.com or visit www.Bizco.com.

Panasonic Announces the NEW FZ-Q2 Semi-Rugged 2-in-1 Tablet

FZ-Q2

Panasonic introduces the FZ-Q2 the all-new 2-in-1 Toughpad, the latest addition to its industry leading Toughbook family. Panasonic, an industry leading manufacturer of mobile computing solutions that are purpose built for the way people work, the FZ-Q2 is purpose built from the inside out to provide the durability that mobile users need and Panasonic is known for.

This semi-rugged 12.5” tablet is the next generation product for the Toughpad FZ-Q1 tablet. Comes with the standard detachable keyboard, 4G connectivity and includes a field-serviceable solid-state drive )SSD) and battery to ensure the device has a long and stable life cycle. Designed for highly mobile field professionals where a consumer-grade device cannot deliver the durability or features needed for light duty field work.

The Q2 includes a shock-absorbing technology, a serviceable-battery, fan-less ridged-magnesium chassis design, three-year warranty and resistance to dust and dirt giving it durability and a low total cost of ownership. The Q2 tablet is the only one in its class with available 4G LTE multi carrier modem with satellite GPS-in. Unlike many customer grade tablets, the Q2 has integrated options for insertable or contactless SmartCard readers, a must have for many government and healthcare users.

“Our entire family of Toughbook products are engineered to meet the real world demands our customers face on a daily basis and in many of these environments, consumer devices simply fall short,” said Brian Rowley, Vice President of Marketing and Product Management, Panasonic System Communications Company of North America.“ With enterprise-grade features like a serviceable battery and 4G LTE connectivity, the Q2 delivers the features that users need and IT and finance operation managers appreciate, ensuring a longer product lifecycle and higher return on mobile computing investments.”

The FZ-Q2 2-in-1 combines advanced performance with a flexible form factor, equipped with the latest 6th Generation Intel Core m5 vPro processor, making it ideal for enterprise deployments. Features like dual band 4G LTE wireless ideal for field service and transportation applications that require reliable connectivity while retail customers can benefit from its rugged durability and desktop cradle solution for hybrid POS systems and back office environments. The FZ-Q2 can be safely sanitized with a disinfectant solution for home health and food service or inspection applications. Additionally, the Q2 is equipped with a unique HDMI-in feature for the cable industry and on-site diagnostics. Flexible form factor combined with true enterprise-grade features make the FZ-Q2 ideal for highly mobile jobs that demand a semi-rugged tablet.

The FZ-Q2 comes with a standard full sized backlit keyboard which is spill-resistant for easy completion of heavy data entry tasks and can easily be detached converting to a lightweight, portable tablet. The keyboard uses a direct (non-wireless) interface with the tablet to ensure reliable connectivity in a wide array of environments.

The Q2 built to withstand the daily wear and tear of any job, both in the office and out in the field. Powered by the latest Windows 10 Pro operating system, can withstand dust, drops and vibrations – the most common sources of damage or failure unlike the many delicately designed consumer tablets. The Q2 includes a field serviceable battery, significantly extending the economic life of the tablet, while consumer tables are not equipped with a replaceable battery, once their lifetime charging capability has been reached they are unusable.

Market Opportunities

The FZ-Q2, 2-in-1 tablet is fiercely positioned to go head-to-head against inadequate consumer tablets and 2-in-1 devices currently being used in the field. While other computer manufacturers frequently change their models, which can require IT departments to manage multiple hardware and software configurations and create more refresh cycles. Panasonic is constantly innovating to maintain a greater consistency among product models and life cycles. The end user will have fewer product repair issues, enterprise grade functionality and lower overall cost of ownership with the Toughpad Q2. The Toughpad FZ-Q2 ideal market opportunities with code enforcement, home healthcare services, auto dealerships, customer facing sales applications, transportation, in-home sales (i.e. home security systems companies) POS retail environments, architects, manufacturers, inspectors, aviation (electronic flight bag) small business applications and many more.

For more information on the new Panasonic Toughpad FZ-Q2 visit Toughonline.com or call 888-2B-TOUGH.