Navigation

X
You've just added this product to the cart:

Zebra Intelligent Cabinets: Harness the Most Efficient Use of Devices and Workers

Posted June 16, 2022
zebra intelligent cabinets

How your business stores enterprise mobile devices has an often unrecognized impact on operational efficiencies. If your device storage solution lacks adequate space, security features or a purposeful design your operations are at risk.

Zebra Intelligent Cabinets offers an adaptable portfolio of end-to-end device storage solutions, software automation, security applications, and ongoing support to maximize the use and productivity of your devices such as mobile computers, mobile printers, tablets and scanners. Zebra Intelligent Cabinets help ensure assets and workflows function in tandem at high performance and optimal security to accelerate progress in warehouse, transportation & logistics, and retail operations.

Zebra-validated cabinets, racks, cradle locks and customized carts are designed and developed with over 15 years of experience to help ensure your assets and workflows function in tandem at high performance and optimal security.

Optimize how your enterprise mobile devices are stored, accessed, tracked, and managed with Zebra Intelligent Cabinets.

Watch Zebra Intelligent Cabinets Video

Zebra Intelligent Cabinets Set Your Team Up for Success

Zebra Technologies is committed to supporting a variety of warehouse needs, now and into the future. Intelligent Cabinets include the following features:

  • Optimized device storage, accessibility and management
  • Consolidated and connected to maximize performance
  • Automated workflows with software-driven management 
  • Protected devices with authorized-only security

Meet the enterprise storage solution that’s a step above the rest. [Download Infographic Sheet]

With functionality and security in mind, Zebra delivers industry-leading products capable of hitting the mark for all warehouse needs. Contact us today to see how you can bring a new efficiency level to your workforce.

PAX POS Cyberattacks: Are Your Payment Terminals Compromised?

Posted November 10, 2021

pax pos cyberattacks payment terminals compromised fbi investigation

First reported by WOKV.com, agents with the FBI and DHS raided the Florida warehouse of PAX Technology. The point of sale technology giant is linked to reports of possible cyberattacks on U.S. and E.U. organizations where the technology is used.

Along with ongoing global computer chip shortages, the timing of the investigation is particularly concerning for retailers and payment processing companies preparing for the holiday season.

FBI Raids PAX, Where POS Devices Are Potentially Compromised

KrebsOnSecurity offered further detail, saying they “heard from a trusted source that the FBI began investigating PAX after a major U.S. payment processor started asking questions about unusual network packets originating from the company’s payment terminals.”

The source revealed that the PAX terminals were being used both as a central location for malicious files (also known as malware “droppers”). This allows payment technology to act as a staging ground for large-scale cyberattacks focused on collecting information such as consumer credit card data.

“FBI and MI5 are conducting an intensive investigation into PAX,” the source said. “A major US payment processor began asking questions about network packets originating from PAX terminals and were not given any good answers.”

pax pos cyberattack payment terminals fbi investigation

Major financial providers (including FIS Worldpay as reported by Bloomberg) have already begun pulling PAX terminals from their payment infrastructure.

FIS Worldpay confirmed that it no longer deploys PAX point-of-sale devices “because it did not receive satisfactory answers from PAX regarding its POS devices connecting to websites not listed in their supplied documentation.”

“While we have no evidence that data running through PAX POS devices has been compromised, we have been working directly with clients to replace those devices with other options at no cost to them and with as little disruption to their business as possible,” FIS Worldpay states. “The spokesperson said fewer than 5% of Worldpay clients currently use PAX point-of-sale devices.”

While specific details about the strange network activity that prompted federal investigators are unknown, the investigation remains active and ongoing.

It’s worth noting that POS terminals and the technology that supports them are often a primary target for malware and criminal attacks.

It is not uncommon for payment terminals to be compromised remotely by malicious software and made to collect and transmit stolen information. Notable point of sale breaches include Heartland Payment Systems (100 million payment cards affected in 2008) as well as the Target and Home Depot thefts of roughly another 100 million credit cards in 2014.

PAX Technology’s Official Response to Cyberattacks

The Shenzhen-based company is quoted in Reuters with the following statement:

“As far as the board is aware … there has neither been any reported cyberattack incidents nor cyber attack complaints, including any breach of security protocols, against PAX products and services anywhere in the world.”

PAX’s statement to the stock exchange in Hong Kong as well as a press release on the company’s blog provide further perspective. Trading of the company’s shares resumed on November 1 after a temporary halt.

At Barcodes, Inc., cybersecurity is our primary concern when we procure and deploy POS technology. We encourage you to contact us if you have any questions or if you’re interested in replacing your PAX technology.

ICYMI: TrueView – Device Management at Your Fingertips

Posted October 13, 2021

Webinar:

Device Management at Your Fingertips

Thursday, October 21st, 12:00 PM – 12:30 PM ET

Presented By:

Don Mech – Director, Platform Product Management, Barcodes Group

Companies of all sizes struggle to maintain visibility over their mobile and other devices. Insights are lacking in the location of assets, their condition and contract status.

Decisions on the right number, type, and utilization of necessary devices are often difficult to make.

The Barcodes TrueView portal puts essential information on assets, tickets, and contracts at your fingertips.

During this webinar’s demonstration, we cover the following:

  • How the TrueView portal provides visibility into your full asset base that Excel cannot
  • How to easily keep an overview of the devices in repair and their status
  • How to maintain repair and support history and utilize asset attributes to improve device management

We hope to see you there! Contact us to schedule your personalized demo of TrueView and learn more about the Barcodes, Inc. approach to asset management.

ICYMI: Enhance IT Security with Mobile Device Management

Posted September 23, 2021

Mobile Device Management Webinar Presented By:

Tim Tassone – Principal Solutions Architect, Barcodes Group

Unmanaged mobile devices are a huge security risk. Mobile Device Management can control remote access to highly sensitive data, provide user authentication and even offer remote data wiping of devices if they become lost or stolen. Whether you are a small, medium or large enterprise, this webinar will help you:

  • Understand the value of Mobile Device Management, a toolset that enables Remote Management
  • Learn how the use of an MDM solution can save an organization $230 per device per year in support costs
  • Select the right MDM solution to best fit your needs

Contact us with any questions regarding mobile device management, or enterprise security in general.

How Modernization is Changing the Face of Public Service

Posted December 1, 2020

When it comes to today’s public sector, citizens are expecting dependable and agile service now more than ever. Concerning the efficiency of modern public services, 53% of citizens believe agencies should reinvest in innovative solutions, especially in those that create unison with the private sector[1]. Because many critical tasks still operate via legacy technologies, modernization is a risk most agencies can’t afford to take. A data breach in government branch agencies can lead to leaked social security numbers, voting affiliations, citizenship status, and other sensitive data beyond payment/ credit card information. Therefore, modernization must be seamless and safe.

Simplifying modernization, Barcodes, Inc. and Zebra Technologies now work alongside the NY OGS to open new opportunities in the public sector with:

  • Facilitated and transparent collaboration
  • Predictive analytics to handle sudden changes
  • Automation of repetitive tasks
  • Reduced errors in reporting, data sharing, and audits
  • Increased flexibility and mobility for deployed field services
  • Dependable government-grade security

Barcodes, Inc. is one of the few authorized partners registered to work with NY OGS. To see this partnership eliminates the long bidding processes for faster deployment, download our infographic.

Design and deploy your modernization strategy with a wide variety of choices.

Partnering with Zebra Technologies, Barcode, Inc. strives to make modernization simple, seamless, and error-free by integrating customized solutions with:

  • Rugged tablets
  • Mobile computers
  • AT&T FirstNet certified connectivity for your handhelds
  • Ultra-rugged scanners
  • Mobile printers
  • Assisted device procurement
  • Software development
  • Barcodes, Inc.’s TrueSupport

To see how you can integrate future-forward technology into your agency without disrupting workflows, explore the full list here.   


[1] Public services that move at the speed of life. Accenture. Sept 27, 2019.

How Zebra Print DNA will redefine operational efficiency

Posted August 17, 2020

Almost half of manufacturers experience downtime as a consequence of faulty printers within their labeling system. One hour of downtime can drain as much as $100,000 in lost productivity alone without factoring in negative customer experiences and wasted employee labor. To uphold maximum operational efficiency, every part of your operation must prioritize visibility, adaptability, and security – including your printer.

Redefining efficiency from the inside out Zebra’s Print DNA brings a wide range of productivity, management, visibility, and development applications dedicated to delivering quality printing performance from run to run.

See how in our video:

Redefining Efficiency in 5 Intelligent Ways:

Powered by Link-OS, Zebra’s Print DNA takes your printing operations a step higher by redefining:

  1. Asset visibility – Visibility tools provide crucial business intelligence to manage your printer fleet via the cloud anywhere at any time.
  2. Operational security – PrintSecure protects your printers from unauthorized access, keeping your data and infrastructure protected.
  3. Streamlined workflows – Tap-to-pair and multiple barcode scanning can help accelerate processing without hindering accuracy rates or device performance.
  4. Power management – Applications such as PowerPrecision provide insight into battery performance while expanding power lifecycle to survive your longest shifts without interruptions
  5. Remote management – Deploy changes and updates seamlessly across multiple locations through remote management tools, easing troubleshooting for continuous workforce productivity

See what makes your rugged Zebra label printers strong from the inside out in our infographic.

You already have a strong printer. Take it a step farther with printing software dedicated to seamless integration and maximized efficiency. Contact Barcodes, Inc. today to learn more.

Top 10 Reasons to Mount Your Payment Device

Posted April 26, 2017

ENS is the world leader in security stand mounts for payment devices. Mount your payment device today and enjoy peace-of-mind knowing that you and your customer’s valuable data have an additional level of physical protection.

1
#1 SECURITY
Mounting your payment device protects it against tampering and theft. Locking stands, custom security hardware, magnetic security features, along with data port covering back plates can all be utilized to protect you and your customer’s valuable data.

2
#2 ADA COMPLIANCE
Stands that tilt up a full 90° make it so much easier for wheel chair customers to access the device. Mounting the stand helps you meet ADA guidelines.
3
#3 PCI COMPLIANCE
Best practices of PCI compliance dictates that a payment device be secure. Securely mounting your payment device on a stand provides a physical barrier against tampering.

4
#4 EXTENDS DEVICE LIFESPAN
Mounting your payment device to a stand increases its life cycle, protects against accidental dropping and reduces tampering.

5

#5 ERGONOMICS & USABILITY
ENS payment terminal stands are designed to enhance the human interface with technology and optimize ergonomics for you and your users. A 180° swivel rotation allows for easy viewing between the customer and the associate

6

#6 PROTECT YOUR INVESTMENT
Glue pad systems allow you to mount to glass, granite or other surfaces without harming the surface. Does it need to move around the counter top and be stowed away at the end of the day? No problem! ENS has a weighted base with a rubber pad.

7

#7 CABLE MANAGEMENT
No more messy cables. Stands come with cable clips and a center-hole base to neatly route and organize the power and data cables.

8

#8 AESTHETICS
Our designs are created with form and function in mind. Low profile stands practically disappear underneath the payment devices while incorporating clean, neat and pleasing designs.

9

#9 REDUCED MAINTENANCE
Install the stand and forget it. No metal on metal contact. Easily field adjustable tension for tilt and swivel means you are in control.

10

#10 CUSTOM SOLUTIONS
Trust ENS to solve your most difficult technology mounting problem. With more than 100 years of combined engineering expertise, our team of experts will work with you through our simple four step process to Discover, Design, Develop and Deliver a solution for you on time and within your budget.

Don’t Let EMV Chargebacks Cut into Your Profits

Posted April 25, 2016

Avoid-EMV-ChargebacksWith EMV in full swing in the U.S., chargebacks have been on the rise – especially for restaurateurs. Following a successful co-hosted webinar with National Restaurant Association on the basics of chargeback management and best practices last month, we discovered a second installment was in high demand.

The webinar took a deeper dive into the rules of EMV and chargebacks and what you can do to avoid them. If you weren’t able to join us for the presentation, we’ve summarized the high points here to help you better understand chargebacks and the liability shift.

Why EMV, Why Now?

Protecting yourself against counterfeit fraud is one of the main benefits to implement EMV because it’s virtually impossible to recreate the chip. The October 1, 2015 shift has caused some serious headaches, but the ultimate goal is to fix the payment ecosystem by heightening card security. There is, however, a glitch—if your equipment isn’t EMV-compatible, then use of a fraudulent EMV card can go undetected.

Continue reading »

Infographic: Point-of-Sale Data Security Pressure Intensifies

Posted September 29, 2015

Lately we have been hearing more and more cases of retailers having their point-of-sale and payment processing systems being compromised putting their customer’s personal information in the wrong hands. Keeping your POS system secure is critical with today’s common use of online and mobile shopping which have opened up new types of security risks.

This infographic sheds some light the new security challenges retailers are facing today and how there is still a lot of room to improve.

posinfor

Infographic: Data Breaches – Is your Business at Risk?

Posted September 4, 2015

The impending EMV Compliance deadline has brought more attention to Point of Sale security in general for all retailers these days. This infographic brings up the key concerns and steps you can take to keep your business and customers safe.

securitypos

Older Posts »