Why Chess Devices?
Gartner predict that by 2020, 30% of business devices will be purchased through an opex finance model. The rise of the digital workplace is forcing a renewed interest in modernising business devices that are thinner, lighter, more secure and with new levels of performance and connectivity.
If It Appreciates, Buy It — If It Depreciates, Lease It
J Paul Getty’s famous advice is as compelling for laptops and mobiles as is it for cars and photocopiers. A rapidly evolving digital workplace is placing unprecedented demands on IT infrastructure, and it’s the agility of a flexible, leasing model which is overcoming the challenges and barriers faced when procuring IT equipment.
There are growing reasons to adopt a leasing model. With the option to refresh, return or retain devices at the end of the lease, it’s rapidly becoming the purchasing model of choice. Sourcing the right technology today, at the lowest price, ensures you and your people remain adaptable and agile for the changes coming tomorrow.
Industry Leading Mobiles, Tablets and Laptops
The traditional trade-off between cost and functionality is no longer the key factor in procuring business critical equipment for your people. Leasing makes it easier to provide the tech your business needs for the next two years, rather than the equipment dictated by your budget at a single point in time.
Choose Your Device
Phones: Choose from the best selling devices, including the iPhone XR, iPhone XS, iPhone XS Max and Galaxy S10 ranges.
Tablets: Combining portability and functionality, the new generation of tablets available run Windows 10 and are successfully challenging the popularity of more traditional laptops.
Laptops: Take advantage of HP’s monthly promotions, or opt for one of Microsoft’s popular Surface devices. Care Packs, offering extended service agreements, are available to help protect business continuity, and selected peripherals are also included in the range of lease items.
How It Works — Refresh, Retain, Return
After two years you’ll be able to upgrade to a new device. There’s no renewal fee, no end of lease fee, and you’ll have a choice of the latest models and devices. Your original device will be erased securely (see below).
Want to upgrade before the lease is up? No problem, simply give us a call. Termination fees may apply, and these can be rolled into your next lease agreement.)
At the end of the lease term, you may want to opt to keep your device, at a fair market value.
You’ll be contacted in good time, to ensure any data is securely migrated off the existing device. Your device will then be securely erased in accordance with WEEE regulations, and a certificate issued. There’s no end of lease fee to pay.
- Do more with less
- Planned, regular monthly fee
- No upfront costs, or major capital outlay; removing capex liability — pay out of monthly cashflow and leave your reserves untouched
Device and Network Freedom
- Choose from a range of popular devices
- Upgrade effortlessly after 24 (36 month lease agreements also available)
- Option to upgrade after just six months (fees apply)
Home Working - Can You Collaborate?
#3 Connectivity and Support at Home
Working from home is now an everyday reality for many of our customers and network issues can be a challenge
As schools have now closed and other businesses have also sent people home, many home workers are struggling with ensuring they can run their real-time work apps such as Voice and Video conferencing without interference from other people, who are also working from home or using other online content
A Hackers Guide to Remote Working
Remote working for a hacker is brilliant, and not in the sense that they can work from home in a dark room wearing a hoodie. But because remote working means that a business is intentionally giving a path into the internal network that could potentially be accessed by anyone on the internet. This blog post covers some of the things that we have encountered across the team over the years.
#2 Your Cyber Security
If you are allowing devices to connect from people’s houses – it's possible that these networks have already been compromised by hackers or will be in the future. Implementing two-factor authentication, where another device like a mobile phone is used for extra security is the most important security measure that can be applied to systems.
#1 Your Telephony
As the Covid-19 situation looks set to escalate, there's a lot to think about to keep your business running. Last week we shared the Top 10 areas we've focused on to ensure our own business continuity.
From today, we'll be going into these in more detail, setting out what we've learnt and offering specific guidance and support. Let's start with telephony.
About six months ago, with the slow death rattles of the exquisite Empire C2 drawing near, not going to lie I'm still in mourning – that and python2, I was on the hunt for a new platform to sink my teeth into. While playing around with various frameworks on offer such as SilentTrinity, Faction, Merlin (all of which have their positives), I started looking at Cobbr's Covenant framework....