• Detect failing security applications
  • Detect configuration deviations
  • Detect vulnerable OS or applications
  • Report on compliance with regulations and industry standards
  • Make security applications self-healing
  • Enforce standard configurations
  • Remediate vulnerable OS or applications
  • Provide visibility for streamlined patch management workflow
  • Spot suspicious device use or movement
  • Identify missing devices
  • Sense device tampering
  • Identify sensitive data at risk
  • Remotely protect sensitive data files
  • Investigate stolen or suspicious devices
  • Remediate compromised devices
  • Communicate effectively with end users to minimize exposure
  • Avoid breach notifications after incidents
  • Find root cause to prevent future similar events
  • Aid recovery efforts (e.g., ransomware recovery)
  • Check strategic ransomware preparedness
  • Shield SaaS, on-premises, or private cloud resources from intruders and attacks
  • Treat resources equally, regardless of where they are hosted
  • Block lateral movement between applications
  • Conduct continuous real-time risk assessment
  • Limit user exposure to online threats and inappropriate content
  • Allow for complete control, inside and outside the firewall
  • Block automatically phishing and smishing attacks
  • Provide frictionless security via granular policy enforcement at the endpoint
  • Keep hardware inventory always accurate
  • Streamline hardware audits
  • Optimize lease management
  • Avoid multi-platform segmentation
  • Keep software inventory always accurate
  • Streamline software audits
  • Help ensure end user productivity
  • Detect and eradicate shadow IT
  • Identify and eliminate hardware waste
  • Identify and eliminate software waste
  • Validate expected user behavior
  • Analyze usage patterns and provide return on investment
  • Enable remote device provisioning
  • Provide visibility for streamlined patch management workflow
  • Enforce device returns and secure re-allocations
  • Anticipate device issues
  • Enrich helpdesk tools
  • Solve problems efficiently and at scale
  • Improve time-to-resolution
  • Actively improve the employee experience
  • Deliver reliable connectivity, using tunnel and session resilience
  • Conduct diagnostics on device and network
  • Run network performance analytics outside your firewall
  • Enable seamless remote access
  • Optimize audio and video for end users
  • Assure reliable network application access for end users
  • Deliver resilient connections and apps, even in the most turbulent network conditions
  • Identify network connectivity status and issues
  • Gain access to application metrics and geolocation
  • Assess configuration statuses and impact on overall network connectivity health
  • Analyze usage patterns and provide return on investment
  • Track data usage
  • Reduce data backhaul
  • Shift from VPN to ZTNA without costly infrastructure overhaul
  • Analyze network performance to drive more information decisions
  • Conduct root cause analysis of connection problems
  • Minimize downtime by quickly identifying problems
  • Automatically trigger bandwidth and connection diagnostics
  • Visualize ZTNA policy enforcement effectiveness
  • Ensure remote device configuration
  • Enforce device returns and secure re-allocations
  • Streamline remote device decommissioning
  • Assure the health of the end user device
  • Take proactive measure to avoid device failures
  • Assure mission-critical applications are always working as intended
  • Know how many devices are being used
  • Know how many Web apps are being used
  • Monitor overall tech adoption
  • Assure most efficient license utilization
  • Enable seamless remote access
  • Optimize audio and video for end users
  • Assure reliable network application access for end users
  • Deliver resilient connections and apps, even in the most turbulent network conditions
  • Provide mobile-first remote access platform
  • Optimize audio and video for end users
  • Assure reliable network application access for end users
  • Deliver resilient connections and apps, even in the most turbulent network conditions
  • Assure field workers have reliable connectivity
  • Assure proper services fees are applied based on geolocation
  • Identify and resolve failures and outages quickly
  • Enforce network providers’ service level agreements

Charles Blauner

Charles Blauner is an internationally recognized expert independent advisor on Cyber Resiliency, Information Security Risk Management and Data Privacy.

Charles is a Partner and CISO in Residence at Team8 Ventures and a Venture Advisor at the Cyber Mentors Fund. Charles is also the President of Cyber Aegis, a boutique cyber risk management consultancy.

Previously, Charles had a distinguished career working on Information Security for over 30 years, 25 years in Financial Services, including being the Chief Information Security Officer (CISO) at JP Morgan and Deutsche Bank, and most recently the Global Head of Information Security at Citi.

During this time, Charles held numerous industry leadership roles including Chair of the Financial Services Sector Coordinating Council (FSSCC), founding Director of the Financial Services Information Sharing and Analysis Center (FS-ISAC), and the Chair of the OpenGroup’s Security Program.

Charles has worked closely with banking regulators around the world (OCC, FRB, BoE, MAS, and HKMA) to help reduce the risk posed by cyber threats to the financial sector at large.

Charles is a regular conference speaker and has had the honor of appearing in front of US House and Senate committees.

In 2015, Charles was recognized by his peers, winning the Wasserman Award, which recognizes outstanding career achievement and contribution to the Information Systems Audit, Control, Security, Risk Management, and/or Governance professions.

Charles has a M.S. in Computer Science from the University of Southern California (USC) and a B.S. in Computer Science from Rensselaer Polytechnic Institute (RPI).

Arthur W. Coviello, Jr.

Security investor and advisor
Executive Chairman (retired)
RSA, The Security Division of Dell technologies (EMC)

Art Coviello is an active investor and advisor in the security industry, guiding a number of security startups as a private investor and in his roles as a Venture Partner at Rally Ventures (an early stage investor in business technologies), as an adviser to ClearSky Security Fund, and as a Senior Advisor to Blackstone’s Tactical Opportunities Group.

Art Coviello served as Executive Chairman of RSA and Executive Vice President of EMC. Mr. Coviello has been a central figure within the information security industry for more than 25 years. His vision and strategic and financial management as long-time head of RSA helped drive the company’s growth to revenues of over $1 billion in 2014 when he retired. Under his leadership, he built the most respected, vendor agnostic event in cybersecurity, RSA Conference. His expertise and influence have made him a recognized leader in the industry. He is frequently a featured presenter at conferences and forums around the world, and he has played key roles in several national cyber-security initiatives.

Mr. Coviello serves on the Board of Directors at Synchrony Financial, Bugcrowd, Tenable, Capsule8, ZeroNorth, and SecZetta.

Prior to RSA, Mr. Coviello had extensive executive management experience in several technology companies. He started his career as a certified public accountant at Deloitte, Haskins & Sells (Deloitte.)

Mr. Coviello graduated magna cum laude from the University of Massachusetts in 1975 with a BBA, concentration in accounting.

Paul F. Deninger

Paul Deninger is an experienced Board Director, accomplished CEO, recognized expert in strategy and innovation management, and acknowledged thought leader in the B2B technology, venture capital, and private equity communities.

Over the past 30 years, he has advised hundreds of CEOs and boards on shareholder value creation, including how to leverage technology to achieve transformation and growth. He also has deep capital markets experience, having completed over 150 IPO, M&A, and financing transactions with the world’s leading technology companies and top-tier investment firms.

Since 2010, Paul has been a Board Member for Iron Mountain (NYSE: IRM), a $10B market cap company dedicated to protecting and managing information and assets, and a leader in document and media storage. He has served on the Finance, Compensation, CEO Search, and Risk & Safety Committees, as well as a special committee to manage issues related to an outside activist.

In 2018, he was named to the board of Resideo Technologies (NYSE: REZI) - a spin-out of Honeywell (NYSE: HON). Residio has $4.5B in revenue and is a leader in the emerging Connected Home space, with products and solutions in residential comfort, security, and fire safety. In 2019, he was also named to the board of EverQuote, (NASDAQ: EVER), the leading U.S. online marketplace for consumer auto, home and life insurance.

Paul’s additional board experience includes: former Lead Director and Member of the Compensation Committee for Netegrity (NASDAQ: NETE), former Board Member for The Boston Globe, former Member of the Board of Trustees for Match Charter Public School. He is a Member of the Presidential Advisory Council for Berklee College of Music, and former Board Chairman and current Board Member for the Berklee City Music program.

Earlier in his career, Paul served as CEO and Chairman of Broadview from 1996 to 2003 where he grew the business from $50M to $300M and established Broadview as the leading technology M&A advisory firm. In 2003, he led the company’s sale to Jefferies, where he subsequently served eight years as Vice Chairman and spearheaded the firm’s entry into the tech IPO market, achieving a #2 ranking in IPO covers in just four years. Paul currently serves as a senior advisor to Evercore, a highly reputed investment bank, having previously been a Senior Managing Director there since 2011.

Paul has been a keynote speaker at many technology industry events and was a 14-year attendee at the World Economic Forum at Davos, a member of the US Treasury IPO Task Force that led to the 2012 JOBS Act, and a member of the Executive Council of TechNet - a national network of technology CEOs and senior executives.

Paul earned his MBA from Harvard Business School and his BS from Boston College.

Ann S. Johnson

Corporate Vice President, Cybersecurity Solutions Group

Ann Johnson is Corporate Vice President, Cybersecurity Solutions Group for Microsoft. She oversees the team responsible for helping organizations become operationally resilient on their digital transformation journey, and to unlock the security, compliance and identity capabilities of Microsoft’s intelligent cloud and next generation AI. She is a member of the board of advisors for FS-ISAC (The Financial Services Information Sharing and Analysis Center), an advisory board member for EWF (Executive Women’s Forum on Information Security, Risk Management & Privacy), and an advisory board member for HYPR Corp. Ann recently joined the board of advisors for Cybersecurity Ventures. For more about Microsoft’s Cybersecurity Solutions, visit the Microsoft Security Site, or follow Microsoft Security on Twitter at Msft Security Twitter or Msft WDSecurity Twitter.

John Zangardi

John Zangardi is an executive with over three decades of experience as a leader in transforming and implementing information technology, and strengthening business initiatives and partnerships. As the President of Redhorse, John is responsible for streamlining daily operations for efficiency and growth. He is creating a path to center Redhorse as an industry leader in information technology and digital and data services. He also serves on the Board of Directors at Qualys and Symetrica. Previously, John worked at Leidos as a senior vice president responsible for business initiatives and strategic partnerships on key strategic areas such as digital transformation, security products/services, and logistics.

John has a track record of implementing information technology efficiently across his time in government service. His distinguished career includes Chief Information Officer for the Department of Homeland Security, where John led multiple initiatives to implement cybersecurity technology, cloud computing, and data analytics, and identity management and telecommunications. His work for DHS garnered recognition by Federal Computer Week for his work in transforming DHS into, “one of the federal government’s top IT performers.”

Prior to his appointment as CIO of DHS, John was the Acting CIO at the Department of Defense (DoD) – a position he assumed from his role as Principal Deputy Chief Information Officer. During this time, John represented the Department at NATO’s C3 Board. He previously served as the Deputy Assistant Secretary of the Navy for Command, Control, Communications, Computers, Intelligence, Information Operations, and Space, the Department of the Navy Chief Information Officer, and Director of Program Integration on the staff of the Deputy Chief of Naval Operations for Information Warfare. John began his time in government service in the US Navy as a Naval Flight Officer where he served in various staff and command assignments.

A native of Scranton, Pa., he graduated from the University of Scranton. He earned a Master of Science degree from the Naval Postgraduate School and a Doctor of Philosophy degree from George Mason University, where his dissertation topic was the regulation of Top-Level Domain Names.

Absolute Visibility

Serves as your source of truth for device and application health.


Learn more

Absolute Control

Provides you a lifeline to protect at-risk devices and data.


Learn more

Absolute Resilience

Delivers application self-healing and confident risk response.


Learn more

Absolute VPN

Built from ground up for mobility and the modern edge.


Learn more

Absolute ZTNA

Delivers the best user experience for the software-defined perimeter.


Learn more

Insights for Network

Boosts diagnostics and remediation for digital experience monitoring.


Learn more

ISVs

Maximize customer value and gain competitive advantage by ensuring the continuous health and performance of your applications.


Learn more

OEMs

Our reputation is built on trust. It’s the reason why the world’s leading manufacturers — including Lenovo, Dell, Microsoft, and HP — have Absolute embedded in their devices before they leave the factory.


Learn more

MSPs

We can help you give your customers a reliable, powerful, and trusted security solution that’s easy to implement and manage, regardless of organization size.


Learn more

Online Request
Open and track your case through the customer console.

Email
Technical Support: [email protected]

Telephone support
Standard Support: 4:00 pm PT Sunday to 5:00 pm PT Friday
Premium Support: 24/7/365



North America
Language Country Telephone Number
English Canada 1 888 999 9857
USA 1 888 999 9857
Latin America
Language Country Telephone Number
English, Spanish, Portuguese Argentina +54 8003450751
Brazil 0800 892 2078
Chile 123 0020 9234
Colombia +57 800 755 0169
Costa Rica +506 40010390
Mexico 001 800 514 7806
Peru +51 800 78237
Others +00 1 604 629 7064
Europe, the Middle East and Africa
Language Country Telephone Number
English, French, German, Italian, Spanish France 0800 912 909
Germany 0800 186 0408
Italy 800 874 475
Spain 900 812 388
UK 0800 917 5706
Others +44 118 902 2005
Asia Pacific and Japan
Language Country Telephone Number
English Australia 1 800 263 551
India 000 800 650 1666
Japan 005 316 50 505
Malaysia 1 800 806 494
New Zealand 0800 880 039
North China 10800 650 0593
South China 10800 265 2566
South Korea 00798 6517 437
Singapore +65 3 159 0578
Taiwan 00806 651 812
Vietnam 120 651 53
Others +65 3 159 0578

Online Request
Open and track your case through the customer portal.

Email
Technical Support: [email protected].com
Customer Service: [email protected]

Telephone support
Standard Support: 4:00 pm PT Sunday to 5:00 pm PT Friday
Premium Support: 24/7/365



North America    
Toll Free 888-723-2662
Australia    
Toll Free 1-800-763-715
Belgium    
Toll Free 0-800-793-39
France    
Toll Free 0-805-0807-69
Germany    
Toll Free 0-800-180-6742
Netherlands    
Toll Free  0-800-022-9996
United Kingdom    
Toll Free 0-808-189-0985
South Africa    
Toll Free 080-098-2521
International    
Toll Free 001-888-723-2662
Secure Endpoint Agent Secure Endpoint Console Secure Endpoint Language Support
  • Windows 11 (64 bit)
  • Windows 10 (32 & 64-bit)
  • Windows 8.1 (32 & 64-bit)
  • macOS 10.15, 11, 12 and 13 (Intel and Apple M1, M2 based Mac devices)
  • ChromeOS and ChromeOS Flex (requires Google Admin Console)
  • Internet connection
  • Microsoft Edge (Windows)
  • Google Chrome (Windows and Mac)
  • Safari (Mac)
  • English
  • French
  • German
  • Italian
  • Spanish
  • Japanese
  • Korean
  • Portugese
  • Chinese (Traditional and Simplified)
Product Supported Desktop Operating Systems
(and Product Version)
Supported Handheld Operating Systems
(and Product Version)
Language Support
Secure Access Client
  • macOS for ARM (v12.50 and later)
  • macOS 10.14 and later (v11.0 and later)
  • Windows 11 (v12.50 and later)
  • Windows 10 64-bit Pro and Enterprise only (v10.71 and later)
  • Windows 10 32-bit Pro and Enterprise only (v10.71 and later)
  • Windows on ARM (v12.50 and later)
  • Windows 8.1 64-bit (v10.10 to 12.5x)
  • Windows 8.1 32-bit (v10.10 to 12.5x)
  • iPad, iPhone
    iOS 12.1 and later (v12 and later)
  • iPad, iPhone
    iOS 7.1 and later (v10.50 and later)
  • Android 6.0 and later (v10.0 and later)
  • Android for Work (v11.0)
  • Samsung Knox (v11.0)
  • English
  • Japanese
  • French
  • Italian
  • German
  • Spanish
Secure Access Server
  • Windows Server 2019 (v11.70 and later)
  • Windows Server 2016 (v11.04 and later)
  • Windows Server 2012 R2 (v10.10 to v12.0x)
  • Windows Server 2012 (v10.0 to v11.0)
 
  • English
  • Japanese

Secure Endpoint Products

>Secure Access Products

To assist customers in their long-range planning, we are providing advanced notification that we will discontinue Mobility client support for Microsoft Windows 8.1 on January 10, 2023.  

Microsoft previously announced that after January 10, 2023, they will no longer offer technical support, software updates, or security updates for Windows 8.1. While Windows 8.1 will continue to work, it will become progressively less secure. Customers who continue running Windows 8.1 after January of 2023 do so at their own risk. As a reminder, Microsoft’s Mainstream Support program for Windows 8.1 ended in January 2018. 

After November 2022, we will only release new features and fixes for Windows clients running Windows 10 or Windows 11. Customers will be required to upgrade their client to a supported operating system to receive new features and bug fixes.  

Customers who require Windows 8.1 support may continue to run Mobility 12.5x clients. 

Absolute is actively responding to the reported remote code execution vulnerability in the Apache Log4j2 Java library dubbed Log4Shell (or LogJam). We have investigated and taken action for the Absolute Visibility, Control and Resilience products that utilize Log4j2. No other Absolute or NetMotion products are impacted.

Products Not Impacted

All versions of NetMotion Mobility, NetMotion Mobile IQ, and NetMotion Diagnostics, including those recently sold under the names NetMotion Core or NetMotion Complete are not subject to any of these vulnerabilities.

Products Remediated

Absolute’s services in its Canadian, US, and EU Data Centers that deliver the affected Visibility, Control, and Resilience products have been updated to use the latest version (2.17.0) of Log4j2. This version includes fixes for CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105. We have also deployed firewall configurations to prevent these bugs or other similar bugs from being triggered and enhanced our monitoring for these and similar attacks.

We continue to closely monitor the Apache Software Foundation’s response to log4J2 vulnerabilities and will take further steps as needed.

We also realize that supply chains are a critical component in addressing vulnerabilities. Absolute’s operational teams have been monitoring and contacting all 3rd party SaaS vendors we work with and ensuring they address any exposure they might have. 

For additional technical information and further updates, please visit the Absolute Community

Appendix – Overview of CVEs

CVE Absolute’s response
https://nvd.nist.gov/vuln/detail/CVE- 2021-44228 This has been remediated in Absolute’s Visibility, Control and Resilience products
https://nvd.nist.gov/vuln/detail/CVE- 2021-45046 The remediation steps put in place for CVE-2021- 44228 effectively protect Absolute’s Visibility, Control and Resilience products against this attack
https://nvd.nist.gov/vuln/detail/CVE- 2021-45105 The remediation steps put in place for CVE-2021- 44228 effectively protect Absolute’s Visibility, Control and Resilience products against this attack
https://nvd.nist.gov/vuln/detail/CVE-2021-4104 Absolute’s Visibility, Control and Resilience products are not vulnerable to this issue
 

April 22,2021: To assist customers in their long-range planning, NetMotion Software is providing advanced notification of our plan to discontinue development for all clients supporting Microsoft Windows version 8.1, Apple iOS version 12, and Apple macOS version 10.14. After April 1, 2022, we will no longer provide new features or patches for clients running on these platforms. 

Technical support will continue to be available to all customers with current maintenance agreements for all versions of our products running on Windows 8.1, iOS 12 and macOS 10.14 through the end-of-life of the applicable NetMotion product version.

For further information or if you need to speak with our sales and technical support representatives, visit our website at www.netmotionsoftware.com or call (206) 691-5555.

Summary:

On November 19, 2020, NetMotion alerted customers to security vulnerabilities in the Mobility web server and released updates for Mobility v11.x and v12.x to address them.

The CVSS 3.1 base score for these vulnerabilities is 8.1 (High)

The vulnerabilities were fixed in versions Mobility v11.73 and v12.02, which were released on November 19, 2020. Customers should upgrade immediately to these or later versions. 

Download the updated versions of Mobility servers from the NetMotion customer portal, or contact support for assistance. Consult the Mobility v11.73 and v12.02 or later documentation for guidance on securely configuring your Mobility deployment. 

In addition, customers should verify that their Mobility servers are behind a commercial firewall and that only the VPN port is exposed to untrusted networks. The default port for the VPN is UDP 5008.  If you have changed the default VPN port, ensure that only the VPN port is exposed.  

Details

Prior to Mobility v11.73 and v12.02, attackers with access to the Mobility web server, which hosts the Mobility management console and some inter-server communications processes, could exploit Java deserialization vulnerabilities. Successful exploitation results in remote code execution with system privileges without prior authentication. Customers who have followed NetMotion’s recommendations for secure deployment are only vulnerable to this attack from inside their protected network where the Mobility web server is deployed. 

Mobility v11.73 and v12.02 fixed these vulnerabilities and mitigated future exploitation of this class of attack by implementing a safe Java object reader and cryptographic validation of input prior to deserialization where appropriate.

NetMotion thanks SSD Disclosure for their professionalism in bringing these vulnerabilities to our attention, working with us under the principles of responsible disclosure, and ensuring that our customers had an opportunity to update their systems prior to releasing any details.

For more details on these vulnerabilities, visit SSD Disclosure. https://ssd-disclosure.com/ssd-advisory-netmotion-mobility-server-multiple-deserialization-of-untrusted-data-lead-to-rce/

CVE-2021-26912

CVE-2021-26913

CVE-2021-26914

CVE-2021-26915

CVSS 3.1 Vector String: 

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

NetMotion Software is providing customers with advance notice of the end of life (EOL) for the following:

  • NetMotion Mobility v10.x servers and clients
  • NetMotion Mobile IQ v1.x server
  • NetMotion Diagnostics v4.x 
  • NetMotion Mobility Analytics module

Customers running Mobility v10.x or Mobile IQ v1.x should plan to migrate to the latest versions. We will no longer provide support for Mobility v10.x or Mobile IQ v1.x after September 1, 2021.

Customers running NetMotion Diagnostics should contact their account manager for assistance migrating to the new NetMotion platform, which includes Diagnostics functionality. We will no longer support the Diagnostics product after September 1, 2021.  

Analytics Module functionality (alerting, data storage, and data visualization) is part of the new NetMotion platform. Customers running the Mobility v11.x Analytics module will receive operational and configuration support for the service life of Mobility 11, but we will not provide software updates or patches for the Mobility Analytics module after September 1, 2021. 

The Microsoft Windows 10 ‘Spring Update’ is expected to adversely impact the Mobility Single Sign-on (SSO) feature for Windows 10 clients. In anticipation of the Windows 10 Spring Update, NetMotion is releasing the Mobility 11.71 Windows client to ensure that SSO works properly after applying the Windows 10 Spring Update.

NetMotion recommends that administrators test and deploy the Mobility 11.71 client to their Windows 10 systems prior to installing the Windows 10 Spring Update to ensure that SSO continues to work as expected after the Spring Update is installed.

On January 28, 2020 Apple released iOS update 13.3.1. New restrictions introduced in the update adversely affect the biometric support introduced in Mobility version 11.50. NetMotion is releasing Mobility 11.72 for iOS—disabling biometric support as a temporary fix to prevent users from experiencing connectivity problems until Apple resolves the issue or a workaround can be implemented. Note: 11.72 for iOS is narrowly targeted at iOS biometric support. It does not change VPN authentication.

As an administrator, you have two options depending on whether you want to upgrade to the latest version of iOS, or if you want to maintain biometric support.

  • If you want to continue to use iOS biometrics on your clients, you must not upgrade these devices to iOS 13.3.1. Additionally, you must not install the Mobility 11.72 iOS client, which disables support for iOS biometrics to prevent connectivity problems.
  • If you must upgrade your devices to iOS 13.3.1, or you cannot control how users upgrade their devices, then NetMotion recommends that you disable the Mobility setting “Authentication – Biometrics” and install the Mobility 11.72 iOS client prior to upgrading to iOS 13.3.1.

Users with Mobility devices already running iOS 13.3.1 that are also configured for biometrics (Touch ID or Face ID) via the Mobility setting “Authentication – Biometrics” may receive a notice that “Biometric authentication is required for connection [Reason 150]”; in this case the client will not connect to the Mobility server. The only way to connect after experiencing this error is to do one of the following

  • Upgrade the client to Mobility 11.72
  • Change the global client setting  “Authentication – Biometrics” in the Mobility console (Configure > Client Settings) to “Do not use biometrics” and create a new VPN Profile on the client, either in the Mobility client interface or by pushing a new profile to a client using a Mobile Device Management (MDM) system. 

On January 14, 2020 Microsoft and the NSA released information regarding vulnerabilities in Microsoft cryptographic libraries that are part of Windows 10, Windows Server 2016, and Windows Server 2019.

In the advisory, the NSA describes how cryptographic libraries in Windows operating systems could be fooled into believing that cryptographically signed data is genuine when it is not. In particular, the NSA called out “HTTPS connections, signed files and emails, and signed executable code” as possible vectors for attack. These vulnerabilities have been patched by Microsoft in the January 14, 2020 Security Update.  The NSA and Microsoft strongly recommend that administrators of vulnerable systems rapidly test and deploy the January 14 patches.

NetMotion products are not directly affected by these vulnerabilities. NetMotion has tested the Microsoft security updates on the affected Windows operating systems and found no compatibility issues. We strongly encourage administrators of NetMotion products to test and deploy the latest Microsoft security updates to all systems running on Windows 10, Windows Server 2016 and Windows Server 2019.

To assist customers in their long-range planning, NetMotion Software is providing advanced notification that we will discontinue support for Microsoft Windows 7 on January 14, 2020. 

Microsoft previously announced that after January 14, 2020, they will no longer offer technical support, software updates, or security updates for Windows 7. While Windows 7 will continue to work, it will become progressively less secure. Customers who continue using Windows 7 after January of 2020 do so at their own risk. As a reminder, Microsoft’s Mainstream Support program for Windows 7 ended in January 2015.

Beginning in January 2020, NetMotion will only release new features and fixes for Windows clients running Windows 8.1 or Windows 10. Customers will be required to upgrade their client to a supported operating system to receive new features and bug fixes. 

NetMotion currently supports Windows 7 clients on Mobility version 10.0 through version 11.7x. 

To assist customers in their long-range planning, NetMotion Software is providing advanced notification of our plan to discontinue development for Microsoft Windows Server 2012 R2 for Mobility and Diagnostics.

To assist customers in their long-range planning, NetMotion Software is providing advanced notification of our plan to discontinue development for Microsoft Windows Server 2012 R2 for Mobility and Diagnostics.

Technical support will continue to be available to all customers under maintenance for all versions of our products running on Server 2012 R2 through the end-of-life of that version (typically three years after the release date).

For further information or if you need to speak with our sales and technical support representatives, visit our website at www.netmotionsoftware.com or call (206) 691-5555.

On systems running macOS 10.14.4, Mobility clients can terminate and restart when roaming between networks (for example: wired to wireless network, different wireless networks, LAN to WAN, and so on). The Mobility client mitigates this by automatically reconnecting (if configured), but you may notice a service interruption while roaming. This issue does not occur on macOS 10.14.3 and earlier and is fixed in macOS 10.15.x (Catalina). Please contact support for more information.

Upgrading to the Windows 10 Fall 2018 release requires that you also upgrade to the Mobility v11.43 client. Microsoft is releasing their Fall update to Windows 10 (v1809). The Mobility v11.43 client for Windows fixes compatibility issues with the Windows 10 network location awareness (NLA) feature in Windows 10 v1809. Without the updated Mobility client, any application that uses this feature will malfunction, including the Edge browser and many Windows system apps. Windows 10 devices running Microsoft’s fall release must install Mobility v11.43 to avoid these issues. See Known and Resolved Issues for details.

Summary: As is true of many other software companies, NetMotion has discovered all current versions of the Mobility client are incompatible with some upcoming updates to Windows. Though not part of the initial Spectre and Meltdown updates, when these Windows updates are applied, systems running any Mobility client for Windows prior to 11.32 will not operate as expected. You MUST upgrade to Mobility v11.32 before applying them. Do not delay.

Advisory: Current versions of Mobility are fully compatible with the initial round of Microsoft’s Spectre and Meltdown updates. We expect that Microsoft will release more patches addressing these vulnerabilities; we will keep you informed as to whether they will affect your NetMotion deployment. In the wake of the initial round of patches, we learned that Microsoft’s Windows 10 Spring release is incompatible with all current versions of the Mobility client. In the past, the Spring release has been available in the March timeframe but with the current situation involving Spectre and Meltdown, we cannot be sure these releases will not happen sooner. We expect the updates to Windows 8 and 7 will also be incompatible. We are releasing v11.32 clients for all Windows platforms to address the incompatibility.

If you apply the upcoming Windows update, systems running any Mobility client for Windows prior to 11.32 will not operate as expected. Because we don’t know precisely when Microsoft will release the updates, you must upgrade your Windows systems to Mobility v11.32 as soon as possible. Do not delay.

  • NetMotion customers with current maintenance or subscription contracts can download the updated clients from our software download portal.
  • If you are running Mobility 10.51 or greater on both client and server, you can upgrade your clients hands free with our easy to use over-the-air update feature. Click here to learn more.

There is a known issue where authentication fails on Microsoft’s NPS RADIUS server after installing patch KB4034681, KB4025335 or KB4034663. Please contact your NetMotion account manager for additional information.  

After June 30, 2017, Diagnostics servers prior to v4.10 may not correctly display coverage maps, device maps, and client report mini-maps. Earlier Diagnostics server versions will continue to collect and store location data and display reports, but due to changes with Microsoft Bing Maps, maps may not display properly after June 30, 2017.

If you encounter problems where maps do not display after that date, upgrade to Diagnostics v4.10. Technical Support can assist customers who want to upgrade their Diagnostics systems. For assistance planning your upgrade, or for any further questions, please contact us.

After December 31, 2017, NetMotion Software will no longer provide support for Diagnostics v2.x servers and clients. Customers running Diagnostics 2.x systems should upgrade to Diagnostics v4.10 or later. For a current list of supported operating systems and versions, see the Supported Operating Systems page.  

Effective March 2017, NetMotion Software has stopped developing and testing its software products on the following platforms:

  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Server 2012 (Windows Server 2012 R2 continues to be supported)
  • Apple iOS v9.x
  • Google Android v4.0 through 4.3

NetMotion products that support these operating systems continue to be supported until the product’s published end-of-life, but maintenance releases, feature releases, and major versions of NetMotion Software will not support them.

  • Customers with a current maintenance agreement will continue to receive full support for NetMotion products until the product version they are running has reached end-of-life.
  • We encourage customers running our solutions on any of these operating systems to upgrade.
  • Technical Support can assist customers who want to upgrade to a newer, supported operating system. For assistance planning your migration, or for any further questions, please contact us.

Mobility 10.72 for iPhone and iPad is supported on both iOS 9 and 10. Administrators should upgrade to Mobility 10.72 before October 10, 2016, as this is when NetMotion plans to release Mobility 11 for iPhone and iPad, which supports only iOS 10 and later; most upgrades from Mobility 10.72 to Mobility 11 are expected to be trouble-free.

Administrators should be aware of important issues surrounding licensing, certificate handling, and support for iOS 9 that may arise with the release of Mobility 11, and take appropriate steps to prepare for the transition. Full details of the issues and procedures for managing the upgrade process are described here.

Financial Services