{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"ru":"Конфигуратор","_type":"localeString","en":"Сonfigurator"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"ru":"ROI-калькулятор","_type":"localeString","en":"ROI-calculator"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"_type":"localeString","en":"Using","ru":"Используют"},"show-more-button":{"ru":"Показать еще","_type":"localeString","en":"Show more"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика.","_type":"localeString"},"details":{"en":"Details","ru":"Детальнее","_type":"localeString"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"en":"Product features","ru":"Особенности продукта","_type":"localeString"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"_type":"localeString","en":"Values","ru":"Ценности"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"ru":"Тестирование","_type":"localeString","en":"Testing"},"compare":{"_type":"localeString","en":"Compare with competitors","ru":"Сравнить с конкурентами"},"characteristics":{"_type":"localeString","en":" Characteristics","ru":"Характеристики"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"en":"Deal protection","ru":"Защита сделки","_type":"localeString"},"average-deal":{"_type":"localeString","en":"Average deal size","ru":"Средний размер сделки"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"en":"Login","ru":"Войти","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"to-know-more":{"_type":"localeString","en":"To know more","ru":"Чтобы узнать больше"},"scheme":{"_type":"localeString","en":" Scheme of work","ru":"Схема работы"},"competitive-products":{"_type":"localeString","en":" Competitive products","ru":"Конкурентные продукты"},"implementations-with-product":{"en":"Deployments with this product","ru":"Внедрения с этим продуктом","_type":"localeString"},"user-features":{"en":"User features","ru":"Особенности пользователей","_type":"localeString"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"en":"Organizational Features","ru":"Организационные особенности","_type":"localeString"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"_type":"localeString","en":" Selling stories","ru":"Продающие истории"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"_type":"localeString","en":"Calculate Product ROI","ru":"Рассчитать ROI продукта"},"complementary-categories":{"ru":"Схожие категории","_type":"localeString","en":"Complementary Categories"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"configurator-content":{"en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта","_type":"localeString"},"configurator-link":{"ru":"тут","_type":"localeString","en":"here"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"_type":"localeString","en":"select product for presentation","ru":"выбрать продукт для презентации"},"auth-message":{"_type":"localeString","en":"You have to register or login.","ru":"Вам нужно зарегистрироваться или войти."},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Подтверждено производителем"},"event-schedule":{"_type":"localeString","en":"Events schedule","ru":"Расписание событий"},"scheduling-tip":{"en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString"},"register-to-schedule":{"_type":"localeString","en":"To register for the event please log in or register on the site.","ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"en":" Compare with competitive","ru":"Сравнить с конкурентными","_type":"localeString"},"avg-deal-closing-unit":{"_type":"localeString","en":"months","ru":"месяцев"},"under-construction":{"en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString"},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"ru":"Детали","_type":"localeString","en":"See Details"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"en":"All rights reserved","de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"en":"Name","ru":"Имя","_type":"localeString"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"en":"Subscribe","ru":"Подписаться","_type":"localeString"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле","_type":"localeString"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"_type":"localeString","en":"ROI4CIO: Product","ru":"ROI4CIO: Продукт"},"meta":[{"name":"og:type","content":"website"},{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Конкретный продукт","_type":"localeString","en":"Example product"}},{"name":"og:description","translations":{"en":"Description for one product","ru":"Описание для конкретного продукта","_type":"localeString"}},{"name":"title","translations":{"en":"Product","ru":"Продукт","_type":"localeString"}},{"name":"description","translations":{"ru":"Описание продукта","_type":"localeString","en":"Product description"}},{"name":"keywords","translations":{"ru":"Ключевые слова продукта","_type":"localeString","en":"Product keywords"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"omanalyticsr":{"id":1080,"logoURL":"https://old.roi4cio.com/fileadmin/content/omAnalytics_03.png","logo":true,"scheme":false,"title":"omAnalytics®","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"omanalyticsr","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p>Возможности omAnalytics</p>\r\n<p>Глубокий анализ разговоров клиентов с DiaManT® и живыми агентами, чтобы обеспечить понимание «что» именно говорят клиенты. Просмотрите концептуальное отображение понятий и слов, которые говорят клиенты. Щелкнув ссылку, можно получить развернутую картинку , что сказал клиент.</p>\r\n<ul>\r\n<li>Обнаружение частых терминов, фраз и концепций</li>\r\n<li>Поиск разговоров для конкретных продуктов и действий</li>\r\n<li>Быстрое выявление и принятие мер по коренным причинам</li>\r\n<li>Найти любую комбинацию метаданных, слов и фраз</li>\r\n</ul>","shortDescription":"Визуализируйте Big Data, созданные DiaManT®, чтобы анализировать разговоры клиентов с виртуальным агентом, а также с живыми агентами","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"omAnalytics®","keywords":"слов, клиенты, говорят, фраз, разговоров, конкретных, клиент, сказал","description":"<p>Возможности omAnalytics</p>\r\n<p>Глубокий анализ разговоров клиентов с DiaManT® и живыми агентами, чтобы обеспечить понимание «что» именно говорят клиенты. Просмотрите концептуальное отображение понятий и слов, которые говорят клиенты. ","og:title":"omAnalytics®","og:description":"<p>Возможности omAnalytics</p>\r\n<p>Глубокий анализ разговоров клиентов с DiaManT® и живыми агентами, чтобы обеспечить понимание «что» именно говорят клиенты. Просмотрите концептуальное отображение понятий и слов, которые говорят клиенты. ","og:image":"https://old.roi4cio.com/fileadmin/content/omAnalytics_03.png"},"eventUrl":"","translationId":7045,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"},{"id":70,"title":"OLAP - online analytical processing","alias":"olap-online-analytical-processing","description":"<span style=\"font-weight: bold; \">OLAP (online analytical processing)</span> is a computing method that enables users to easily and selectively extract and query data in order to analyze it from different points of view. OLAP business intelligence queries often aid in trends analysis, financial reporting, sales forecasting, budgeting and other planning purposes.\r\nTo facilitate this kind of analysis, data is collected from multiple data sources and stored in data warehouses then cleansed and organized into <span style=\"font-weight: bold; \">data cubes.</span> Each OLAP cube contains data categorized by dimensions (such as customers, geographic sales region and time period) derived by dimensional tables in the data warehouses. Dimensions are then populated by members (such as customer names, countries and months) that are organized hierarchically.\r\nAnalysts can then perform five types of online analytical processing system operations against these multidimensional databases: \r\n<ol><li><span style=\"font-weight: bold; \">Roll-up.</span> Also known as consolidation, or drill-up, this operation summarizes the data along the dimension.</li><li><span style=\"font-weight: bold; \">Drill-down.</span> This allows analysts to navigate deeper among the dimensions of data, for example drilling down from "time period" to "years" and "months" to chart sales growth for a product.</li><li><span style=\"font-weight: bold; \">Slice. </span>This enables an analyst to take one level of information for display</li><li><span style=\"font-weight: bold; \">Dice. </span>This allows an analyst to select data from multiple dimensions to analyze</li><li><span style=\"font-weight: bold; \">Pivot.</span> Analysts can gain a new view of data by rotating the data axes of the cube.</li></ol>\r\nOLAP software then locates the intersection of dimensions, such as all products sold in the Eastern region above a certain price during a certain time period, and displays them. The result is the "measure"; each OLAP cube has at least one to perhaps hundreds of measures, which are derived from information stored in fact tables in the data warehouse.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Types of OLAP: </span></p>\r\n<ul><li><span style=\"font-weight: bold;\">Relational online analytical processing (ROLAP):</span> ROLAP is an extended RDBMS along with multidimensional data mapping to perform the standard relational operation.</li><li><span style=\"font-weight: bold;\">Multidimensional OLAP (MOLAP):</span> MOLAP Implementes operation in multidimensional data.</li><li><span style=\"font-weight: bold;\">Hybrid OnlineAnalytical Processing (HOLAP):</span> In HOLAP approach the aggregated totals are stored in a multidimensional database while the detailed data is stored in the relational database. This offers both data efficiency of the ROLAP model and the performance of the MOLAP model.</li><li><span style=\"font-weight: bold;\">Desktop OLAP (DOLAP):</span> In Desktop OLAP system, a user downloads a part of the data from the database locally, or on their desktop and analyze it. DOLAP is relatively cheaper to deploy as it offers very few functionalities compares to other OLAP tools.</li><li><span style=\"font-weight: bold;\">Web based OLAP (WOLAP):</span> Web OLAP which is OLAP system accessible via the web browser. WOLAP is a three-tiered architecture. It consists of three components: client, middleware, and a database server.</li><li><span style=\"font-weight: bold;\">Mobile OLAP:</span> Mobile OLAP process helps users to access and analyze OLAP data using their mobile devices</li><li><span style=\"font-weight: bold;\">Spatial OLAP:</span> SOLAP is created to facilitate management of both spatial and non-spatial data in a Geographic Information system (GIS) </li></ul>","materialsDescription":"<h1 class=\"align-center\">Implementing an OLAP Solution</h1>\r\nImplementation of OLAP depends not only on the type of software, but also on underlying data sources and the intended business objective(s). Each industry or business area is specific and requires some degree of customized modeling to create multidimensional “cubes” for data loading and reporting building, at minimum. An OLAP program might be intended for dynamic reporting for finance professionals, with source data originating in an ERP system. Or a solution might address a medical institution’s activities as concerns patient analysis. All of which is to say that customers need to have clear objectives in mind for an intended solution, and start to consider product selection on that basis. Another factor to consider in an OLAP implementation is the delivery to end users: does the initial user base want to adopt a new front end, or is there a preference for utilizing a dashboard? Or perhaps users are better served by a dynamic spreadsheet “delivery” system to achieve, for example, a collaborative budgeting and forecasting solution.\r\n<h1 class=\"align-center\">Advantages and Disadvantages of OLAP</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Advantages</span></p>\r\n<ul><li>OLAP is a platform for all type of business includes planning, budgeting, reporting, and analysis.</li><li>Information and calculations are consistent in an OLAP cube. This is a crucial benefit.</li><li>Quickly create and analyze "What if" scenarios</li><li>Easily search OLAP database for broad or specific terms.</li><li>OLAP provides the building blocks for business modeling tools, Data mining tools, performance reporting tools.</li><li>Allows users to do slice and dice cube data all by various dimensions, measures, and filters.</li><li>It is good for analyzing time series.</li><li>Finding some clusters and outliers is easy with OLAP.</li><li> It is a powerful visualization online analytical process system which provides faster response times</li></ul>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Disadvantages</span></p>\r\n<ul><li>OLAP requires organizing data into a star or snowflake schema. These schemas are complicated to implement and administer.</li><li>You cannot have large number of dimensions in a single OLAP cube.</li><li>Transactional data cannot be accessed with OLAP system.</li><li>Any modification in an OLAP cube needs a full update of the cube. This is a time-consuming process.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/OLAP_-__online_analytical_processing.png"},{"id":76,"title":"CPM - Corporate Performance Management","alias":"cpm-corporate-performance-management","description":"<span style=\"font-weight: bold; \">Corporate performance management (CPM)</span> is an umbrella term that describes the methodologies, metrics, processes and systems used to monitor and manage the business performance of an enterprise. Applications that enable CPM translate strategically focused information to operational plans and send aggregated results. These applications are also integrated into many elements of the planning and control cycle, or they address BAM or customer relationship optimization needs.\r\nCPM must be supported by a suite of analytical applications that provide the functionality to support these processes, methodologies and metrics.\r\n A CPM system is software that monitors and manages an organization's performance, according to key performance indicators. These can be revenue, return on investment, or other corporate strategic goals, such as increasing operational efficiency or improving corporate strategy.\r\nCorporate performance management system supports financial budgeting, planning and forecasting, and help leaders manage strategy and track the company’s financial health against goals. Corporate performance management tools are commonly used by the finance department, but are increasingly designed to be used across the enterprise. All in all, financial corporate performance management helps CFOs and other leaders maintain a clear picture of organizational performance.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">CPM Software Comparison</span></p>\r\nTo compare different CPM tools, you might want to consider evaluating options based on these factors:\r\n<span style=\"font-weight: bold; \">Finance vs Strategy:</span> Do you care more about strategic planning or financials (such as consolidation and close, reporting, etc)? Financial corporate performance management products rarely do both of these well, so depending on which is your priority, compare tools based on both capabilities. Look at feature ratings for budgeting, planning and forecasting, versus consolidation and close and reporting.\r\n<span style=\"font-weight: bold; \">Deployment type:</span> Corporate performance management solutions may be cloud-based, on-premise, or offer both deployment types.\r\n<span style=\"font-weight: bold; \">Usability:</span> Ease of use is an important factor, even more so if your use of the CPM software will extend beyond the Finance team. Look for comments about usability in pros & cons sections of reviews, and compare how the products rate for usability.\r\n<span style=\"font-weight: bold; \">Reporting:</span> Corporate performance management software is very centered on reporting and the ability to build custom reports. Reviewers often comment on the quality of reporting, and are asked to rate products based on reporting features.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Why is CPM important and who is CPM important for?</h1>\r\nRecent studies have shown that strategy execution is the number one area of focus for senior executives today and CPM performance management is a way to help ensure your strategies get executed. By integrating organizational goals, metrics, and projects, your company is aligned around strategic priorities and can focus on the key drivers of the business.\r\nCPM is important for every company, but especially those looking to:\r\n<ul><li>Remodel their budget</li><li>Reduce costs</li><li>Better align KPIs</li><li>Upgrade their organizational strategy</li><li>Improve the financial planning process<span style=\"font-weight: bold; \"></span></li></ul>\r\n<h1 class=\"align-center\">Importance of Corporate Performance Management Software</h1>\r\nIn the era of business management intelligence, it’s important that corporations embrace processes automation. Here are some of the benefits of adopting an enterprise and corporate performance management solution.\r\n<span style=\"font-weight: bold;\">1. Real-time feedback.</span> Performance management software has smart dashboards which contain every measurable metric a management team may need to use in its decision-making. However, the detail is not in the variety. It’s in the ability to read and use data as changes happen in real-time across all parts of the organization. \r\n<span style=\"font-weight: bold;\">2. Data consolidation for easy management.</span> The tools have the intelligence to gather, group, and combine data from multiple sources, be it departments, spreadsheets, or even companies. \r\n<span style=\"font-weight: bold;\">3. Provide ease of risk management.</span> One significant advantage of CPM is the integration of tools like what-if models. For instance, the model empowers managers to mitigate risks and make informed decisions based on the simulation of the best-worst case scenarios. \r\n<span style=\"font-weight: bold;\">4. Provide simple data feedback and access.</span> Performance management tools enable managers to have ease of access to information while still fostering accuracy and quality. \r\n<span style=\"font-weight: bold;\">5. Ease of collaboration.</span> CPM tools are not only locally integrated but also cloud connected to allows all users to stay in sync across all departments.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CPM_-_Corporate_Performance_Management.png"},{"id":152,"title":"Contact Center","alias":"contact-center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Contact_Center1.png"},{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"}],"characteristics":[],"concurentProducts":[{"id":5123,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Mobilnyi_terminal_VRT800.PNG","logo":true,"scheme":false,"title":"Мобильный терминал ВРТ800","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"mobilnyi-terminal-vrt800","companyTitle":"BANCOMZVJAZOK","companyTypes":["supplier","vendor"],"companyId":7969,"companyAlias":"bankomsvjaz","description":" Мобильный терминал К.BPT800 — мобильное решение для регистрации и контроля лиц, пересекающих контрольно-пропускные пункты. Обеспечивает качественную и быструю фиксацию биометрических данных.<br /><br /><span style=\"font-weight: bold;\">Функции</span><br />\r\n<ul><li>Автоматическое считывание с машиносчитываемой зоны (MRZ) и чипов электронных документов (RFID)</li></ul>\r\n<ul><li>Распознавание текстовых и биометрических данных (ICAO Document 9303)</li></ul>\r\n<ul><li>Сканирование отпечатков пальцев (FBI)</li></ul>\r\n<ul><li>Проверка соответствия и достоверности документов по базам данных</li></ul>\r\n<ul><li>Поддержка возможности ввода данных вручную</li></ul>\r\n<ul><li>Опредедение и фиксация координат GPS</li></ul>\r\n<ul><li>Время непрерывной работы - 8 часов</li></ul>\r\n<ul><li>Передача данных посредством GSM, GPRS, Wi-Fi</li></ul>\r\n<ul><li>Голосовые вызовы через GSM сеть</li></ul>\r\n<br /><span style=\"font-weight: bold;\">ОБЛАСТИ ПРИМЕНЕНИЯ</span>\r\nПограничный контроль в пунктах пропуска для:\r\n<ul><li>Воздушного</li></ul>\r\n<ul><li>Морского, речного</li></ul>\r\n<ul><li>Железнодорожного</li></ul>\r\n<ul><li>Автомобильного</li></ul>\r\n<ul><li>Пешеходного сообщения</li></ul>\r\nПравоохранительные органы<br />Банки<br />Отели<br />Медицинские учреждения<br />Государственные учреждения","shortDescription":"Мобильный терминал ВРТ800 предназначен для автоматизации регистрации и контроля лиц, которые пересекают контрольно-пропускные пункты. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Мобильный терминал ВРТ800","keywords":"","description":" Мобильный терминал К.BPT800 — мобильное решение для регистрации и контроля лиц, пересекающих контрольно-пропускные пункты. Обеспечивает качественную и быструю фиксацию биометрических данных.<br /><br /><span style=\"font-weight: bold;\">Функции</span><br />\r\n<u","og:title":"Мобильный терминал ВРТ800","og:description":" Мобильный терминал К.BPT800 — мобильное решение для регистрации и контроля лиц, пересекающих контрольно-пропускные пункты. Обеспечивает качественную и быструю фиксацию биометрических данных.<br /><br /><span style=\"font-weight: bold;\">Функции</span><br />\r\n<u","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Mobilnyi_terminal_VRT800.PNG"},"eventUrl":"","translationId":7335,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"},{"id":47,"title":"Access Control Systems","alias":"access-control-systems","description":"Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization.\r\nThere are two types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data.\r\nTo secure a facility, organizations use electronic access control systems that rely on user credentials, access card readers, auditing and reports to track employee access to restricted business locations and proprietary areas, such as data centers. Some of these systems incorporate access control panels to restrict entry to rooms and buildings as well as alarms and lockdown capabilities to prevent unauthorized access or operations.\r\nAccess control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers (PINs), biometric scans, security tokens or other authentication factors. Multifactor authentication, which requires two or more authentication factors, is often an important part of layered defense to protect access control systems.\r\nThese security controls work by identifying an individual or entity, verifying that the person or application is who or what it claims to be, and authorizing the access level and set of actions associated with the username or IP address. Directory services and protocols, including the Local Directory Access Protocol (LDAP) and the Security Assertion Markup Language (SAML), provide access controls for authenticating and authorizing users and entities and enabling them to connect to computer resources, such as distributed applications and web servers.\r\nOrganizations use different access control models depending on their compliance requirements and the security levels of information technology they are trying to protect.\r\nThe goal of access control is to minimize the risk of unauthorized access to physical and logical systems. Access control is a fundamental component of security compliance programs that ensures security technology and access control policies are in place to protect confidential information, such as customer data. Most organizations have infrastructure and procedures that limit access to networks, computer systems, applications, files and sensitive data, such as personally identifiable information and intellectual property.\r\nAccess control systems are complex and can be challenging to manage in dynamic IT environments that involve on-premises systems and cloud services. After some high-profile breaches, technology vendors have shifted away from single sign-on systems to unified access management, which offers access controls for on-premises and cloud environments.\r\nAccess control is a process that is integrated into an organization's IT environment. It can involve identity and access management systems. These systems provide access control software, a user database, and management tools for access control policies, auditing and enforcement.\r\nWhen a user is added to an access management system, system administrators use an automated provisioning system to set up permissions based on access control frameworks, job responsibilities and workflows.\r\nThe best practice of "least privilege" restricts access to only resources that an employee requires to perform their immediate job functions.\r\nA common security issue is failure to revoke credentials and access to systems and data when an individual moves into a different job internally or leaves the company.","materialsDescription":"<span style=\"font-weight: bold;\">What is an ACS?</span>\r\nInterpretation of the abbreviation "ACS" - access control system. Includes hardware and software.\r\n<span style=\"font-weight: bold;\">How does ACS work?</span>\r\nThe system allows only people and cars that it “recognizes” into the territory to be able to identify.\r\nFor access we use contact and contactless keys, cards, fingerprints, secret code. Doorphones unlock the locks manually - when you click the "Open" button.\r\nThe intellectual access control system generates daily reports for each employee. Upon arrival at work, the staff opens the door with personal cards or puts the cards to the reader at the reception. We fix the time of breaks and the end of the working day.\r\n<span style=\"font-weight: bold;\">What are the types of access control?</span>\r\nAccess control systems are divided into autonomous and networked:\r\n<span style=\"font-style: italic;\">Autonomous access control systems</span> are not connected to the computer. Suitable for small offices, cafes, shops, hotels. Autonomous systems are used on sites with 1–2 inputs.\r\n<span style=\"font-style: italic;\">Network access control systems</span> are connected to a computer. Such systems serve complex objects: business centers, manufacturing, research institutes, hospitals, etc.\r\n<span style=\"font-weight: bold;\">What is the access control system?</span>\r\nMain components:\r\n1. Blocking devices. Electromagnetic and electromechanical locks, barriers, gates, etc.\r\n2. Identifiers:\r\n<ul><li>Touch Memory contact keys - standard intercom keys;</li><li>Touch Memory Access Keys;</li><li>RFID contactless keys;</li><li>Biometric sensor - fingerprint access;</li><li>Keyboard for entering code.</li></ul>\r\n3. Readers. Card readers, scanners, etc.\r\n4. Controllers. Unlock the blocking device automatically or manually. Manual input is used in intercoms.\r\n<span style=\"font-weight: bold;\">Is it possible to combine an access control system with a security alarm?</span>\r\nThe unified access control system + security alarm system responds to an attempt to illegally pass through the access control point: open the door, unlock the turnstile. The alarm signal instantly arrives on the control panel of the security company, mobile phone manager or another responsible person.\r\n<span style=\"font-weight: bold;\">Why combine access control with video surveillance?</span>\r\nWhen integrating with video surveillance, you get video recordings of all passes through access control points. Information from the cameras is transmitted to the monitors of the security in real time - the situation at the facility is easy to control.\r\n<span style=\"font-weight: bold;\">Why do you need ACS maintenance?</span>\r\nMaintenance prolongs the life of the system. The equipment is inspected once a month, if necessary, fix minor problems and replace components. You save on capital repairs at the expense of preventive.<br /> ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Access_Control_Systems.png"},{"id":540,"title":"Security Hardware","alias":"security-hardware","description":"Hardware security as a discipline originated out of cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity and measures to ensure that the supply chain that built the product is secure, among other things.\r\nA hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.\r\nSome providers in this discipline consider that the key difference between hardware security and software security is that hardware security is implemented using "non-Turing-machine" logic (raw combinatorial logic or simple state machines). One approach, referred to as "hardsec", uses FPGAs to implement non-Turing-machine security controls as a way of combining the security of hardware with the flexibility of software.\r\nHardware backdoors are backdoors in hardware. Conceptionally related, a hardware Trojan (HT) is a malicious modification of an electronic system, particularly in the context of an integrated circuit.\r\nA physical unclonable function (PUF) is a physical entity that is embodied in a physical structure and is easy to evaluate but hard to predict. Further, an individual PUF device must be easy to make but practically impossible to duplicate, even given the exact manufacturing process that produced it. In this respect, it is the hardware analog of a one-way function. The name "physically unclonable function" might be a little misleading as some PUFs are clonable, and most PUFs are noisy and therefore do not achieve the requirements for a function. Today, PUFs are usually implemented in integrated circuits and are typically used in applications with high-security requirements.\r\nMany attacks on sensitive data and resources reported by organizations occur from within the organization itself.","materialsDescription":"<span style=\"font-weight: bold;\">What is hardware information security?</span>\r\nHardware means various types of devices (mechanical, electromechanical, electronic, etc.), which solve information protection problems with hardware. They impede access to information, including through its disguise. The hardware includes: noise generators, surge protectors, scanning radios and many other devices that "block" potential channels of information leakage or allow them to be detected. The advantages of technical means are related to their reliability, independence from subjective factors and high resistance to modification. The weaknesses include a lack of flexibility, relatively large volume and mass and high cost. The hardware for information protection includes the most diverse technical structures in terms of operation, device and capabilities, which ensure the suppression of disclosure, protection against leakage and counteraction to unauthorized access to sources of confidential information.\r\n<span style=\"font-weight: bold;\">Where is the hardware used to protect information?</span>\r\nHardware information protection is used to solve the following problems:\r\n<ul><li>conducting special studies of technical means of ensuring production activity for the presence of possible channels of information leakage;</li><li>identification of information leakage channels at various objects and in premises;</li><li>localization of information leakage channels;</li><li>search and detection of industrial espionage tools;</li><li>countering unauthorized access to confidential information sources and other actions.</li></ul>\r\n<span style=\"font-weight: bold;\">What is the classification of information security hardware?</span>\r\nAccording to the functional purpose, the hardware can be classified into detection tools, search tools and detailed measurements and active and passive countermeasures. At the same time, according to their technical capabilities, information protection tools can be general-purpose, designed for use by non-professionals in order to obtain preliminary (general) estimates, and professional complexes that allow for a thorough search, detection and precision measurement of all the characteristics of industrial espionage equipment. As an example of the former, we can consider a group of IP electromagnetic radiation indicators, which have a wide range of received signals and rather low sensitivity. As a second example - a complex for the detection and direction finding of radio bookmarks, designed to automatically detect and locate radio transmitters, radio microphones, telephone bookmarks and network radio transmitters.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Security_Hardware.png"},{"id":560,"title":"IPC - Information Protection and Control - Appliance","alias":"ipc-information-protection-and-control-appliance","description":" Information Protection and Control (IPC) is a technology for protecting confidential information from internal threats. IPC class hardware solutions are designed to protect information from internal threats, prevent various types of information leaks, corporate espionage, and business intelligence. The term IPC combines two main technologies: encryption of storage media at all points of the network and control of technical channels of information leakage using Data Loss Prevention (DLP) technologies. Network, application and data access control is a possible third technology in IPC class systems. IPC includes solutions of the Data Loss Prevention (DLP) class, a system for encrypting corporate information and controlling access to it. The term IPC was one of the first to use IDC analyst Brian Burke in his report, Information Protection and Control Survey: Data Loss Prevention and Encryption Trends.\r\nIPC technology is a logical continuation of DLP technology and allows you to protect data not only from leaks through technical channels, that is, insiders, but also from unauthorized user access to the network, information, applications, and in cases where the direct storage medium falls into the hands of third parties. This allows you to prevent leaks in those cases when an insider or a person who does not have legal access to data gain access to the direct carrier of information.\r\nThe main objective of IPC systems is to prevent the transfer of confidential information outside the corporate information system. Such a transfer (leak) may be intentional or unintentional. Practice shows that most of the leaks (more than 75%) do not occur due to malicious intent, but because of errors, carelessness, carelessness, and negligence of employees - it is much easier to detect such cases. The rest is connected with the malicious intent of operators and users of enterprise information systems, in particular, industrial espionage and competitive intelligence. Obviously, malicious insiders, as a rule, try to trick IPC analyzers and other control systems.","materialsDescription":" <span style=\"font-weight: bold;\">What is Information Protection and Control (IPC)?</span>\r\nIPC (English Information Protection and Control) is a generic name for technology to protect confidential information from internal threats.\r\nIPC apparel solutions are designed to prevent various types of information leaks, corporate espionage, and business intelligence. IPC combines two main technologies: media encryption and control of technical channels of information leakage (Data Loss Prevention - DLP). Also, the functionality of IPC systems may include systems of protection against unauthorized access (unauthorized access).\r\n<span style=\"font-weight: bold;\">What are the objectives of IPC class systems?</span>\r\n<ul><li>preventing the transfer of confidential information beyond the corporate information system;</li><li>prevention of outside transmission of not only confidential but also other undesirable information (offensive expressions, spam, eroticism, excessive amounts of data, etc.);</li><li>preventing the transmission of unwanted information not only from inside to outside but also from outside to inside the organization’s information system;</li><li>preventing employees from using the Internet and network resources for personal purposes;</li><li>spam protection;</li><li>virus protection;</li><li>optimization of channel loading, reduction of inappropriate traffic;</li><li>accounting of working hours and presence at the workplace;</li><li>tracking the reliability of employees, their political views, beliefs, collecting dirt;</li><li>archiving information in case of accidental deletion or damage to the original;</li><li>protection against accidental or intentional violation of internal standards;</li><li>ensuring compliance with standards in the field of information security and current legislation.</li></ul>\r\n<span style=\"font-weight: bold;\">Why is DLP technology used in IPC?</span>\r\nIPC DLP technology supports monitoring of the following technical channels for confidential information leakage:\r\n<ul><li>corporate email;</li><li>webmail;</li><li>social networks and blogs;</li><li>file-sharing networks;</li><li>forums and other Internet resources, including those made using AJAX technology;</li><li>instant messaging tools (ICQ, Mail.Ru Agent, Skype, AOL AIM, Google Talk, Yahoo Messenger, MSN Messenger, etc.);</li><li>P2P clients;</li><li>peripheral devices (USB, LPT, COM, WiFi, Bluetooth, etc.);</li><li>local and network printers.</li></ul>\r\nDLP technologies in IPC support control, including the following communication protocols:\r\n<ul><li>FTP;</li><li>FTP over HTTP;</li><li>FTPS;</li><li>HTTP;</li><li>HTTPS (SSL);</li><li>NNTP;</li><li>POP3;</li><li>SMTP.</li></ul>\r\n<span style=\"font-weight: bold;\">What information protection facilities does IPC technology include?</span>\r\nIPC technology includes the ability to encrypt information at all key points in the network. The objects of information security are:\r\n<ul><li>Server hard drives;</li><li>SAN;</li><li>NAS;</li><li>Magnetic tapes;</li><li>CD/DVD/Blue-ray discs;</li><li>Personal computers (including laptops);</li><li>External devices.</li></ul>\r\nIPC technologies use various plug-in cryptographic modules, including the most efficient algorithms DES, Triple DES, RC5, RC6, AES, XTS-AES. The most used algorithms in IPC solutions are RC5 and AES, the effectiveness of which can be tested on the project [distributed.net]. They are most effective for solving the problems of encrypting data of large amounts of data on server storages and backups.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IPC_Information_Protection_and_Control_Appliance.png"},{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1071,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Omilia.png","logo":true,"scheme":false,"title":"deepNLU®","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"deepnlur","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"Функции deepNLU®:\r\n<ul> <li><b><i>Контекст с сохранением памяти </i></b>Делает заключение из речи на основе сказанного ранее</li> <li><b><i>Динамическое выделение </i></b>Многоуровневые концептуальные аннотации позволяют извлекать значения низкого и высокого уровня</li> <li><i><b>Интуитивные разногласия </b></i>Автоматически запрашивает дополнительную информацию, если намерения не ясны</li> </ul>\r\nПоскольку движок DeepNLU® понимает контекст и сохраняет память, он способен запускать целые сквозные разговоры с клиентами.","shortDescription":"Движок Omilia's deepNLU® позволяет понимать запросы клиентов и намерения с подобной человеческой точностью. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"deepNLU®","keywords":"ясны, Поскольку, движок, намерения, дополнительную, разногласияАвтоматически, запрашивает, DeepNLU","description":"Функции deepNLU®:\r\n<ul> <li><b><i>Контекст с сохранением памяти </i></b>Делает заключение из речи на основе сказанного ранее</li> <li><b><i>Динамическое выделение </i></b>Многоуровневые концептуальные аннотации позволяют извлекать значения низкого и ","og:title":"deepNLU®","og:description":"Функции deepNLU®:\r\n<ul> <li><b><i>Контекст с сохранением памяти </i></b>Делает заключение из речи на основе сказанного ранее</li> <li><b><i>Динамическое выделение </i></b>Многоуровневые концептуальные аннотации позволяют извлекать значения низкого и ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Omilia.png"},"eventUrl":"","translationId":7038,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":213,"title":"Integration Middleware","alias":"integration-middleware","description":" Integration middleware is the alternate term used for middleware as the purpose of middleware is mainly integration. Integration middleware represents software systems that offer runtime services for communications, integration application execution, monitoring, and operations.\r\nThe key function of middleware is to help make application development simpler. This is done by offering common programming abstractions, covering up heterogeneity, delivering fundamental operating systems and hardware, and masking low-level programming details.\r\nMiddleware is a software that links two separate applications or is commonly used to illustrate different products that function as a glue between two separate applications. For instance, there are various middleware products that establish a connection between a Web server and a database system. This lets users request data from the database by means of forms shown on a Web browser. In return, the Web server returns dynamic Web pages according to the user's requests and profile.","materialsDescription":" <span style=\"font-weight: bold;\">On what classification is based integration middleware?</span>\r\nConventionally, integration middleware is classified based on domains, which are defined by the types of resources that are incorporated:\r\n<ul><li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Cloud Integration:</span></span> Integrates with and also between the cloud services, cloud-based applications (SaaS), private clouds, trade hubs, and other typical cloud resources through Web services and standard B2B communication strategies (FTP, AS2, etc.)</li><li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">B2B Integration:</span></span> Integrates customer, provider and various alternative partner interfaces with various data resources and company-managed applications</li><li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Application Integration (A2A):</span></span> Integrates various company-managed applications together, including cloud-based and remote systems</li><li><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Data Integration:</span></span> Integrates business data resources, such as databases and files, over the business and operational intelligence systems</li></ul>\r\n<span style=\"font-weight: bold;\">What categories include integration middleware?</span>\r\nMiddleware is often described as plumbing because it links both sides of an application and also transfers data between them. Some standard middleware categories include:\r\n<ul><li>Enterprise service buses (ESBs);</li><li>Transaction processing (TP) monitors;</li><li>The distributed computing environment (DCE);</li><li>Remote procedure call (RPC) systems;</li><li>Object request brokers (ORBs);</li><li>Message passing;</li><li>Database access systems.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Integration_Middleware1.png"},{"id":492,"title":"Enterprise Service Bus Middleware","alias":"enterprise-service-bus-middleware","description":" An enterprise service bus (ESB) implements a communication system between mutually interacting software applications in a service-oriented architecture (SOA). It represents a software architecture for distributed computing, and is a special variant of the more general client-server model, wherein any application may behave as server or client. ESB promotes agility and flexibility with regard to high-level protocol communication between applications. Its primary use is in enterprise application integration (EAI) of heterogeneous and complex service landscapes.\r\nThe concept of the enterprise service bus is analogous to the bus concept found in computer hardware architecture combined with the modular and concurrent design of high-performance computer operating systems. The motivation for the development of the architecture was to find a standard, structured, and general purpose concept for describing implementation of loosely coupled software components (called services) that are expected to be independently deployed, running, heterogeneous, and disparate within a network. ESB is also a common implementation pattern for service-oriented architecture, including the intrinsically adopted network design of the World Wide Web.\r\nNo global standards exist for enterprise service bus concepts or implementations. Most providers of message-oriented middleware have adopted the enterprise service bus concept as de facto standard for a service-oriented architecture. The implementations of ESB use event-driven and standards-based message-oriented middleware in combination with message queues as technology frameworks. However, some software manufacturers relabel existing middleware and communication solutions as ESB without adopting the crucial aspect of a bus concept.\r\nThe ESB is implemented in software that operates between the business applications, and enables communication among them. Ideally, the ESB should be able to replace all direct contact with the applications on the bus, so that all communication takes place via the ESB. To achieve this objective, the ESB must encapsulate the functionality offered by its component applications in a meaningful way. This typically occurs through the use of an enterprise message model. The message model defines a standard set of messages that the ESB transmits and receives. When the ESB receives a message, it routes the message to the appropriate application. Often, because that application evolved without the same message model, the ESB has to transform the message into a format that the application can interpret. A software adapter fulfills the task of effecting these transformations, analogously to a physical adapter.\r\nESBs rely on accurately constructing the enterprise message model and properly designing the functionality offered by applications. If the message model does not completely encapsulate the application functionality, then other applications that desire that functionality may have to bypass the bus, and invoke the mismatched applications directly. Doing so violates the principles of the ESB model, and negates many of the advantages of using this architecture.\r\nThe beauty of the ESB lies in its platform-agnostic nature and the ability to integrate with anything at any condition. It is important that Application Lifecycle Management vendors truly apply all the ESB capabilities in their integration products while adopting SOA. Therefore, the challenges and opportunities for EAI vendors are to provide an integration solution that is low-cost, easily configurable, intuitive, user-friendly, and open to any tools customers choose.","materialsDescription":" <span style=\"font-weight: bold;\">What is an Enterprise Service Bus (ESB)?</span>\r\nAn Enterprise Service Bus (ESB) is a type of software platform known as middleware, which works behind the scenes to aid application-to-application communication. Think of an ESB as a “bus” that picks up information from one system and delivers it to another.\r\nThe term ESB first appeared in 2002, but the technology continues to evolve, driven by the need for ever-emerging internet applications to communicate and interact with one another.\r\n<span style=\"font-weight: bold;\">Why would I want an ESB?</span>\r\nImagine that there are two systems in an organization that needs to exchange data. The technical teams that represent each system plan and implement a solution that allows these systems to communicate. A year or two later, the organization deploys several more systems that need to interact with each other as well as the existing two systems. How can all teams develop and reach an agreement on the best solution?\r\nIt becomes very complicated to manage and maintain one solution as an organization’s IT systems expand. With just 10 systems, there could be 100 different interfaces and scores of disparate technical requirements.\r\nAn ESB provides a secure, scalable and cost-effective infrastructure that enables real-time data exchange among many systems. Data from one system, known as a service provider, can be put on the enterprise service bus as a message, which is sent immediately to a service consumer of the data. If a new system wants to consume this same data, all it has to do is plug into the bus in the same manner.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Enterprise_Service_Bus_Middleware.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1072,"logoURL":"https://old.roi4cio.com/fileadmin/content/Xpert_Packages.png","logo":true,"scheme":false,"title":"Xpert® Packages","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"xpertr-packages","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p>Суперзаряженные пакеты «Xpert®»</p>\r\n<p style=\"text-align: justify;\">Благодаря использованию пакетов Xpert® диалоги для категоризации и самообслуживания для конкретного домена чрезвычайно упрощены, поэтому усилия по разработке могут быть уменьшены на 80%, ускоряя доставку. Более конкретно, пакеты Xpert® поставляются с готовыми концептуальными словарями, правилами и намерениями для вашего бизнеса.</p>\r\n<p style=\"text-align: justify;\"><strong>Доступные пакеты Xpert® по отраслям: </strong>банковский бизнес, телеком, страхование, путешествия</p>","shortDescription":"Пакеты «Xpert®» поставляются с полностью загруженным интеллектуальным виртуальным агентом, предоставляющим готовое распознавание и понимание всех ключевых концепций для определенного домена и языка.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Xpert® Packages","keywords":"Xpert, пакеты, страхование, готовыми, концептуальными, поставляются, путешествия, доставку","description":"<p>Суперзаряженные пакеты «Xpert®»</p>\r\n<p style=\"text-align: justify;\">Благодаря использованию пакетов Xpert® диалоги для категоризации и самообслуживания для конкретного домена чрезвычайно упрощены, поэтому усилия по разработке могут","og:title":"Xpert® Packages","og:description":"<p>Суперзаряженные пакеты «Xpert®»</p>\r\n<p style=\"text-align: justify;\">Благодаря использованию пакетов Xpert® диалоги для категоризации и самообслуживания для конкретного домена чрезвычайно упрощены, поэтому усилия по разработке могут","og:image":"https://old.roi4cio.com/fileadmin/content/Xpert_Packages.png"},"eventUrl":"","translationId":7039,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":152,"title":"Contact Center","alias":"contact-center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Contact_Center1.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1073,"logoURL":"https://old.roi4cio.com/fileadmin/content/omIVR.png","logo":true,"scheme":false,"title":"omIVR® Контакт Центр","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"omivrr-kontakt-centr","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p>Функции omIVR®</p>\r\n<p>omIVR® выполняет поток вызовов диалога и вызывает службы deepASR® для речи в текст и omTTS® для синтеза речи, используя стандартный протокол MRCP. Он работает как на физическом, так и на виртуальном оборудовании, обеспечивая масштабируемую систему, отвечающую всем вашим бизнес-требованиям и техническим требованиям.</p>","shortDescription":"omIVR® - это телекоммуникационная способность IVR, позволяющая DiaManT® легко интегрироваться с телефонией предприятия через стандартный протокол SIP","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"omIVR® Контакт Центр","keywords":"речи, omIVR, работает, оборудовании, физическом, виртуальном, масштабируемую, бизнес-требованиям","description":"<p>Функции omIVR®</p>\r\n<p>omIVR® выполняет поток вызовов диалога и вызывает службы deepASR® для речи в текст и omTTS® для синтеза речи, используя стандартный протокол MRCP. Он работает как на физическом, так и на виртуальном оборудовании, обесп","og:title":"omIVR® Контакт Центр","og:description":"<p>Функции omIVR®</p>\r\n<p>omIVR® выполняет поток вызовов диалога и вызывает службы deepASR® для речи в текст и omTTS® для синтеза речи, используя стандартный протокол MRCP. Он работает как на физическом, так и на виртуальном оборудовании, обесп","og:image":"https://old.roi4cio.com/fileadmin/content/omIVR.png"},"eventUrl":"","translationId":7040,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":152,"title":"Contact Center","alias":"contact-center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Contact_Center1.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1074,"logoURL":"https://old.roi4cio.com/fileadmin/content/omMobile.png","logo":true,"scheme":false,"title":"omMobile®","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"ommobiler","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p>Интегрируйте DiaManT® в свое мобильное приложение, чтобы общаться с пользователями через Voice, Text и Touch, облегчая многомодальный, разговорный пользовательский интерфейс, более простым и привлекательным образом, чтобы быстрее получить нужную информацию</p>\r\n<p>Функции omMobile®</p>\r\n<p>DiaManT® и omMobile® поддерживают кросс-канальную непрерывность и передачу, позволяя пользователям начать взаимодействие в мобильном приложении и беспрепятственно продолжать взаимодействие с IVR или веб-чатом с полным сохранением контекста.</p>","shortDescription":"С помощью omMobile® виртуальный помощник In-App можно легко интегрировать в любое родное мобильное приложение с простым добавлением мобильного SDK Omilia.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"omMobile®","keywords":"omMobile, взаимодействие, чтобы, DiaManT, пользователям, начать, информацию, позволяя","description":"<p>Интегрируйте DiaManT® в свое мобильное приложение, чтобы общаться с пользователями через Voice, Text и Touch, облегчая многомодальный, разговорный пользовательский интерфейс, более простым и привлекательным образом, чтобы быстрее получить нужную информа","og:title":"omMobile®","og:description":"<p>Интегрируйте DiaManT® в свое мобильное приложение, чтобы общаться с пользователями через Voice, Text и Touch, облегчая многомодальный, разговорный пользовательский интерфейс, более простым и привлекательным образом, чтобы быстрее получить нужную информа","og:image":"https://old.roi4cio.com/fileadmin/content/omMobile.png"},"eventUrl":"","translationId":7041,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1075,"logoURL":"https://old.roi4cio.com/fileadmin/content/omChat.png","logo":true,"scheme":false,"title":"omChat®","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"omchatr","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p style=\"text-align: justify;\">Функции omChat®</p>\r\n<p style=\"text-align: justify;\">На веб-сайте компании клиенты могут общаться с Виртуальным агентом каждый раз, когда у них возникают трудности с навигацией или по требованию, для улучшения удобства пользователей.</p>\r\n<p style=\"text-align: justify;\">omChat® можно легко интегрировать со многими поставщиками инфраструктуры агента-чата, чтобы при необходимости передать разговор живому агенту.</p>\r\n<p style=\"text-align: justify;\">С omChat® предприятие также может открыть Facebook Messenger в качестве прямого канала связи с клиентами и обеспечить, чтобы они получали тот же отличный опыт общения, что и на любом другом канале.</p>","shortDescription":"С плагином omChat® DiaManT® принимает форму ChatBot на текстовых каналах: SMS, Web-Chat, Email и Facebook Messenger.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"omChat®","keywords":"omChat, чтобы, открыть, может, Facebook, качестве, также, Messenger","description":"<p style=\"text-align: justify;\">Функции omChat®</p>\r\n<p style=\"text-align: justify;\">На веб-сайте компании клиенты могут общаться с Виртуальным агентом каждый раз, когда у них возникают трудности с навигацией или по требованию, для улучшения удобства польз","og:title":"omChat®","og:description":"<p style=\"text-align: justify;\">Функции omChat®</p>\r\n<p style=\"text-align: justify;\">На веб-сайте компании клиенты могут общаться с Виртуальным агентом каждый раз, когда у них возникают трудности с навигацией или по требованию, для улучшения удобства польз","og:image":"https://old.roi4cio.com/fileadmin/content/omChat.png"},"eventUrl":"","translationId":7042,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":271,"title":"Messaging Applications","alias":"messaging-applications","description":" Messaging apps (a.k.a. "Social messaging" or "chat applications") are apps and platforms that enable messaging, many of which started around social networking platforms, but many of which have now developed into broad platforms enabling status updates, chatbots, payments and conversational commerce (e-commerce via chat).\r\nSome examples of popular messaging apps include WhatsApp, China's WeChat and QQ Messenger, Viber, Line, Snapchat, Korea's KakaoTalk, Google Hangouts, Blackberry Messenger, Telegram, and Vietnam's Zalo. Slack focuses on messaging and file sharing for work teams. Some social networking services offer messaging services as a component of their overall platform, such as Facebook's Facebook Messenger, along with Instagram and Twitter's direct messaging functions.\r\nMessaging apps are the most widely used smartphone apps with in 2018 over 1.3 billion monthly users of WhatsApp and Facebook Messenger, 980 million monthly active users of WeChat and 843 million monthly active users of QQ Mobile.\r\nOnline chatting apps differ from the previous generation of instant messaging platforms like the defunct AIM, Yahoo! Messenger, and Windows Live Messenger, in that they are primarily used via mobile apps on smartphones as opposed to personal computers, although some messaging apps offer web-based versions or software for PC operating systems.\r\nAs people upgraded in the 2010s from feature phones to smartphones, they moved from traditional calling and SMS (which are paid services) to messaging apps which are free or only incur small data charges.\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Messaging apps each have some of the following features:</span></p>\r\n<ul><li>Chat</li></ul>\r\n<ol><li>One-on-one chat</li><li>Group chat</li><li> Broadcast lists</li><li>Chatbots (including "bot in group chats")</li><li>"Smart replies" (suggested replies to incoming messages provided by Google's Reply platform )</li></ol>\r\n<ul><li>Calls</li></ul>\r\n<ol><li>Voice calls</li><li> Video calls</li></ol>\r\n<ul><li>Audio alerts (on Line)</li><li>File sharing</li><li>Games</li><li>"Mini Programs" (e.g. WeChat Mini Program)</li><li>News discovery (e.g. Snapchat Discover)</li><li>Payments or mobile wallet, e.g. WeChat Pay which processes much of the Chinese mobile payment volume of US$5 trillion (2016)</li><li>Personal (cloud) storage</li><li>Push notifications</li><li>Status updates (WhatsApp Status, WeChat Moments)</li><li>Stickers</li><li>Virtual assistant, e.g. Google Assistant in Google Allo</li></ul>\r\n<p class=\"align-left\">Unlike chat rooms with many users engaging in multiple and overlapping conversations, instant messaging application sessions usually take place between two users in a private, back-and-forth style of communication.</p>\r\n<p class=\"align-left\">One of the core features of different messaging apps is the ability to see whether a friend or co-worker is online and connected through the selected service -- a capability known as presence. As the technology has evolved, many online messaging apps have added support for exchanging more than just text-based messages, allowing actions like file transfers and image sharing within the instant messaging session.</p>\r\n<p class=\"align-left\">Instant messaging also differs from email in the immediacy of the message exchange. It also tends to be session-based, having a start and an end. Because application message is intended to mimic in-person conversations, individual messages are often brief. Email, on the other hand, usually reflects a longer-form, letter-writing style.<br /><br /><br /></p>","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is instant messaging software?</span></h1>\r\nCompanies use instant messaging software to facilitate communication between their staff members who may be located in different places and countries. Popular websites such as Facebook offer instant chat services for free. Good quality messenger application solutions provide useful features such as video calling, web conferencing, and VoIP. Advanced platforms offer IP radio, IPTV, and desktop sharing tools. Large enterprises have greater communication needs and therefore they typically invest in installing an internal IM server to serve their thousands of employees.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">Why people use Messaging Apps?</span></h1>\r\n<ul><li>Real-time text transmission</li><li>Conveniency</li><li>Records of a chat history</li><li>Easy for multitasking</li><li>Operating anytime anywhere using the WiFi or Mobile Network operators</li><li>Stickers</li></ul>\r\nCommunication is an essential component of any business: interaction with external or internal customers, end users, employees. A good communication platform is vital to stay connected with the employees and broadcast information fast and efficiently. Thousands of people support the escalation from IM to other ways of communication, such as group chat, voice calls or video conferencing.<br />Depending on the purpose of use we can separate popular messenger nto those with business needs or for corporate use, such as Slack, Hangouts, Flock, Stride and those for everyday communications like WhatsApp, FB Messenger, WeChat, Telegram, and others.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">How messaging apps can benefit your business?</span></h1>\r\n<p class=\"align-center\"></p>\r\nHeads bowed, shoulders hunched over glowing screens—we all might be a little guilty of smartphone addiction, and mobile usage is only increasing. We’re in constant communication with one another, and over the past few years messaging apps like Facebook Messenger and WeChat have become commonplace. Of the 10 most globally used apps, messaging apps account for 6.\r\nWith consumer messaging apps on the rise, businesses have begun to connect with customers on yet another channel. According to Gartner, “By 2019, requests for customer support through consumer mobile messaging apps will exceed requests for customer support through traditional social media.”\r\nServing up customer support through customer messaging software can deepen your brand’s relationship with customers. On the customer side, messaging apps provide an immediate way to connect with your business and get a response.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Here are three ways your business can benefit from connecting with customers over consumer messaging apps:</span></p>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Unrestricted communication.</span> No matter where they are in the world, messaging apps offer your customers unrestricted communication options. Unlike SMS, which often incurs charges, your customers can still reach out privately via messaging apps and receive a timely response without worrying about cost. That means happier customers, and happy customers mean a happy bottom line for your business.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Move customer queries from public to private. </span>Giving your customers an easy option to reach your business privately not only decreases their likelihood of publicly tweeting a complaint, it also offers a space to exchange sensitive information, like delivery details. With a more private outlet for customer interactions, your business can thoroughly help customers while simultaneously saving brand face.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Increase first contact resolution with chatbot integrations.</span> According to Gartner, artificial intelligence is a top trend for 2017. With the help of chatbots, your business can better manage workflows and automatically respond to customer requests via messaging. Chatbots can help point customers to the right information, helping them self-serve and ultimately allowing your support agents to focus on the issues that require a human touch. </li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Messaging_Applications.png"},{"id":495,"title":"Instant Communications Applications","alias":"instant-communications-applications","description":" Instant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are typically transmitted between two parties, when each user chooses to complete a thought and select "send". Some IM applications can use push technology to provide real-time text, which transmits messages character by character, as they are composed. More advanced instant messaging can add file transfer, clickable hyperlinks, Voice over IP, or video chat.\r\nNon-IM types of chat include multicast transmission, usually referred to as "chat rooms", where participants might be anonymous or might be previously known to each other (for example collaborators on a project that is using chat to facilitate communication). Instant messaging systems tend to facilitate connections between specified known users (often using a contact list also known as a "buddy list" or "friend list"). Depending on the IM protocol, the technical architecture can be peer-to-peer (direct point-to-point transmission) or client-server (an Instant message service center retransmits messages from the sender to the communication device).\r\nBy 2010, instant messaging over the Web was already in sharp decline, in favor of messaging features on social networks. The most popular IM platforms, such as AIM, closed in 2017, and Windows Live Messenger was merged into Skype. Today, most instant messaging takes place on messaging apps which by 2014 had more users than social networks.\r\nInstant messaging is a set of communication technologies used for text-based communication between two or more participants over the Internet or other types of networks. IM–chat happens in real-time. Of importance is that online chat and instant messaging differ from other technologies such as email due to the perceived quasi-synchrony of the communications by the users. Some systems permit messages to be sent to users not then 'logged on' (offline messages), thus removing some differences between IM and email (often done by sending the message to the associated email account).\r\nIM allows effective and efficient communication, allowing immediate receipt of acknowledgment or reply. However IM is basically not necessarily supported by transaction control. In many cases, instant messaging includes added features which can make it even more popular. For example, users may see each other via webcams, or talk directly for free over the Internet using a microphone and headphones or loudspeakers. Many applications allow file transfers, although they are usually limited in the permissible file-size.\r\nIt is usually possible to save a text conversation for later reference. Instant messages are often logged in a local message history, making it similar to the persistent nature of emails. ","materialsDescription":" <span style=\"font-weight: bold;\">What is instant messaging used for?</span>\r\nInstant messaging (IM) technology is a type of online chat that offers real-time text transmission over the Internet. A LAN messenger operates in a similar way over a local area network. Short messages are typically transmitted between two parties when each user chooses to complete a thought and select "send".\r\n<span style=\"font-weight: bold;\">What kind of protocols are used in instant messaging applications?</span>\r\nTwo of the main protocols used for instant messaging in the market today are WebSocket and XMPP.\r\n<span style=\"font-weight: bold;\">What is the difference between texting and instant messaging?</span>\r\nText messaging, or simply "texting," is a cellular phone service typically limited to 160 characters, whereas instant messaging is usually a computer session with longer message size. Both text messaging and instant messaging are often called just plain "messaging."\r\n<span style=\"font-weight: bold;\">What are the key features of instant messaging?</span>\r\nThe exchange of text has long been the chief function of instant messaging, but it is now one feature of many. The ability to insert images and emojis into messages is now standard in many clients, as are file transfers. Facebook Messenger even enables users to send money via IM.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Instant_Communications_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1076,"logoURL":"https://old.roi4cio.com/fileadmin/content/deepASR.png","logo":true,"scheme":false,"title":"deepASR®","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"deepasrr","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p>Сегодня наш двигатель отличается распознаванием 11 языков, включая английский (США, Канада, Великобритания и Южная Африка), испанский, русский, польский, румынский, казахский, украинский и греческий.</p>\r\n<p>Благодаря запатентованному методу обучения и настройки Omilia, deepASR® способен достичь уровня ошибок Word менее половины унаследованных поставщиков услуг.</p>\r\n<p>Для всех основных языков Omilia предлагает адаптированные акустические и языковые модели, которые охватывают акценты и диалектические вариации внутри страны.</p>","shortDescription":"Механизм автоматического распознавания речи использует самые передовые формы глубокого обучения, обеспечивая беспрецедентную точность в распознавании, которая обычно достигает человеческого уровня ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"deepASR®","keywords":"языков, Omilia, унаследованных, половины, услуг, менее, поставщиков, ошибок","description":"<p>Сегодня наш двигатель отличается распознаванием 11 языков, включая английский (США, Канада, Великобритания и Южная Африка), испанский, русский, польский, румынский, казахский, украинский и греческий.</p>\r\n<p>Благодаря запатентованному методу обучения и наст","og:title":"deepASR®","og:description":"<p>Сегодня наш двигатель отличается распознаванием 11 языков, включая английский (США, Канада, Великобритания и Южная Африка), испанский, русский, польский, румынский, казахский, украинский и греческий.</p>\r\n<p>Благодаря запатентованному методу обучения и наст","og:image":"https://old.roi4cio.com/fileadmin/content/deepASR.png"},"eventUrl":"","translationId":7043,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":752,"title":"Voice Recognition","alias":"voice-recognition","description":"<span style=\"font-weight: bold;\">Voice</span> or <span style=\"font-weight: bold;\">speaker recognition </span>is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands. Voice recognition has gained prominence and use with the rise of AI and intelligent assistants, such as Amazon's Alexa, Apple's Siri and Microsoft's Cortana.<br />Voice recognition systems enable consumers to interact with technology simply by speaking to it, enabling hands-free requests, reminders and other simple tasks.\r\n<span style=\"font-weight: bold;\">Voice recognition technology on computers</span> requires that analog audio be converted into digital signals, known as analog-to-digital conversion. For a computer to decipher a signal, it must have a digital database, or vocabulary, of words or syllables, as well as a speedy means for comparing this data to signals. The speech patterns are stored on the hard drive and loaded into memory when the program is run. A comparator checks these stored patterns against the output of the A/D converter - an action called pattern recognition.\r\nIn practice, the size of a speech recognition system effective vocabulary is directly related to the random access memory capacity of the computer in which it is installed. A voice recognition program runs many times faster if the entire vocabulary can be loaded into RAM, as compared with searching the hard drive for some of the matches. \r\nWhile <span style=\"font-weight: bold;\">voice recognition technology </span>originated on PCs, it has gained acceptance in both business and consumer spaces <span style=\"font-weight: bold;\">on mobile devices and in home assistant products</span>. The popularity of smartphones opened up the opportunity to add voice recognition technology into consumer pockets, while home devices, like Google Home and Amazon Echo, brought voice recognition technology into living rooms and kitchens. Voice recognition, combined with the growing stable of internet of things sensors, has added a technological layer to many consumer products that previously lacked any smart capabilities.\r\nAs<span style=\"font-weight: bold;\"> uses for voice recognition technology</span> grow and more users interact with it, the companies implementing speak recognition software will have more data and information to feed into the neural networks that power voice recognition systems, thus improving the capabilities and accuracy of the automatic speech recognition products.<br />The uses for voice recognition have grown quickly as AI, machine learning and consumer acceptance have matured. In-home digital assistants from Google to Amazon to Apple have all implemented voice recognition software to interact with users. The way <span style=\"font-weight: bold;\">consumers use voice recognition technology</span> varies depending on the product, but it can include transcribing speech to text converter, setting up reminders, searching the internet, and responding to simple questions and requests, such as playing music or sharing weather or traffic information.\r\nThe government is also looking for ways to use voice recognition technology and voice identification for security purposes. The National Security Agency (the official U.S. cryptologic organization of the United States Intelligence Community under the Department of Defense) has used voice recognition systems dating back to 2004.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What is voice recognition?</span></h1>\r\n<p class=\"align-left\">Voice recognition is an alternative to typing on a keyboard. Put simply, you talk to the computer and your words appear on the screen. The software has been developed to provide a fast method of writing on a computer and can help people with a variety of disabilities. It is useful for people with physical disabilities who often find typing difficult, painful or impossible. Voice-recognition software can also help those with spelling difficulties, including users with dyslexia, because recognised words are almost always correctly spelled.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is voice recognition software?</span></h1>\r\n<p class=\"align-left\">Voice-recognition software programmes work by analysing sounds and converting them to text. Once correctly set up, the systems should recognise around 95% of what is said if you speak clearly. Several programmes are available that provide computer speech recognition. These systems have mostly been designed for Windows operating systems, however programmes are also available for Mac OS X. In addition to third-party software, there are also voice-recognition programmes built in to the operating systems of Windows Vista and Windows 7, 8, 10. Most specialist voice applications include the software, a microphone headset, a manual and a quick reference card. You connect the microphone to the computer, either into the soundcard or via a USB or similar connection.</p>\r\n<header><h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the types of speech recognition?</span></h1></header>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">There are two types of speech recognition.</span> One is called speaker–dependent and the other is speaker–independent. Speaker–dependent software is commonly used for dictation software, while speaker–independent software is more commonly found in telephone applications.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Speaker–dependent</span> software works by learning the unique characteristics of a single person's voice, in a way similar to voice recognition. New users must first "train" the voice recognition systems product by speaking to it, so the computer can analyze how the person talks. This often means users have to read a few pages of text to the computer before they can use the voice recogniser.<span style=\"font-weight: bold;\"></span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Speaker–independent</span> software is designed to recognize anyone's voice, so no training is involved. This means it is the only real option for applications such as interactive voice response systems — where businesses can't ask callers to read pages of text before using the system. The downside is that speaker–independent software is generally less accurate than speaker–dependent software.</p>\r\n<p class=\"align-left\">Voice recognition engines that are speaker independent generally deal with this fact by limiting the grammars they use. By using a smaller list of recognized words, the speech engine is more likely to correctly recognize what a speaker said.</p>\r\n<p class=\"align-left\">This makes speaker–independent software ideal for most IVR systems, and any application where a large number of people will be using the same system. Speaker dependent software is used more widely in dictation software, where only one person will use the system and there is a need for a large grammar.</p>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the voice recognition applications?</span></h1>\r\n<p class=\"align-left\">The technology is gaining popularity in many areas and has been successful in the following:</p>\r\n<ul><li><span style=\"font-weight: bold;\">Device control. </span>Just saying "OK Google" to an Android phone fires up a system that is all ears to your voice commands.</li><li><span style=\"font-weight: bold;\">Car Bluetooth systems.</span> Many cars are equipped with a system that connects its radio mechanism to your smartphone through Bluetooth. You can then make and receive calls without touching your smartphone, and can even dial numbers by just saying them.</li><li><span style=\"font-weight: bold;\">Voice to speech transcription.</span> In areas where people have to type a lot, some intelligent software captures their spoken words and transcribe them into text. This is current in the certain word processing software. Voice transcription also works with visual voicemail.</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What is dictation software?</span></h1>\r\n<p class=\"align-left\"></p>\r\nWith the best dictation software, you can compose memos, emails, speeches, and other writing using voice translator speech to text. Some dictation apps also give you the power to control your computer or mobile device with spoken words, too, letting you open apps and navigate the web when you aren't able to or don't want to with your fingers. \r\n<p class=\"align-left\">Dictation apps have a variety of use cases. They're well known among the accessibility community, as not everyone has full and dexterous use of their fingers and hands for typing, moving a mouse, or tapping a touchscreen. They're also quite popular with productivity enthusiasts because once you get comfortable dictating, it's typically faster than typing. Dictating also enables multitasking. You can write while walking, cooking, or even breastfeeding.</p>\r\n<p class=\"align-left\">Some people also find that writing by dictating silences their internal editor. You might be more inclined to get all your thoughts out first and review them later, rather than revising ideas as you form them.</p>\r\n<p class=\"align-left\">In the last few years, dictation software has become more readily available, easier to use, and much less expensive. Also sometimes called voice-to-text apps or voice recognition apps, these tools turn your spoken words into writing on the screen quickly and accurately. </p>\r\n<p class=\"align-left\">Some best voice recognition software are standalone software programs while others are features that come inside other apps or operating systems. Take Google Docs Voice Typing, for example. It's a feature inside Google Docs, rather than a standalone app. You can use it to write in Google Docs as well as edit and format your text.<br /><br /><br /></p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Voice_Recognition.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1077,"logoURL":"https://old.roi4cio.com/fileadmin/content/deepVB.png","logo":true,"scheme":false,"title":"deepVB®","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"deepvbr","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p style=\"text-align: justify;\">Пассивная голосовая биометрия IVR</p>\r\n<p style=\"text-align: justify;\">Клиенты свободно общаются в разговоре на естественном языке с DiaManT®, в то время как deepVB® использует биометрические функции голосового отпечатка для идентификации клиентов в фоновом режиме, как они разговаривают</p>","shortDescription":"Идентифицируйте клиентов через их уникальный биометрический голосовой отпечаток, в фоновом режиме, когда они свободно говорят с Виртуальным агентом.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"deepVB®","keywords":"отпечатка, функции, голосового, биометрические, deepVB, использует, разговаривают, режиме","description":"<p style=\"text-align: justify;\">Пассивная голосовая биометрия IVR</p>\r\n<p style=\"text-align: justify;\">Клиенты свободно общаются в разговоре на естественном языке с DiaManT®, в то время как deepVB® использует биометрические функции голосового отпечатка","og:title":"deepVB®","og:description":"<p style=\"text-align: justify;\">Пассивная голосовая биометрия IVR</p>\r\n<p style=\"text-align: justify;\">Клиенты свободно общаются в разговоре на естественном языке с DiaManT®, в то время как deepVB® использует биометрические функции голосового отпечатка","og:image":"https://old.roi4cio.com/fileadmin/content/deepVB.png"},"eventUrl":"","translationId":7044,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4432,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/corax.png","logo":true,"scheme":false,"title":"Corax | Cyber risk modelling and prediction platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"corax-cyber-risk-modelling-and-prediction-platform","companyTitle":"Corax","companyTypes":["supplier","vendor"],"companyId":6846,"companyAlias":"corax","description":"Corax’s rich data foundation is created through expert ingestion and analysis of third party datasets, including threat intelligence, internet performance data and loss data, and using proprietary Corax automated ‘outside in’ discovery tools that identify detailed characteristics of the technology and security environment of individual companies and their internet connections with other companies.\r\n<ul><li>Technology and Security data</li><li>Loss data</li><li>Real time Threat Intelligence & Vulnerability data</li><li>Real time Business Interruption / Internet</li><li>Commercial Information</li><li>Custom analytics</li><li>Clients able to modify our model to develop their own view of risk</li></ul>\r\n<span style=\"font-weight: bold;\">AI-enabled probabilistic modelling.</span> Prediction and expected costs of data theft and IT disruption\r\n<span style=\"font-weight: bold;\">Rich, granular, expert-created standardised dataset.</span> Detailed technology, security and loss data on millions of companies\r\n<span style=\"font-weight: bold;\">Scalable technology platform.</span> Continuous daily, automatic addition and update of thousands of companies in the database\r\n<p class=\"align-center\">Data, reports and modelled outputs on:</p>\r\n<ul><li>Cyber risk of individual and groups of companies, including assessment and benchmarking of cyber hygiene and technology resilience; and prediction and expected costs of data theft and IT disruption.</li><li>Scenarios relating to cyber events, security vulnerabilities, technologies and vendors.</li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Delivered via web access or API integration</span></p>\r\nCorax is the leading and largest source of cyber exposure data and predicted loss costs of breach and network outage events. \r\nCorax’s rich data foundation is created through expert selection, ingestion and analysis of third party datasets, including threat intelligence, internet performance data and loss data, and using proprietary automated discovery tools that identify detailed characteristics of the technology and security environment of individual companies and their interconnections with other companies. \r\nModelled data is developed within a proprietary AI probabilistic engine to predict the expected cost of data compromise and IT disruption with unprecedented accuracy.\r\n<p class=\"align-left\"><br /><br /></p>","shortDescription":"Data, modelling and analytics on the cyber exposure of millions of interconnected companies worldwide, delivered in real-time through an AI-enabled platform.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Corax | Cyber risk modelling and prediction platform","keywords":"","description":"Corax’s rich data foundation is created through expert ingestion and analysis of third party datasets, including threat intelligence, internet performance data and loss data, and using proprietary Corax automated ‘outside in’ discovery tools that identify deta","og:title":"Corax | Cyber risk modelling and prediction platform","og:description":"Corax’s rich data foundation is created through expert ingestion and analysis of third party datasets, including threat intelligence, internet performance data and loss data, and using proprietary Corax automated ‘outside in’ discovery tools that identify deta","og:image":"https://old.roi4cio.com/fileadmin/user_upload/corax.png"},"eventUrl":"","translationId":4433,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"},{"id":467,"title":"Network Forensics","alias":"network-forensics","description":" Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network traffic is transmitted and then lost, so network forensics is often a pro-active investigation.\r\nNetwork forensics generally has two uses. The first, relating to security, involves monitoring a network for anomalous traffic and identifying intrusions. An attacker might be able to erase all log files on a compromised host; network-based evidence might therefore be the only evidence available for forensic analysis. The second form relates to law enforcement. In this case analysis of captured network traffic can include tasks such as reassembling transferred files, searching for keywords and parsing human communication such as emails or chat sessions.\r\nTwo systems are commonly used to collect network data; a brute force "catch it as you can" and a more intelligent "stop look listen" method.\r\nNetwork forensics is a comparatively new field of forensic science. The growing popularity of the Internet in homes means that computing has become network-centric and data is now available outside of disk-based digital evidence. Network forensics can be performed as a standalone investigation or alongside a computer forensics analysis (where it is often used to reveal links between digital devices or reconstruct how a crime was committed).\r\nMarcus Ranum is credited with defining Network forensics as "the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents".\r\nCompared to computer forensics, where evidence is usually preserved on disk, network data is more volatile and unpredictable. Investigators often only have material to examine if packet filters, firewalls, and intrusion detection systems were set up to anticipate breaches of security.\r\nSystems used to collect network data for forensics use usually come in two forms:\r\n<ul><li>"Catch-it-as-you-can" – This is where all packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage.</li><li>"Stop, look and listen" – This is where each packet is analyzed in a rudimentary way in memory and only certain information saved for future analysis. This approach requires a faster processor to keep up with incoming traffic.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">Why is network forensics important?</span>\r\nNetwork forensics is important because so many common attacks entail some type of misuse of network resources.\r\n<span style=\"font-weight: bold;\">What are the different ways in which the network can be attacked?</span>\r\nAttacks typically target availability confidentiality and integrity. Loss of any one of these items constitutes a security breach.\r\n<span style=\"font-weight: bold;\">Where is the best place to search for information?</span>\r\nInformation can be found by either doing a live analysis of the network, analyzing IDS information, or examining logs that can be found in routers and servers.\r\n<span style=\"font-weight: bold;\">How does a forensic analyst know how deeply to look for information?</span>\r\nSome amount of information can be derived from looking at the skill level of the attacker. Attackers with little skill are much less likely to use advanced hiding techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Forensics.png"},{"id":836,"title":"DRP - Digital Risk Protection","alias":"drp-digital-risk-protection","description":"Digital risks exist on social media and web channels, outside most organization's line of visibility. Organizations struggle to monitor these external, unregulated channels for risks targeting their business, their employees or their customers.\r\nCategories of risk include cyber (insider threat, phishing, malware, data loss), revenue (customer scams, piracy, counterfeit goods) brand (impersonations, slander) and physical (physical threats, natural disasters).\r\nDue to the explosive growth of digital risks, organizations need a flexible, automated approach that can monitor digital channels for organization-specific risks, trigger alerts and remediate malicious posts, profiles, content or apps.\r\nDigital risk protection (DRP) is the process of protecting social media and digital channels from security threats and business risks such as social engineering, external fraud, data loss, insider threat and reputation-based attacks. DRP reduces risks that emerge from digital transformation, protecting against the unwanted exposure of a company’s data, brand, and attack surface and providing actionable insight on threats from the open, deep, and dark web.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a digital risk?</span>\r\nDigital risks can take many forms. Most fundamentally, what makes a risk digital? Digital risk is any risk that plays out in one form or another online, outside of an organization’s IT infrastructure and beyond the security perimeter. This can be a cyber risk, like a phishing link or ransomware via LinkedIn, but can also include traditional risks with a digital component, such as credit card money flipping scams on Instagram.\r\n<span style=\"font-weight: bold;\">What are the features of Digital Risk Protection?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">The features are:</span></span>\r\n<ul><li>Protecting yourself from digital risk by building a watchtower, not a wall. A new Forrester report identifies two objectives for any digital risk protection effort: identifying risks and resolving them.</li><li>Digital risk comes in many forms, like unauthorized data disclosure, threat coordination from cybercriminals, risks inherent in the technology you use and in your third-party associates and even from your own employees.</li><li>The best solutions should automate the collection of data and draw from many sources; should have the capabilities to map, monitor, and mitigate digital risk and should be flexible enough to be applied in multiple use cases — factors that many threat intelligence solutions excel in.</li></ul>\r\n<span style=\"font-weight: bold;\">What elements constitute a digital risk?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Unauthorized Data Disclosure</span></span>\r\nThis includes the theft or leakage of any kind of sensitive data, like the personal financial information of a retail organization’s customers or the source code for a technology company’s proprietary products.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Threat Coordination Activity</span></span>\r\nMarketplaces and criminal forums on the dark web or even just on the open web are potent sources of risk. Here, a vulnerability identified by one group or individual who can’t act on it can reach the hands of someone who can. This includes the distribution of exploits in both targeted and untargeted campaigns.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supply Chain Issues</span></span>\r\nBusiness partners, third-party suppliers, and other vendors who interact directly with your organization but are not necessarily following the same security practices can open the door to increased risk.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Employee Risk</span></span>\r\nEven the most secure and unbreakable lock can still easily be opened if you just have the right key. Through social engineering efforts, identity or access management and manipulation, or malicious insider attacks coming from disgruntled employees, even the most robust cybersecurity program can be quickly subverted.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Technology Risks</span></span>\r\nThis broad category includes all of the risks you must consider across the different technologies your organization might rely on to get your work done, keep it running smoothly, and tell people about it.\r\n<ul><li><span style=\"font-weight: bold;\">Physical Infrastructure:</span> Countless industrial processes are now partly or completely automated, relying on SCADA, DCS, or PLC systems to run smoothly — and opening them up to cyber- attacks (like the STUXNET attack that derailed an entire country’s nuclear program).</li><li><span style=\"font-weight: bold;\">IT Infrastructure:</span> Maybe the most commonsensical source of digital risk, this includes all of the potential vulnerabilities in your software and hardware. The proliferation of the internet of things devices poses a growing and sometimes underappreciated risk here.</li><li><span style=\"font-weight: bold;\">Public-Facing Presence:</span> All of the points where you interact with your customers and other public entities, whether through social media, email campaigns, or other marketing strategies, represent potential sources of risk.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Digital_Risk_Protection.png"},{"id":840,"title":"ICS/SCADA Cyber Security","alias":"icsscada-cyber-security","description":"SCADA security is the practice of protecting supervisory control and data acquisition (SCADA) networks, a common framework of control systems used in industrial operations. These networks are responsible for providing automated control and remote human management of essential commodities and services such as water, natural gas, electricity and transportation to millions of people. They can also be used to improve the efficiencies and quality in other less essential (but some would say very important!) real-world processes such as snowmaking for ski resorts and beer brewing. SCADA is one of the most common types of industrial control systems (ICS).\r\nThese networks, just like any other network, are under threat from cyber-attacks that could bring down any part of the nation's critical infrastructure quickly and with dire consequences if the right security is not in place. Capital expenditure is another key concern; SCADA systems can cost an organization from tens of thousands to millions of dollars. For these reasons, it is essential that organizations implement robust SCADA security measures to protect their infrastructure and the millions of people that would be affected by the disruption caused by an external attack or internal error.\r\nSCADA security has evolved dramatically in recent years. Before computers, the only way to monitor a SCADA network was to deploy several people to each station to report back on the state of each system. In busier stations, technicians were stationed permanently to manually operate the network and communicate over telephone wires.\r\nIt wasn't until the introduction of the local area network (LAN) and improvements in system miniaturization that we started to see advances in SCADA development such as the distributed SCADA network. Next came networked systems that were able to communicate over a wide area network (WAN) and connect many more components together.\r\nFrom local companies to federal governments, every business or organization that works with SCADA systems are vulnerable to SCADA security threats. These threats can have wide-reaching effects on both the economy and the community. Specific threats to SCADA networks include the following:\r\n<span style=\"font-weight: bold;\">Hackers.</span> Individuals or groups with malicious intent could bring a SCADA network to its knees. By gaining access to key SCADA components, hackers could unleash chaos on an organization that can range from a disruption in services to cyber warfare.\r\n<span style=\"font-weight: bold;\">Malware.</span> Malware, including viruses, spyware and ransomware can pose a risk to SCADA systems. While malware may not be able to specifically target the network itself, it can still pose a threat to the key infrastructure that helps to manage the SCADA network. This includes mobile SCADA applications that are used to monitor and manage SCADA systems.\r\n<span style=\"font-weight: bold;\">Terrorists.</span> Where hackers are usually motivated by sordid gain, terrorists are driven by the desire to cause as much mayhem and damage as possible.\r\n<span style=\"font-weight: bold;\">Employees.</span> Insider threats can be just as damaging as external threats. From human error to a disgruntled employee or contractor, it is essential that SCADA security addresses these risks.\r\nManaging today's SCADA networks can be a challenge without the right security precautions in place. Many networks are still without the necessary detection and monitoring systems and this leaves them vulnerable to attack. Because SCADA network attacks exploit both cyber and physical vulnerabilities, it is critical to align cybersecurity measures accordingly.","materialsDescription":"<span style=\"font-weight: bold;\">What is the difference between ICS/SCADA cybersecurity and information security?</span>\r\nAutomated process control systems (SCADA) have a lot of differences from “traditional” corporate information systems: from the destination, specific data transfer protocols and equipment used and ending with the environment in which they operate. In corporate networks and systems, as a rule, the main protected resource is information that is processed, transmitted and stored in automated systems, and the main goal is to ensure its confidentiality. In ICS, the protected resource, first of all, is the technological process itself, and the main goal is to ensure its continuity (accessibility of all nodes) and integrity (including information transmitted between the nodes of the ICS). Moreover, the field of potential risks and threats to ICS, in comparison with corporate systems, expands with risks of potential damage to life and health of personnel and the public, damage to the environment and infrastructure. That is why it is incorrect to talk about “information security” in relation to ICS/SCADA. In English sources, the term “cybersecurity” is used for this, a direct translation of which (cybersecurity) is increasingly found in our market in relation to the protection of process control systems.\r\n<span style=\"font-weight: bold;\">Is it really necessary?</span>\r\nIt is necessary. There are a number of myths about process control systems, for example: “process control systems are completely isolated from the outside world”, “process control systems are too specific for someone to crack”, “process control systems are reliably protected by the developer”, or even “No one will ever try us, hacking us is not interesting. ” All this is no longer true. Many modern distributed process control systems have one or another connection with the corporate network, even if the system owners are unaware of this. Communication with the outside world greatly simplifies the task of the attacker, but does not remain the only possible option. Automated process control software and data transfer protocols are, as a rule, very, very insecure against cyber threats. This is evidenced by numerous articles and reports of experts involved in the study of the protection of industrial control systems and penetration tests. The PHDays III section on hacking automated process control systems impressed even ardent skeptics. Well, and, of course, the argument “they have NOT attacked us, therefore they will not” - can hardly be considered seriously. Everyone has heard about Stuxnet, which dispelled almost all the myths about the safety of ICS at once.\r\n<span style=\"font-weight: bold;\">Who needs this?</span>\r\nWith the phrase ICS/SCADA, most imagine huge plants, automated CNC machines or something similar. However, the application of process control systems is not limited to these objects - in the modern age of automation, process control systems are used everywhere: from large production facilities, the oil and gas industry, transport management to smart home systems. And, by the way, with the protection of the latter, as a rule, everything can be much worse, because the developer silently and imperceptibly shifts responsibility to the shoulders of the user.\r\nOf course, some of the objects with automated process control systems are more interesting for attackers, others less. But, given the ever-growing number of vulnerabilities discovered and published in the ICS, the spread of "exclusive" (written for specific protocols and ICS software) malware, considering your system safe "by default" is unreasonable.\r\n<span style=\"font-weight: bold;\">Are ICS and SCADA the same thing?</span>\r\nNo. SCADA systems (supervisory control and data acquisition, supervisory control and data collection) are part of the control system. Usually, a SCADA system means centralized control and management systems with the participation of a person as a whole system or a complex of industrial control systems. SCADA is the central link between people (human-machine interfaces) and PLC levels (programmable logic controller) or RTU (remote terminal unit).\r\n<span style=\"font-weight: bold;\">What is ICS/SCADA cybersecurity?</span>\r\nIn fact, ICS cybersecurity is a process similar to “information security” in a number of properties, but very different in details. And the devil, as you know, lies in them. ICS/SCADA also has similar information security-related processes: asset inventory, risk analysis and assessment, threat analysis, security management, change management, incident response, continuity, etc. But these processes themselves are different.<br />The cyber security of ICSs has the same basic target qualities - confidentiality, integrity and accessibility, but the significance and point of application for them are completely different. It should be remembered that in ICS/SCADA we, first of all, protect the technological process. Beyond this - from the risks of damage to human health and life and the environment.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SCADA_Cyber_Security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4964,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IoTen.png","logo":true,"scheme":false,"title":"SecurePush IoTen","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"securepush-ioten","companyTitle":"SecurePush","companyTypes":["vendor"],"companyId":5324,"companyAlias":"securepush","description":"<span style=\"font-weight: bold;\">IoTen/Coffee.</span> More Profitable Coffee Operations\r\nFitted to existing or new coffee machines, IoTen™ provides coffee roasters or coffeehouse chains with business insights that enable measurement-based management of coffee inventories, coffee quality and machine maintenance.\r\n<span style=\"font-weight: bold;\">IoTen/Keyless.</span> Keyless Doors, Safes and Locks\r\nBiometric authentication for physical access control by IoTen™ provides manufacturers with ready-made solutions for connecting doors, locks and safes. Integrating IoTen significantly shortens the development cycle enabling OEMs to offer connected products ahead of the competition.\r\n<span style=\"font-weight: bold;\">IoTen/Auto.</span> Automotive Aftermarket Innovations\r\nIoTen™ technology opens new opportunities for the automotive aftermarket by enabling new connected offerings to secure access to motor vehicles with biometric authentication. Advanced IoTen features provide smart functionality such as restricting hours of vehicle access per driver even when out of internet range.","shortDescription":"The IoTen mobile app by Securepush, enables users to access IoTen devices.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":12,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SecurePush IoTen","keywords":"","description":"<span style=\"font-weight: bold;\">IoTen/Coffee.</span> More Profitable Coffee Operations\r\nFitted to existing or new coffee machines, IoTen™ provides coffee roasters or coffeehouse chains with business insights that enable measurement-based management of coffee ","og:title":"SecurePush IoTen","og:description":"<span style=\"font-weight: bold;\">IoTen/Coffee.</span> More Profitable Coffee Operations\r\nFitted to existing or new coffee machines, IoTen™ provides coffee roasters or coffeehouse chains with business insights that enable measurement-based management of coffee ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IoTen.png"},"eventUrl":"","translationId":4965,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":178,"title":"IoT - Internet of Things","alias":"iot-internet-of-things","description":"The Internet of things (IoT) is the extension of Internet connectivity into physical devices and everyday objects. Embedded with electronics, Internet connectivity, and other forms of hardware (such as sensors), these devices can communicate and interact with others over the Internet, and they can be remotely monitored and controlled.\r\nThe definition of the Internet of things has evolved due to the convergence of multiple technologies, real-time analytics, machine learning, commodity sensors, and embedded systems. Traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation). and others all contribute to enabling the Internet of things. In the consumer market, IoT technology is most synonymous with products pertaining to the concept of the "smart home", covering devices and appliances (such as lighting fixtures, thermostats, home security systems and cameras, and other home appliances) that support one or more common ecosystems, and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers.\r\nThe IoT concept has faced prominent criticism, especially in regards to privacy and security concerns related to these devices and their intention of pervasive presence.","materialsDescription":"<span style=\"font-weight: bold;\">What is the Internet of Things (IoT)?</span>\r\nThe Internet of things refers to the network of things (physical objects) that can be connected to the Internet to collect and share data without human-to-human or human-to-computer interaction.\r\n<span style=\"font-weight: bold;\">Why is it called the Internet of Things?</span>\r\nThe term Internet of things was coined by Kevin Ashton in 1999. Stemming from Kevin Ashton’s experience with RFID, the term Internet of things originally described the concept of tagging every object in a person’s life with machine-readable codes. This would allow computers to easily manage and inventory all of these things.\r\nThe term IoT today has evolved to a much broader prospect. It now encompasses ubiquitous connectivity, devices, sensors, analytics, machine learning, and many other technologies.\r\n<span style=\"font-weight: bold;\">What is an IoT solution?</span>\r\nAn IoT solution is a combination of devices or other data sources, outfitted with sensors and Internet connected hardware to securely report information back to an IoT platform. This information is often a physical metric which can help users answer a question or solve a specific problem.\r\n<span style=\"font-weight: bold;\">What is an IoT Proof of Concept (PoC)?</span>\r\nThe purpose of a PoC is to experiment with a solution in your environment, collect data, and evaluate performance from a set timeline on a set budget. A PoC is a low-risk way to introduce IoT to an organization.\r\n<span style=\"font-weight: bold;\">What is an IoT cloud platform?</span>\r\nAn IoT platform provides users with one or more of these key elements — visualization tools, data security features, a workflow engine and a custom user interface to utilize the information collected from devices and other data sources in the field. These platforms are based in the cloud and can be accessed from anywhere.\r\n<span style=\"font-weight: bold;\">What is industrial equipment monitoring?</span>\r\nIndustrial equipment monitoring uses a network of connected sensors - either native to a piece of equipment or retrofitted - to inform owners/operators of a machine’s output, component conditions, need for service or impending failure. Industrial equipment monitoring is an IoT solution which can utilize an IoT platform to unify disparate data and enable decision-makers to respond to real-time data.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/IoT_-_Internet_of_Things.png"},{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"},{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4984,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/sonavation_logo.jpg","logo":true,"scheme":false,"title":"Sonavation SonicTouch","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sonavation-sonictouch","companyTitle":"Sonavation","companyTypes":["vendor"],"companyId":5332,"companyAlias":"sonavation","description":"<span style=\"font-weight: bold;\">The most advanced security and ease of integration into mobile and IoT devices</span>\r\nIncorporating Sonavation’s 3D ultrasound sensor, <span style=\"font-weight: bold;\">SonicTouch™</span> is a FIDO-ready ultrasound biometric authenticator system-in-package module uniquely designed to deliver the next generation of identity security and ease of integration into mobile and IoT devices.\r\nWith its Match-In-Sensor architecturally flexible design, SonicTouch is the industry’s first full-stack solution designed with the highest level end-to-end encryption architecture that provides a fully encapsulated locked-down solution within the module. Combined with upgradable anti-spoofing and level 3+ matching systems, secure transactional solutions can be deployed by mobile and IoT device manufacturers, mobile network operators and application developers.\r\nSonicTouch is biometric Privacy by Design.\r\n<span style=\"font-weight: bold;\">The SonicTouch Advantage:</span>\r\n<ul><li>A trusted FIDO-ready authenticator module</li><li>The authenticity of the security chain of custody proving absolute certainty of identity</li><li>Unique singular acoustic fingerprint signature that never leaves the device</li><li>High accuracy extract and match using secure level 3 data</li><li>Works seamlessly through various protective display glass thicknesses</li><li>Eliminates the need for mobile device manufacturers to etch out or cut protective display glass, thus maintaining reliability</li><li>Ultra-thin sensor: ~0.4mm</li><li>Full developer engineering ecosystem including OEM support, API’s, RDK and SDK for easy integration into mobile and IoT</li></ul>","shortDescription":"SonicTouch is a comprehensive biometric authentication solution.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Sonavation SonicTouch","keywords":"","description":"<span style=\"font-weight: bold;\">The most advanced security and ease of integration into mobile and IoT devices</span>\r\nIncorporating Sonavation’s 3D ultrasound sensor, <span style=\"font-weight: bold;\">SonicTouch™</span> is a FIDO-ready ultrasound biometric au","og:title":"Sonavation SonicTouch","og:description":"<span style=\"font-weight: bold;\">The most advanced security and ease of integration into mobile and IoT devices</span>\r\nIncorporating Sonavation’s 3D ultrasound sensor, <span style=\"font-weight: bold;\">SonicTouch™</span> is a FIDO-ready ultrasound biometric au","og:image":"https://old.roi4cio.com/fileadmin/user_upload/sonavation_logo.jpg"},"eventUrl":"","translationId":4985,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"},{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4986,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/SOTI_ONE_Platform.png","logo":true,"scheme":false,"title":"SOTI ONE Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"soti-one-platform","companyTitle":"SOTI","companyTypes":["vendor"],"companyId":5333,"companyAlias":"soti","description":"Comprised of seven revolutionary products, the <span style=\"font-weight: bold;\">SOTI ONE Platform</span> helps businesses remove functional silos, eliminate downtime, build apps faster, manage all mobile and IoT devices in one place and deliver actionable insights. When everything is connected, the SOTI ONE Platform makes mobile and IoT business operations simpler, smarter and more reliable.\r\n<span style=\"font-weight: bold;\">SOTI MOBICONTROL</span>\r\nProtect your workers and your bottom line with SOTI MobiControl. SOTI MobiControl makes Enterprise Mobility Management (EMM) easier than ever before. It empowers companies to securely manage any device or endpoint with any form-factor and any operating system throughout their entire lifecycle; from deployment to retirement. It controls all aspects of business mobility, from tracking physical assets to managing applications and content, all while keeping devices and data safe and secure.\r\nNow featuring high-end scalability using SOTI’s new XTreme technology, a new Android Scripting Engine that supports JavaScript, enabling administrators to script complex management actions that can execute autonomously.\r\n<span style=\"font-weight: bold;\">SOTI ASSIST</span>\r\nSOTI Assist is the industry’s first diagnostic help desk solution that is ‘purpose-built’ and designed for the mobile-first era. It features SOTI’s award-winning remote control technology, making it easy and efficient for technicians to analyze, troubleshoot and resolve mobile device and app issues from anywhere at any time. SOTI Assist keeps your workers working and your help desk staff stress-free and productive.\r\n<span style=\"font-weight: bold;\">SOTI SNAP</span>\r\nSOTI Snap is a cross-platform mobile app development solution built for businesses. It empowers organizations to build the mobile apps they need quickly and cost-efficiently, without the need for specialized resources. Anyone can build an app by dragging and dropping the widgets they need so businesses can prototype, iterate and deploy apps in minutes or hours, not days or weeks. SOTI Snap takes the cost, complexity and coding out of mobile app development for your business.\r\n<span style=\"font-weight: bold;\">SOTI INSIGHT</span>\r\nSOTI Insight is a business intelligence solution that delivers out-of-the-box analytics on an app, data, network and location usage, and operations. SOTI Insight makes it easy for companies to gain insights into the performance of their mobility deployments.\r\n<span style=\"font-weight: bold;\">SOTI CONNECT</span>\r\nSOTI Connect is an IoT solution built for business that provides complete lifecycle management of IoT devices within an organization. It’s highly flexible, data-driven architecture means that new IoT devices can be quickly supported and managed, reducing the time-to-market for IoT initiatives. This first release of SOTI Connect focuses on the management and support of specialized printers used for business-critical tasks.\r\n<span style=\"font-weight: bold;\">SOTI IDENTITY</span>\r\nSOTI Identity enables simple and secure access to the SOTI ONE Platform suite of solutions. It provides centralized user authentication, single sign-on and role management, empowering organizations to create seamless, integrated mobility management workflows.\r\n<span style=\"font-weight: bold;\">SOTI CENTRAL</span>\r\nNetworking with industry professionals, along with product experts is important. SOTI Central is an online community for SOTI partners and customers and makes it easy for customers to connect, communicate and collaborate with product experts and other solutions providers, to get the most out of their mobility and IoT deployments.","shortDescription":"The SOTI ONE Platform is an integrated suite of solutions designed to reduce the cost, complexity, and downtime related to business-critical mobility.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SOTI ONE Platform","keywords":"","description":"Comprised of seven revolutionary products, the <span style=\"font-weight: bold;\">SOTI ONE Platform</span> helps businesses remove functional silos, eliminate downtime, build apps faster, manage all mobile and IoT devices in one place and deliver actionable insi","og:title":"SOTI ONE Platform","og:description":"Comprised of seven revolutionary products, the <span style=\"font-weight: bold;\">SOTI ONE Platform</span> helps businesses remove functional silos, eliminate downtime, build apps faster, manage all mobile and IoT devices in one place and deliver actionable insi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/SOTI_ONE_Platform.png"},"eventUrl":"","translationId":4987,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"},{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4760,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/cisco_logo.png","logo":true,"scheme":false,"title":"Cisco Connected Mobile Experiences (CMX)","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":125,"alias":"cisco-connected-mobile-experiences-cmx","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"Cisco Connected Mobile Experiences turns the industry-leading wireless infrastructure into an intelligent platform that not only provides a reliable connection, but also provides analytic customer information that you can use to grow your business. As the undisputed leader in the Wi-Fi market with over seven years of experience in Wi-Fi location, Cisco is a trusted partner\r\nCisco Connected Mobile Experiences (CMX) uses a high-density wireless network with the Cisco® Mobility Services Engine, which enables organizations to collect aggregated location data for Wi-Fi users. CMX Analytics is a data visualization module that helps organizations use the network as a source of data for business analysis, highlight behavioral patterns and trends, which, in turn, can help businesses make informed decisions about how to improve customer service and improve their quality. service.<br /><span style=\"font-weight: bold;\"><br />Benefits</span>\r\nWith the CMX solution, you can:\r\n<ul><li>Analyze business performance and optimize marketing activities through quantitative analysis of activity at your facility, for example, determining the patency of a particular store</li></ul>\r\n<ul><li>Increase the profitability per square meter by optimizing the location using the detailed traffic of the outlet, the conversion rate of visitors into customers, as well as other information, up to specific zones, as well as quantifying the implementation of changes</li></ul>\r\n<ul><li>Increase customer satisfaction by ensuring that there are enough staff during peak periods</li></ul>\r\n<ul><li>Increase profitability using location data for optimal mobile marketing campaigns.</li></ul>","shortDescription":"Thanks to Cisco CMX solutions, Wi-Fi from a familiar means of accessing the network can turn into a powerful tool for analytics, encouraging customers and generating additional profit.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Connected Mobile Experiences (CMX)","keywords":"","description":"Cisco Connected Mobile Experiences turns the industry-leading wireless infrastructure into an intelligent platform that not only provides a reliable connection, but also provides analytic customer information that you can use to grow your business. As the undi","og:title":"Cisco Connected Mobile Experiences (CMX)","og:description":"Cisco Connected Mobile Experiences turns the industry-leading wireless infrastructure into an intelligent platform that not only provides a reliable connection, but also provides analytic customer information that you can use to grow your business. As the undi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/cisco_logo.png"},"eventUrl":"","translationId":4761,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":3,"title":"MDM - Mobile Device Management","alias":"mdm-mobile-device-management","description":" <span style=\"font-weight: bold; \">Mobile device management (MDM)</span> is an industry term for the administration of mobile devices, such as smartphones, tablet computers and laptops. Device management system is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices.\r\nMDM is typically a deployment of a combination of on-device applications and configurations, corporate policies and certificates, and backend infrastructure, for the purpose of simplifying and enhancing the IT management of end user devices. In modern corporate IT environments, the sheer number and diversity of managed devices (and user behavior) has motivated device management tools that allow the management of devices and users in a consistent and scalable way. The overall role of MDM is to increase device supportability, security, and corporate functionality while maintaining some user flexibility.\r\nMany organizations administer devices and applications using MDM products/services. Mobile device management software primarily deals with corporate data segregation, securing emails, securing corporate documents on devices, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories. MDM implementations may be either on-premises or cloud-based.\r\nMDM functionality can include over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. Most recently laptops and desktops have been added to the list of systems supported as Mobile Device Management becomes more about basic device management and less about the mobile platform itself. \r\nSome of the <span style=\"font-weight: bold; \">core functions</span> of mobile management software include:\r\n<ul><li>Ensuring that diverse user equipment is configured to a consistent standard/supported set of applications, functions, or corporate policies</li><li>Updating equipment, applications, functions, or policies in a scalable manner</li><li>Ensuring that users use applications in a consistent and supportable manner</li><li>Ensuring that equipment performs consistently</li><li>Monitoring and tracking equipment (e.g. location, status, ownership, activity)</li><li>Being able to efficiently diagnose and troubleshoot equipment remotely</li></ul>\r\nDevice management solutions are leveraged for both company-owned and employee-owned (Bring Your Own Device) devices across the enterprise or mobile devices owned by consumers. Consumer demand for BYOD is now requiring a greater effort for MDM and increased security for both the devices and the enterprise they connect to, especially since employers and employees have different expectations concerning the types of restrictions that should be applied to mobile devices.\r\nBy controlling and protecting the data and configuration settings of all mobile devices in a network, enterprise device management software can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.\r\nWith mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance. The use of mobile device management across continues to grow at a steady pace, and is likely to register a compound annual growth rate (CAGR) of nearly 23% through 2028. The US will continue to be the largest market for mobile device management globally. ","materialsDescription":"<h1 class=\"align-center\">How Mobile Device Management works?</h1>\r\nMobile device management relies on endpoint software called an MDM agent and an MDM server that lives in a data center. IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.\r\nSimilarly, IT administrators can deploy applications to managed devices through the MDM server. Mobile software management emerged in the early 2000s as a way to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device trend, which fueled further interest in MDM.\r\nModern MDM management software supports not only smartphones but also tablets, Windows 10 and macOS computers and even some internet of things devices. The practice of using MDM to control PCs is known as unified endpoint management.\r\n<h1 class=\"align-center\">Key Benefits of Mobile Device Management Software</h1>\r\n<span style=\"font-weight: bold;\">Reduce IT Administration.</span> Instead of manually configuring and testing each new mobile device, mobile device software takes care of the repetitive tasks for you. That gives IT staff more time to work on challenging projects that improve productivity.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Improve End-user Productivity. </span>Mobile device management helps end users become more productive because the process of requesting new mobile devices can be cut down from days to hours. Once end users have the device in their hands, mobile device management program helps them get set up on their corporate network much faster. That means less time waiting to get access to email, internal websites, and calendars.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Reduce IT Risk.</span> Mobile devices, especially if your organization allows “Bring Your Own Device” (BYOD), create increased risk exposures. Typically, IT managers respond to these risks in one of two ways, neither of which help. First, you may say “no” to mobile device requests. That’s a fast way to become unpopular. Second, you may take a manual approach to review and oversee each device.<span style=\"font-weight: bold;\"></span> \r\n<span style=\"font-weight: bold;\">Enable Enterprise Growth. </span>If your enterprise added a thousand employees this quarter through hiring, acquisition, or other changes, could IT handle the challenge? If you’re honest, you can probably imagine going through plenty of struggles and missing SLAs. That kind of disappointment and missed service expectations make end users respect IT less. \r\nBy using enterprise device management thoroughly, you'll enable enterprise growth. You'll have the systems and processes to manage 100 users or 10,000 users. That means IT will be perceived as enabling growth not standing in the way.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_MDM_Mobile_Device_Management.png"},{"id":34,"title":"ITSM - IT Service Management","alias":"itsm-it-service-management","description":"<span style=\"font-weight: bold; \">IT service management (ITSM)</span> is the process of designing, delivering, managing, and improving the IT services an organization provides to its end users. ITSM is focused on aligning IT processes and services with business objectives to help an organization grow.\r\nITSM positions IT services as the key means of delivering and obtaining value, where an internal or external IT service provider works with business customers, at the same time taking responsibility for the associated costs and risks. ITSM works across the whole lifecycle of a service, from the original strategy, through design, transition and into live operation.\r\nTo ensure sustainable quality of IT services, ITSM establishes a set of practices, or processes, constituting a service management system. There are industrial, national and international standards for IT service management solutions, setting up requirements and good practices for the management system. \r\nITSM system is based on a set of principles, such as focusing on value and continual improvement. It is not just a set of processes – it is a cultural mindset to ensure that the desired outcome for the business is achieved. \r\n<span style=\"font-weight: bold; \">ITIL (IT Infrastructure Library)</span> is a framework of best practices and recommendations for managing an organization's IT operations and services. IT service management processes, when built based on the ITIL framework, pave the way for better IT service operations management and improved business. To summarize, ITIL is a set of guidelines for effective IT service management best practices. ITIL has evolved beyond the delivery of services to providing end-to-end value delivery. The focus is now on the co-creation of value through service relationships. \r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">ITSM processes typically include five stages, all based on the ITIL framework:</span></p>\r\n<span style=\"font-weight: bold; \">ITSM strategy.</span> This stage forms the foundation or the framework of an organization's ITSM process building. It involves defining the services that the organization will offer, strategically planning processes, and recognizing and developing the required assets to keep processes moving. \r\n<span style=\"font-weight: bold; \">Service design.</span> This stage's main aim is planning and designing the IT services the organization offers to meet business demands. It involves creating and designing new services as well as assessing current services and making relevant improvements.\r\n<span style=\"font-weight: bold; \">Service transition.</span> Once the designs for IT services and their processes have been finalized, it's important to build them and test them out to ensure that processes flow. IT teams need to ensure that the designs don't disrupt services in any way, especially when existing IT service processes are upgraded or redesigned. This calls for change management, evaluation, and risk management. \r\n<span style=\"font-weight: bold; \">Service operation. </span>This phase involves implementing the tried and tested new or modified designs in a live environment. While in this stage, the processes have already been tested and the issues fixed, but new processes are bound to have hiccups—especially when customers start using the services. \r\n<span style=\"font-weight: bold;\">Continual service improvement (CSI).</span> Implementing IT processes successfully shouldn't be the final stage in any organization. There's always room for improvement and new development based on issues that pop up, customer needs and demands, and user feedback.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Benefits of efficient ITSM processes</h1>\r\nIrrespective of the size of business, every organization is involved in IT service management in some way. ITSM ensures that incidents, service requests, problems, changes, and IT assets—in addition to other aspects of IT services—are managed in a streamlined way.\r\nIT teams in your organization can employ various workflows and best practices in ITSM, as outlined in ITIL. Effective IT service management can have positive effects on an IT organization's overall function.\r\nHere are the 10 key benefits of ITSM:\r\n<ul><li> Lower costs for IT operations</li><li> Higher returns on IT investments</li><li> Minimal service outages</li><li> Ability to establish well-defined, repeatable, and manageable IT processes</li><li> Efficient analysis of IT problems to reduce repeat incidents</li><li> Improved efficiency of IT help desk teams</li><li> Well-defined roles and responsibilities</li><li> Clear expectations on service levels and service availability</li><li> Risk-free implementation of IT changes</li><li> Better transparency into IT processes and services</li></ul>\r\n<h1 class=\"align-center\">How to choose an ITSM tool?</h1>\r\nWith a competent IT service management goal in mind, it's important to invest in a service desk solution that caters to your business needs. It goes without saying, with more than 150 service desk tools to choose from, selecting the right one is easier said than done. Here are a few things to keep in mind when choosing an ITSM products:\r\n<span style=\"font-weight: bold; \">Identify key processes and their dependencies. </span>Based on business goals, decide which key ITSM processes need to be implemented and chart out the integrations that need to be established to achieve those goals. \r\n<span style=\"font-weight: bold; \">Consult with ITSM experts.</span> Participate in business expos, webinars, demos, etc., and educate yourself about the various options that are available in the market. Reports from expert analysts such as Gartner and Forrester are particularly useful as they include reviews of almost every solution, ranked based on multiple criteria.\r\n<span style=\"font-weight: bold; \">Choose a deployment option.</span> Every business has a different IT infrastructure model. Selecting an on-premises or software as a service (SaaS IT service management) tool depends on whether your business prefers to host its applications and data on its own servers or use a public or private cloud.\r\n<span style=\"font-weight: bold; \">Plan ahead for the future.</span> Although it's important to consider the "needs" primarily, you shouldn't rule out the secondary or luxury capabilities. If the ITSM tool doesn't have the potential to adapt to your needs as your organization grows, it can pull you back from progressing. Draw a clear picture of where your business is headed and choose an service ITSM that is flexible and technology-driven.\r\n<span style=\"font-weight: bold;\">Don't stop with the capabilities of the ITSM tool.</span> It might be tempting to assess an ITSM tool based on its capabilities and features but it's important to evaluate the vendor of the tool. A good IT support team, and a vendor that is endorsed for their customer-vendor relationship can take your IT services far. Check Gartner's magic quadrant and other analyst reports, along with product and support reviews to ensure that the said tool provides good customer support.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_ITSM.png"},{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"},{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6299,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/SecurEnvoy.png","logo":true,"scheme":false,"title":"SecurEnvoy SecureIdentity Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"securenvoy-secureidentity-platform","companyTitle":"SecurEnvoy","companyTypes":["vendor"],"companyId":5558,"companyAlias":"securenvoy","description":"The SecureIdentity Platform allows organisations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time \r\n<b>Features:</b>\r\n<ul> <li><i>MFA.</i> SecureIdentity multi-factor authentication (MFA) provides the security of user identity by verifying that a person is who they claim to be, utilising something the user knows (Password/PIN), something they have (Software/Hardware Token) and something they are (Biometric/ Facial Recognition). </li> <li><i>IAM.</i> SecureIdentity IAM enforces access decisions around applications and data repositories. Our solution enhances security by blocking systems such as Shadow IT and by enforcing strong data boundaries and separation of duties. </li> <li><i>CASB.</i> SecureIdentity CASB allows for a layer of security between your traditional on-premise infrastructure and your cloud based SaaS, PaaS and IaaS components. </li> <li><i>IRAD.</i> Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time detailed analysis of the user interaction and allows risk s </li> <li><i>PAM.</i> SecureIdentity PAM provides an interactive broker between users and administrative sessions on protected endpoints. This allows users to gain privileged access to areas they are given permission to access in the Universal Directory, while never actually exposing the credentials to the user at all. </li> <li><i>DLP.</i> SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and everywhere in between including the cloud), which can prevent the loss of data from malware, insider threat and human error. </li> </ul>","shortDescription":"The SecureIdentity Platform allows organisations to provide verifiable trust in every activity they perform","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SecurEnvoy SecureIdentity Platform","keywords":"","description":"The SecureIdentity Platform allows organisations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time \r\n<b>Features:</","og:title":"SecurEnvoy SecureIdentity Platform","og:description":"The SecureIdentity Platform allows organisations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time \r\n<b>Features:</","og:image":"https://old.roi4cio.com/fileadmin/user_upload/SecurEnvoy.png"},"eventUrl":"","translationId":6299,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe. By focusing on the location, classification and monitoring of information at rest, in use and in motion, this solution can go far in helping an enterprise get a handle on what information it has, and in stopping the numerous leaks of information that occur each day. DLP is not a plug-and-play solution. The successful implementation of this technology requires significant preparation and diligent ongoing maintenance. Enterprises seeking to integrate and implement DLP should be prepared for a significant effort that, if done correctly, can greatly reduce risk to the organization. Those implementing the solution must take a strategic approach that addresses risks, impacts and mitigation steps, along with appropriate governance and assurance measures.","materialsDescription":" <span style=\"font-weight: bold;\">How to protect the company from internal threats associated with leakage of confidential information?</span>\r\nIn order to protect against any threat, you must first realize its presence. Unfortunately, not always the management of companies is able to do this if it comes to information security threats. The key to successfully protecting against information leaks and other threats lies in the skillful use of both organizational and technical means of monitoring personnel actions.\r\n<span style=\"font-weight: bold;\">How should the personnel management system in the company be organized to minimize the risks of leakage of confidential information?</span>\r\nA company must have a special employee responsible for information security, and a large department must have a department directly reporting to the head of the company.\r\n<span style=\"font-weight: bold;\">Which industry representatives are most likely to encounter confidential information leaks?</span>\r\nMore than others, representatives of such industries as industry, energy, and retail trade suffer from leaks. Other industries traditionally exposed to leakage risks — banking, insurance, IT — are usually better at protecting themselves from information risks, and for this reason they are less likely to fall into similar situations.\r\n<span style=\"font-weight: bold;\">What should be adequate measures to protect against leakage of information for an average company?</span>\r\nFor each organization, the question of protection measures should be worked out depending on the specifics of its work, but developing information security policies, instructing employees, delineating access to confidential data and implementing a DLP system are necessary conditions for successful leak protection for any organization. Among all the technical means to prevent information leaks, the DLP system is the most effective today, although its choice must be taken very carefully to get the desired result. So, it should control all possible channels of data leakage, support automatic detection of confidential information in outgoing traffic, maintain control of work laptops that temporarily find themselves outside the corporate network...\r\n<span style=\"font-weight: bold;\">Is it possible to give protection against information leaks to outsourcing?</span>\r\nFor a small company, this may make sense because it reduces costs. However, it is necessary to carefully select the service provider, preferably before receiving recommendations from its current customers.\r\n<span style=\"font-weight: bold;\">What data channels need to be monitored to prevent leakage of confidential information?</span>\r\nAll channels used by employees of the organization - e-mail, Skype, HTTP World Wide Web protocol ... It is also necessary to monitor the information recorded on external storage media and sent to print, plus periodically check the workstation or laptop of the user for files that are there saying should not.\r\n<span style=\"font-weight: bold;\">What to do when the leak has already happened?</span>\r\nFirst of all, you need to notify those who might suffer - silence will cost your reputation much more. Secondly, you need to find the source and prevent further leakage. Next, you need to assess where the information could go, and try to somehow agree that it does not spread further. In general, of course, it is easier to prevent the leakage of confidential information than to disentangle its consequences.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Leak_Prevention.png"},{"id":44,"title":"IAM - Identity and Access Management","alias":"iam-identity-and-access-management","description":"<span style=\"font-weight: bold; \">Identity management</span> (IdM), also known as <span style=\"font-weight: bold; \">identity and access management</span> (IAM or IdAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and Data Management.\r\nWith an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations. Identity and access management software offers role-based access control, which lets system administrators regulate access to systems or networks based on the roles of individual users within the enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create or modify a file. Roles are defined according to job competency, authority and responsibility within the enterprise.\r\nSystems used for identity and access management include single sign-on systems, multi-factor authentication and privileged access management (PAM). These technologies also provide the ability to securely store identity and profile data as well as data governance functions to ensure that only data that is necessary and relevant is shared. IAM systems can be deployed on premises, provided by a third-party vendor through a cloud-based subscription model or deployed in a hybrid cloud.\r\n<span style=\"font-weight: bold; \">Basic components of IAM.</span> On a fundamental level, IAM encompasses the following components:\r\n<ul><li>How individuals are identified in a system.</li><li>How roles are identified in a system and how they are assigned to individuals.</li><li>Adding, removing and updating individuals and their roles in a system.</li><li>Assigning levels of access to individuals or groups of individuals.</li><li>Protecting the sensitive data within the system and securing the system itself.</li></ul>\r\nAccess identity management system should consist of all the necessary controls and tools to capture and record user login information, manage the enterprise database of user identities and orchestrate the assignment and removal of access privileges. That means that systems used for IAM should provide a centralized directory service with oversight as well as visibility into all aspects of the company user base.\r\nTechnologies for identity access and management should simplify the user provisioning and account setup process. User access management software should reduce the time it takes to complete these processes with a controlled workflow that decreases errors as well as the potential for abuse while allowing automated account fulfillment. An identity and access management system should also allow administrators to instantly view and change access rights.\r\nIAM systems should be used to provide flexibility to establish groups with specific privileges for specific roles so that access rights based on employee job functions can be uniformly assigned. Identity access management software should also provide request and approval processes for modifying privileges because employees with the same title and job location may need customized, or slightly different, access.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What is the difference between identity and access management?</span></h1>\r\nAfter authentication, there needs to be an access control decision. The decision is based on the information available about the user. The difference between identity management and access management is thus:\r\n<ul><li>Identity Management is about managing the attributes related to the user.</li><li>Access Management is about evaluating the attributes based on policies and making Yes/No decisions.</li></ul>\r\nThere are three types of Access Control Systems: \r\n<ul><li>Discretionary Access Control (DAC)</li><li>Mandatory Access Control (MAC)</li><li>Role-Based Access Control (RBAC)</li></ul>\r\n<h1 class=\"align-center\">What are the main benefits of identity management?</h1>\r\nIdentity access and management are useful in many ways: it ensures regulatory compliance, enables cost savings, and simplifies the lives of your customers by enhancing their experience. These are the main benefits of having an IAM solution:\r\n<ul><li><span style=\"font-weight: bold; \">Easily accessible anywhere</span></li></ul>\r\nNowadays, people need their identities all the time to use services and resources. In that sense, they require access to any platform without limits using their IDs, thus eliminating barriers for customers to enter the platform anytime, anywhere.\r\n<ul><li><span style=\"font-weight: bold; \">It encourages the connection between the different parts</span></li></ul>\r\nThe digital transformation that is taking place among more and more organizations forces the need for people, applications and devices to stay connected to each other. And, as expected, all of these processes bring with them some security threats.\r\nHowever, IAM software is a solution that guarantees correct administration with the best identity providers, such as Salesforce, Twitter and Google. Authentication and security are two of the strengths of Identity and Access Management, as well as being extendable and ready for future advances. \r\n<ul><li><span style=\"font-weight: bold; \">It improves productivity</span></li></ul>\r\nIdentity software automates the entry of new personnel and facilitates access to all components of the system with which the company operates. This allows reducing times in the delivery of access so that they begin to produce immediately. For this reason, business agility is also increased by using the advantages that technology makes available to meet the demands of today’s world. \r\n<ul><li><span style=\"font-weight: bold; \">It optimizes user experience</span></li></ul>\r\nRemembering so many usernames and passwords to access social networks, banks and other services on the Internet becomes a challenge for people. Thanks to user identity management system, people can get an identity that provides access to different systems. Single sign-on (SSO) allows customers and partners to access different internal and external applications with the same access method. That way the user experience will not be affected.\r\n<ul><li><span style=\"font-weight: bold; \">Secure your brand at all levels</span></li></ul>\r\nThere will be no risk of security breach, regardless of whether a connection is made from multiple identity providers. Identity management software and access management software enables strong authentication to keep your business and brand secure. Detailed verification of all identities entering the system is performed, in addition to allowing various licenses to limit access levels. At the same time, it monitors through analysis, fraud detection and alert functions that indicate a possible real risk. In short, enterprise identity management system is a reliable tool that employs technology to support digital transformation. A software that provides agility, security and satisfaction to the company’s customers. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IAM.png"},{"id":52,"title":"SaaS - software as a service","alias":"saas-software-as-a-service","description":"<span style=\"font-weight: bold;\">Software as a service (SaaS)</span> is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.\r\n SaaS services is typically accessed by users using a thin client, e.g. via a web browser. SaaS software solutions has become a common delivery model for many business applications, including office software, messaging software, payroll processing software, DBMS software, management software, CAD software, development software, gamification, virtualization, accounting, collaboration, customer relationship management (CRM), Management Information Systems (MIS), enterprise resource planning (ERP), invoicing, human resource management (HRM), talent acquisition, learning management systems, content management (CM), Geographic Information Systems (GIS), and service desk management. SaaS has been incorporated into the strategy of nearly all leading enterprise software companies.\r\nSaaS applications are also known as <span style=\"font-weight: bold;\">Web-based software</span>, <span style=\"font-weight: bold;\">on-demand software</span> and<span style=\"font-weight: bold;\"> hosted software</span>.\r\nThe term "Software as a Service" (SaaS) is considered to be part of the nomenclature of cloud computing, along with Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Desktop as a Service (DaaS),managed software as a service (MSaaS), mobile backend as a service (MBaaS), and information technology management as a service (ITMaaS).\r\nBecause SaaS is based on cloud computing it saves organizations from installing and running applications on their own systems. That eliminates or at least reduces the associated costs of hardware purchases and maintenance and of software and support. The initial setup cost for a SaaS application is also generally lower than it for equivalent enterprise software purchased via a site license.\r\nSometimes, the use of SaaS cloud software can also reduce the long-term costs of software licensing, though that depends on the pricing model for the individual SaaS offering and the enterprise’s usage patterns. In fact, it’s possible for SaaS to cost more than traditional software licenses. This is an area IT organizations should explore carefully.<br />SaaS also provides enterprises the flexibility inherent with cloud services: they can subscribe to a SaaS offering as needed rather than having to buy software licenses and install the software on a variety of computers. The savings can be substantial in the case of applications that require new hardware purchases to support the software.<br /><br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Who uses SaaS?</span></h1>\r\nIndustry analyst Forrester Research notes that SaaS adoption has so far been concentrated mostly in human resource management (HRM), customer relationship management (CRM), collaboration software (e.g., email), and procurement solutions, but is poised to widen. Today it’s possible to have a data warehouse in the cloud that you can access with business intelligence software running as a service and connect to your cloud-based ERP like NetSuite or Microsoft Dynamics.The dollar savings can run into the millions. And SaaS installations are often installed and working in a fraction of the time of on-premises deployments—some can be ready in hours. \r\nSales and marketing people are likely familiar with Salesforce.com, the leading SaaS CRM software, with millions of users across more than 100,000 customers. Sales is going SaaS too, with apps available to support sales in order management, compensation, quote production and configure, price, quoting, electronic signatures, contract management and more.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why SaaS? Benefits of software as a service</span></h1>\r\n<ul><li><span style=\"font-weight: bold;\">Lower cost of entry</span>. With SaaS solution, you pay for what you need, without having to buy hardware to host your new applications. Instead of provisioning internal resources to install the software, the vendor provides APIs and performs much of the work to get their software working for you. The time to a working solution can drop from months in the traditional model to weeks, days or hours with the SaaS model. In some businesses, IT wants nothing to do with installing and running a sales app. In the case of funding software and its implementation, this can be a make-or-break issue for the sales and marketing budget, so the lower cost really makes the difference.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reduced time to benefit/rapid prototyping</span>. In the SaaS model, the software application is already installed and configured. Users can provision the server for the cloud and quickly have the application ready for use. This cuts the time to benefit and allows for rapid demonstrations and prototyping. With many SaaS companies offering free trials, this means a painless proof of concept and discovery phase to prove the benefit to the organization. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Pay as you go</span>. SaaS business software gives you the benefit of predictable costs both for the subscription and to some extent, the administration. Even as you scale, you can have a clear idea of what your costs will be. This allows for much more accurate budgeting, especially as compared to the costs of internal IT to manage upgrades and address issues for an owned instance.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">The SaaS vendor is responsible for upgrades, uptime and security</span>. Under the SaaS model, since the software is hosted by the vendor, they take on the responsibility for maintaining the software and upgrading it, ensuring that it is reliable and meeting agreed-upon service level agreements, and keeping the application and its data secure. While some IT people worry about Software as a Service security outside of the enterprise walls, the likely truth is that the vendor has a much higher level of security than the enterprise itself would provide. Many will have redundant instances in very secure data centers in multiple geographies. Also, the data is being automatically backed up by the vendor, providing additional security and peace of mind. Because of the data center hosting, you’re getting the added benefit of at least some disaster recovery. Lastly, the vendor manages these issues as part of their core competencies—let them.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Integration and scalability.</span> Most SaaS apps are designed to support some amount of customization for the way you do business. SaaS vendors create APIs to allow connections not only to internal applications like ERPs or CRMs but also to other SaaS providers. One of the terrific aspects of integration is that orders written in the field can be automatically sent to the ERP. Now a salesperson in the field can check inventory through the catalog, write the order in front of the customer for approval, send it and receive confirmation, all in minutes. And as you scale with a SaaS vendor, there’s no need to invest in server capacity and software licenses. </li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Work anywhere</span>. Since the software is hosted in the cloud and accessible over the internet, users can access it via mobile devices wherever they are connected. This includes checking customer order histories prior to a sales call, as well as having access to real time data and real time order taking with the customer.</li></ul>\r\n<p class=\"align-left\"> </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SaaS__1_.png"},{"id":78,"title":"PAM - privileged access management","alias":"pam-privileged-access-management","description":"<span style=\"font-weight: bold;\">PAM - Privileged Access Management</span> tools help organizations provide secure privileged access to critical assets and meet compliance requirements by managing and monitoring privileged accounts and access. <span style=\"font-weight: bold;\">Privilege management tools offer features that enable security and risk leaders to:</span>\r\n<ul><li>Discover privileged accounts on systems, devices and applications for subsequent management.</li><li>Automatically randomize, manage and vault passwords and other credentials for administrative, service and application accounts.</li><li>Control access to privileged accounts, including shared and “firecall” (emergency access) accounts.</li><li>Isolate, monitor, record and audit privileged access sessions, commands and actions</li></ul>\r\nTo achieve these goals, privileged access management solutions typically take the credentials of privileged accounts – i.e. the admin accounts – and put them inside a secure repository (a vault), isolating the use of privileged accounts to reduce the risk of those credentials being stolen. Once inside the repository, system administrators need to go through the privilege management system to access their credentials, at which point they are authenticated and their access is logged. When a credential is checked back in, it is reset to ensure administrators have to go through the PAM system next time they want to use the credential.\r\n<span style=\"font-weight: bold;\">Privileged Access Management software by Gartner has the following subcategories:</span>\r\n<ol><li>Shared access password manager (SAPM)</li><li>Superuser password manager (SUPM)</li><li>Privileged session manager (PSM)</li><li>Application access password manager (AAPM)</li></ol>\r\nPAM password vaults (SAPM) provides an extra layer of control over admins and password policies, as well as monitoring trails of privileged access to critical systems. Passwords can follow a veriety of password policies and can even be disposable. Session brokers, or PSMs, take privileged access to another level, ensuring that administrators never see the passwords, their hardened proxy servers such as jump servers also monitor active sessions and enable reviewers to stop admin sessions if they see something wrong. Similarly, AAPMs can release credentials just-in-time for application-to-application communication, and even modify startup scripts to replace hard-coded passwords with API calls to the password vault.","materialsDescription":"<h1 class=\"align-center\">What are privileged accounts?</h1>\r\n<p class=\"align-left\">In a least privileged environment, most users are operating with non-privileged accounts 90-100% of the time. Non-privileged accounts, also called least privileged accounts (LUA) general consist of the following two types:</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Standard user accounts</span> have a limited set of privileges, such as for Internet browsing, accessing certain types of applications (e.g., MS Office, etc.), and for accessing a limited array of resources, which is often defined by role-based access policies.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Guest user accounts </span>possess fewer privileges than standard user accounts, as they are usually restricted to just basic application access and Internet browsing.</p>\r\n<p class=\"align-left\">A privileged account is considered to be any account that provides access and privileges beyond those of non-privileged accounts. A privileged user is any user currently leveraging privileged access, such as through a privileged account. Because of their elevated capabilities and access, privileged users/privileged accounts pose considerably larger risks than non-privileged accounts /non-privileged users. Here are <span style=\"font-weight: bold;\">examples of privileged accounts commonly in use across an organization: </span></p>\r\n<ul><li><span style=\"font-weight: bold; \">Local administrative accounts.</span> Non-personal accounts providing administrative access to the local host or instance only.<span style=\"font-weight: bold; \"></span></li><li><span style=\"font-weight: bold; \">Domain administrative accounts.</span> Privileged administrative access across all workstations and servers within the domain.<span style=\"font-weight: bold; \"></span></li><li><span style=\"font-weight: bold; \">Break glass (also called emergency or firecall) accounts. </span> Unprivileged users with administrative access to secure systems in the case of an emergency.<span style=\"font-weight: bold; \"></span></li><li><span style=\"font-weight: bold; \">Service accounts.</span> Privileged local or domain accounts that are used by an application or service to interact with the operating system.</li><li><span style=\"font-weight: bold; \">Active Directory</span> or domain service accounts. Enable password changes to accounts, etc.</li><li><span style=\"font-weight: bold; \">Application accounts.</span> Used by applications to access databases, run batch jobs or scripts, or provide access to other applications.</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are the Privileged Access Management features?</span></h1>\r\nPrivileged access management is important for companies that are growing or have a large, complex IT system. Many popular vendors have begun offering enterprise PAM tools such as BeyondTrust, Centrify, CyberArk, SecureLink and Thycotic.\r\n<span style=\"font-weight: bold;\">Privileged access management tools and software typically provide the following features:</span>\r\n<ul><li>Multi-factor authentication (MFA) for administrators.</li><li>An access manager that stores permissions and privileged user information.</li><li>A password vault that stores secured, privileged passwords.</li><li>Session tracking once privileged access is granted.</li><li>Dynamic authorization abilities. For example, only granting access for specific periods of time.</li><li>Automated provisioning and deprovisioning to reduce insider threats.</li><li>Audit logging tools that help organizations meet compliance.</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: bold; \">How is PAM Different from Identity Access Management (IAM)?</span></h1>\r\nPrivileged access management system is sometimes confused with Identity Access Management (IAM). IAM focuses on authenticating and authorizing all types of users for an organization, often including employees, vendors, contractors, partners, and even customers. IAM manages general access to applications and resources, including on-prem and cloud and usually integrates with directory systems such as Microsoft Active Directory.\r\nPAM access management focuses on privileged users, administrators or those with elevated privileges in the organization. PAM systems are specifically designed to manage and guarantee secure privileged access of these users to critical resources.\r\nOrganizations need both tools if they are to protect against attacks. IAM systems cover the larger attack surface of access from the many users across the organization’s ecosystem. PAM focuses on privileged users—but privileged access management products are important because while they cover a smaller attack surface, it’s a high-value surface and requires an additional set of controls normally not relevant or even appropriate for regular users (such as session recording). ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/PAM_-_privileged_access_management.png"},{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"},{"id":832,"title":"CASB - Cloud Access Security Broker","alias":"casb-cloud-access-security-broker","description":"A cloud access security broker (CASB) (sometimes pronounced cas-bee) is on-premises or cloud-based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies. A CASB can offer a variety of services, including but not limited to monitoring user activity, warning administrators about potentially hazardous actions, enforcing security policy compliance, and automatically preventing malware.\r\nA CASB may deliver security, the management or both. Broadly speaking, "security" is the prevention of high-risk events, whilst "management" is the monitoring and mitigation of high-risk events.\r\nCASBs that deliver security must be in the path of data access, between the user and the cloud. Architecturally, this might be achieved with proxy agents on each end-point device, or in agentless fashion without requiring any configuration on each device. Agentless CASB allows for rapid deployment and delivers security on all devices, company-managed or unmanaged BYOD. Agentless CASB also respects user privacy, inspecting only corporate data. Agent-based CASB is difficult to deploy and effective only on devices that are managed by the corporation. Agent-based CASB typically inspects both corporate and personal data.\r\nCASBs that deliver management may use APIs to inspect data and activity in the cloud to alert of risky events after the fact. Another management capability of a CASB is to inspect firewall or proxy logs for the usage of cloud applications.","materialsDescription":"<span style=\"font-weight: bold;\">What is CASB?</span> A Cloud Access Security Broker (CASB) is a policy enforcement point that secures data & apps in the cloud and on any device, anywhere.\r\n<span style=\"font-weight: bold;\">What is the difference between security and management?</span> Security is preventing risky events from happening, management is cleaning up after high-risk events.\r\n<span style=\"font-weight: bold;\">What is Shadow IT?</span> Cloud applications used by business users without IT oversight, also known as unmanaged apps.\r\n<span style=\"font-weight: bold;\">What are managed apps?</span> Cloud Applications that are managed by IT, e.g.Office 365.\r\n<span style=\"font-weight: bold;\">What are the types of CASB?</span> Three types of Cloud Access Security Broker\r\n<ul><li>a) API-only CASB offer basic management</li><li>b) multi-mode first-gen CASB offer management & security</li><li>c) Next-Gen CASB deliver management, security & Zero-Day protection.</li></ul>\r\n<span style=\"font-weight: bold;\">What is a forward proxy?</span> A proxy where traffic must be forwarded by the end-point Such proxies requires agents and configuration on client devices.\r\n<span style=\"font-weight: bold;\">What is a reverse proxy?</span> A proxy where traffic is automatically routed, requiring no agent or configuration on the end-point.\r\n<span style=\"font-weight: bold;\">What is AJAX-VM?</span> Acronym for "Adaptive Javascript and XML- Virtual Machine." AJAX-VM virtualizes cloud apps on the fly so they can be proxied without agents. Reverse-proxy CASB are brittle without AJAX-VM and break frequently with app changes.\r\n<span style=\"font-weight: bold;\">What are the types of CASB architecture?</span> There are three types of CASB architecture: API-only, forward proxy, and reverse proxy. Some CASB are API-only, others API and forward proxy. Next-Gen CASBs offer all three with AJAX-VM.\r\n<span style=\"font-weight: bold;\">What is CASB encryption?</span> Encryption/decryption of data prior to upload/download to a cloud application.\r\n <span style=\"font-weight: bold;\">What is searchable encryption?</span> An encryption system that combines full encryption with a clear-text index to enable search and sort without compromising encryption strength.\r\n<span style=\"font-weight: bold;\">What is tokenization?</span> Obfuscation by encoding each input string as a unique output string.\r\n<span style=\"font-weight: bold;\">What is agentless MDM?</span> Mobile security for BYOD that does not require agents. Easy to deploy and has no access to personal data or apps, thereby preserving user privacy.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_CASB.png"},{"id":848,"title":"Multi-factor authentication","alias":"multi-factor-authentication","description":" Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is).\r\nTwo-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.\r\nA good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something the user possesses) and a PIN (something the user knows) allows the transaction to be carried out.\r\nTwo other examples are to supplement a user-controlled password with a one-time password (OTP) or code generated or received by an authenticator (e.g. a security token or smartphone) that only the user possesses.\r\nTwo-step verification or two-step authentication is a method of confirming a user's claimed identity by utilizing something they know (password) and a second factor other than something they have or something they are. An example of a second step is the user repeating back something that was sent to them through an out-of-band mechanism. Or, the second step might be a six digit number generated by an app that is common to the user and the authentication system.","materialsDescription":" <span style=\"font-weight: bold;\">What is MFA?</span>\r\nMulti-factor authentication (MFA) combines two or more independent authentication factors. For example, suppose your website required your clients to enter something only they would know upon login (password), something they have (like a one-time smartphone authentication token provided by special software), and a biometric identifier (like a thumbprint). It is pretty hard for a mortgage cyber-attacker to have all three of those items, especially the biometric identifier.\r\n<span style=\"font-weight: bold;\">Why do I need MFA? What are the benefits?</span>\r\nPasswords are becoming increasingly easy to compromise. They can be stolen, “phished”, guessed, and hacked. New technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts increases vulnerability.\r\n<span style=\"font-weight: bold;\">How does MFA work?</span>\r\nMulti-factor authentication throws a few roadblocks in the hacker's pathway. Location factors are one way for a security system to identify a person's identity. For example, work schedules and location can determine whether a user is who he says he is. Time is another example of a security layer. If a person uses his phone at a job in the US, it is physically impossible for him to use it again from Europe 15 minutes later. These are especially helpful in online bank fraud and, by extension, mortgage company fraud.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Multi-factor_authentication.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5041,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Veridium_IP_Logo.png","logo":true,"scheme":false,"title":"VeridiumID","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"veridiumid","companyTitle":"Veridium IP","companyTypes":["supplier","vendor"],"companyId":5423,"companyAlias":"veridium-ip","description":"This complete software solution is highly configurable, with biometric vectors encrypted and broken up, stored between the mobile device and server for enhanced security, a technique called visual cryptography.\r\n<span style=\"font-weight: bold;\">VeridiumID</span> installs easily within your network to provide authentication to enterprise applications, websites, even doors. And it works just by you being you.\r\nYou can use <span style=\"font-weight: bold;\">VeridiumID</span> to replace hard and soft tokens as a second authentication factor. In addition to what you know – your password – you are adding two additional factors; what you have – your mobile device – and what you are – your biometrics.\r\nAre you ready to eliminate passwords? Our technology and unique storage architecture combine to provide true identity authentication. The software handles everything from biometric data collection and encryption, secure storage, and the ability to perform matching on the device or server during authentication sessions.\r\n<span style=\"font-weight: bold;\">VeridiumID Benefits:</span>\r\n<ul><li>Supports multiple biometric libraries, including 4 Finger TouchlessID, allowing for complete configuration of authentication systems</li><li>Provides complete control over the entire solution, from configuring the biometrics used to set rules for varying security demands</li><li>By encrypting biometric vectors with Visual Cryptography and storing them between the device and server, it is nearly impossible for them to be compromised or stolen</li><li>Built on open standard IEEE 2410 and supported by a working group which continues to advance this standard, future-proofing your investment</li><li>Easily integrates into your existing corporate infrastructure without additional hardware</li><li>Reduces password resets, help desk requests and support calls by up to 90 percent</li></ul>","shortDescription":"VeridiumID is a software-only platform for biometric authentication that works in conjunction with a front-end mobile SDK that allows you to embed biometrics into your company’s mobile app.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"VeridiumID","keywords":"","description":"This complete software solution is highly configurable, with biometric vectors encrypted and broken up, stored between the mobile device and server for enhanced security, a technique called visual cryptography.\r\n<span style=\"font-weight: bold;\">VeridiumID</spa","og:title":"VeridiumID","og:description":"This complete software solution is highly configurable, with biometric vectors encrypted and broken up, stored between the mobile device and server for enhanced security, a technique called visual cryptography.\r\n<span style=\"font-weight: bold;\">VeridiumID</spa","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Veridium_IP_Logo.png"},"eventUrl":"","translationId":5042,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"},{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"},{"id":848,"title":"Multi-factor authentication","alias":"multi-factor-authentication","description":" Multi-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is).\r\nTwo-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.\r\nA good example of two-factor authentication is the withdrawing of money from an ATM; only the correct combination of a bank card (something the user possesses) and a PIN (something the user knows) allows the transaction to be carried out.\r\nTwo other examples are to supplement a user-controlled password with a one-time password (OTP) or code generated or received by an authenticator (e.g. a security token or smartphone) that only the user possesses.\r\nTwo-step verification or two-step authentication is a method of confirming a user's claimed identity by utilizing something they know (password) and a second factor other than something they have or something they are. An example of a second step is the user repeating back something that was sent to them through an out-of-band mechanism. Or, the second step might be a six digit number generated by an app that is common to the user and the authentication system.","materialsDescription":" <span style=\"font-weight: bold;\">What is MFA?</span>\r\nMulti-factor authentication (MFA) combines two or more independent authentication factors. For example, suppose your website required your clients to enter something only they would know upon login (password), something they have (like a one-time smartphone authentication token provided by special software), and a biometric identifier (like a thumbprint). It is pretty hard for a mortgage cyber-attacker to have all three of those items, especially the biometric identifier.\r\n<span style=\"font-weight: bold;\">Why do I need MFA? What are the benefits?</span>\r\nPasswords are becoming increasingly easy to compromise. They can be stolen, “phished”, guessed, and hacked. New technology and hacking techniques combined with the limited pool of passwords most people use for multiple accounts increases vulnerability.\r\n<span style=\"font-weight: bold;\">How does MFA work?</span>\r\nMulti-factor authentication throws a few roadblocks in the hacker's pathway. Location factors are one way for a security system to identify a person's identity. For example, work schedules and location can determine whether a user is who he says he is. Time is another example of a security layer. If a person uses his phone at a job in the US, it is physically impossible for him to use it again from Europe 15 minutes later. These are especially helpful in online bank fraud and, by extension, mortgage company fraud.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Multi-factor_authentication.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4551,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/healthcity.png","logo":true,"scheme":false,"title":"Audit Manager","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"audit-manager","companyTitle":"Healthicity","companyTypes":["supplier","vendor"],"companyId":6964,"companyAlias":"healthicity","description":"<p class=\"align-center\"><span style=\"font-weight: bold;\">Pro-fee and Facility Medical Auditing Software. Introducing Audit Manager.</span></p>\r\nStreamline the way you manage audits by merging audit workflow, management, education and reporting into one easy-to-use, web-based solution. \r\nDesigned by auditors, for auditors, Audit Manager allows you to audit on your terms through immediate reporting, template customization, and total oversight of your entire audit program.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Benefits</span></p>\r\n<span style=\"font-weight: bold;\">Identify Revenue.</span> Evaluate financial impact. Minimize denials and identify up to 10%, per provider, in missed revenue with extensive reporting and analytics tools.<br /> <br /><span style=\"font-weight: bold;\">Increase Efficiency.</span> Improve your auditing efficiency by up to 40%. Reduce the amount of time you spend completing audits with our user-friendly interface.<br /> <br /><span style=\"font-weight: bold;\">Improve Accuracy.</span> Customize your audit templates. Include your own standards, MAC carrier guidelines and claim scrubber tech for ideal results.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Software Features</span></p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Cloud-based Access.</span> Never install software again. Access your audit tools, assignments, reports and training from anywhere, any time.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Flexible Audit Management.</span> Experience total oversight of your entire audit program. View the status, and each associated status, of every audit, by any auditor.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">E/M Calculator.</span> Save time with every audit. Automatically calculate E/M codes with a built-in calculator while you audit.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Reporting. </span>Capture and create clean, professional reports on every aspect, of any completed audit.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Education Modules.</span> Enjoy pain-free training. Track and report deficiencies on core competencies, and access training modules based on the outcome of audits.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Customizable Templates.</span> Ensure consistent language across your audit staff. Create your own customized audit findings/recommendations comment templates.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Pro-fee and Facility Audits.</span> Manage your entire organization's audit program with Audit Manager. Leverage simple-to-use modules to audit either your pro-fee or facility auditing needs.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Audit Coders & Providers.</span> Audit anyone with the click of a button. Easily identify and sort your coders and providers, then start your customized audit.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Risk Adjustment.</span> Automatically complete your risk adjustment audits more efficiently. Then, deliver your audit results back to your provider or coder with clean, professional looking reports.<br /><br /><br /></p>","shortDescription":"Designed by auditors, for auditors, Audit Manager allows you to audit on your terms through immediate reporting, template customization, and total oversight of your entire audit program.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Audit Manager","keywords":"","description":"<p class=\"align-center\"><span style=\"font-weight: bold;\">Pro-fee and Facility Medical Auditing Software. Introducing Audit Manager.</span></p>\r\nStreamline the way you manage audits by merging audit workflow, management, education and reporting into one easy-to","og:title":"Audit Manager","og:description":"<p class=\"align-center\"><span style=\"font-weight: bold;\">Pro-fee and Facility Medical Auditing Software. Introducing Audit Manager.</span></p>\r\nStreamline the way you manage audits by merging audit workflow, management, education and reporting into one easy-to","og:image":"https://old.roi4cio.com/fileadmin/user_upload/healthcity.png"},"eventUrl":"","translationId":4551,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"},{"id":351,"title":"Financial Accounting Applications","alias":"financial-accounting-applications","description":" Financial accounting (or financial accountancy) is the field of accounting concerned with the summary, analysis and reporting of financial transactions related to business. This involves the preparation of financial statements available for public use. Stockholders, suppliers, banks, employees, government agencies, business owners, and other stakeholders are examples of people interested in receiving such information for decision-making purposes.\r\nFinancial accountancy is governed by both local and international accounting standards. Generally Accepted Accounting Principles (GAAP) is the standard framework of guidelines for financial accounting used in any given jurisdiction. It includes the standards, conventions and rules that accountants follow in recording and summarizing and in the preparation of financial statements.\r\nOn the other hand, International Financial Reporting Standards (IFRS) is a set of passionate accounting standards stating how particular types of transactions and other events should be reported in financial statements. IFRS are issued by the International Accounting Standards Board (IASB). With IFRS becoming more widespread on the international scene, consistency in financial reporting has become more prevalent between global organizations.\r\nWhile financial accounting is used to prepare accounting information for people outside the organization or not involved in the day-to-day running of the company, managerial accounting provides accounting information to help managers make decisions to manage the business.","materialsDescription":" <span style=\"font-weight: bold;\">What is accounting?</span>\r\nAccounting is the recording of financial transactions along with storing, sorting, retrieving, summarizing, and presenting the results in various reports and analyses. Accounting is also a field of study and profession dedicated to carrying out those tasks.\r\n<span style=\"font-weight: bold;\">What are the examples of Financial Accounting?</span>\r\nOne part of accounting focuses on presenting the financial information in the form of general-purpose financial statements (balance sheet, income statement, etc.) that are distributed to people outside of the company. These external reports must be prepared in accordance with generally accepted accounting principles often referred to as GAAP or US GAAP.\r\n<span style=\"font-weight: bold;\">What is the difference between financial accounting and management accounting?</span>\r\nFinancial accounting has its focus on the financial statements which are distributed to stockholders, lenders, financial analysts, and others outside of a corporation or other organization. Because of the many users, the financial statements must comply with the generally accepted accounting principles, known as GAAP or US GAAP.<br />Managerial accounting is focused on assisting management in the operation of the company. This will include analyzing a company's costs, assisting in financial decisions, profit planning, calculating break-even points, capital budgeting, and calculating the costs of existing products in order to value the company's inventory and to determine the cost of goods sold (both to be used on the financial statements).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Financial_Accounting_Applications.png"},{"id":361,"title":"Financial Performance and Strategy Management Applications","alias":"financial-performance-and-strategy-management-applications","description":" Strategic financial management means not only managing a company's finances but managing them with the intention to succeed—that is, to attain the company's goals and objectives and maximize shareholder value over time. However, before a company can manage itself strategically, it first needs to define its objectives precisely, identify and quantify its available and potential resources, and devise a specific plan to use its finances and other capital resources toward achieving its goals.\r\nStrategic financial management is about creating profit for the business and ensuring an acceptable return on investment (ROI). Financial management is accomplished through business financial plans, setting up financial controls, and financial decision making.","materialsDescription":" <span style=\"font-weight: bold;\">What is financial performance management?</span>\r\nAlso known as corporate performance management, financial performance management refers to the ways that a company manages and monitors financial results across an organization. The primary purpose of financial performance management is to compare actual results to budgets and forecasts and make adjustments accordingly. The result? Companies are better equipped to meet their business goals.\r\nVentana Research describes financial performance management as a specific set of capabilities that includes "defining their company's key performance indicators, formulating strategic plans and forecasts, handling performance reporting, and increasing finance operational efficiency and execution company-wide.”\r\n<span style=\"font-weight: bold;\">What is financial performance management software?</span>\r\nFinancial performance management software, also known as corporate performance management software, streamlines financial management processes. This software connects budgeting, planning, close, consolidation, reporting, and disclosure to a single data source. It enables users to complete these tasks in one software system, as opposed to many separate systems.\r\nIn essence, financial performance management software consolidates information, formats it to meet compliance requirements, and provides automated tools that enable finance to create regulatory reports and disclosures. In addition to a central data repository and workflow tools, financial performance management software has features to create, manage, validate, and publish financial statements and reports. Best-in-class financial performance management software even has a robust suite of communication tools that foster collaboration and improve audit controls.\r\n<span style=\"font-weight: bold;\">What are the benefits of corporate performance management?</span>\r\n<span style=\"font-weight: bold;\">Corporate performance management helps companies become more agile when faced with unexpected business events.</span> With features like KPI dashboards, real-time data, and responsive plans that change as actuals do, CFOs and finance executives can understand what’s happening and take action faster.\r\n<span style=\"font-weight: bold;\">Corporate performance management helps companies make better decisions.</span> CPM systems often have automated features like scenario modeling, rolling forecasts, and what-if scenarios analysis. Using these in combination with a single version of automated data, executives can better analyze performance, respond to change, and make more informed decisions.\r\n<span style=\"font-weight: bold;\">Corporate performance management helps companies focus on analysis.</span> Using corporate performance software, users spend less time on manual tasks like data collection and data entry. Instead, they can focus their time on value-added activities like analyzing profitability, reducing costs, business partnering with executive decision-makers, and developing a strategy.\r\n<span style=\"font-weight: bold;\">Corporate performance management helps companies interpret large amounts of data quickly.</span> CPM as we know it is evolving. Once CPM was purely financial management. Today, organizations are sitting on a treasure trove of information, that if adequately managed, could provide telling insights about the state of business and the direction decision-makers should take next. Modernized CPM solutions help financial users identify these underlying trends, unearth insights, and interpret large amounts of data quickly.\r\n<span style=\"font-weight: bold;\">Corporate performance management aligns the entire organization, from corporate to subsidiaries to divisions to LoBs, departments, and individual contributors all in a single solution.</span> CPM software aligns every part of the organization to a central data source, so collaborators make all decisions, create reports, and perform analysis with financial truth top of mind and with finance at the heart of every decision.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Financial_Performance_and_Strategy_Management_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5065,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Unify_logo.jpg","logo":true,"scheme":false,"title":"Unify OpenScape Voice","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":1,"alias":"unify-openscape-voice","companyTitle":"Unify (Vendor)","companyTypes":["vendor"],"companyId":2808,"companyAlias":"unify","description":"<span style=\"font-weight: bold;\">Speaking with a unified voice</span>\r\nAs part of the OpenScape Enterprise portfolio, OpenScape Voice enables your enterprise to talk—with each other, with your customers, with all your stakeholders, with immediacy and richness.<br />As a stand-alone voice application or integrated with other unified communications applications, OpenScape Voice combines carrier-grade reliability, security, massive scalability (up to 100,000 users per node) and flexible on-premise or cloud deployment with the features your enterprise needs.<br />OpenScape Voice seamlessly synchronizes voice with mobility, video and web conferencing, chat, messaging, presence, one-number service and more. Embed voice into your business applications. You can even unify your in-place multi-vendor voice network without ripping and replacing. All with one elegant framework. <br /><br /><span style=\"font-weight: bold;\">Make your conversations vibrant — down the hall or around the world</span><br />\r\n\r\n<ul><li>Next Gen (100% SIP-based) Enterprise VoIP solution</li></ul>\r\n<ul><li>Carrier Grade Reliability (5 9s) Active – Active Server architecture</li></ul>\r\n<ul><li>Carrier Grade Routing and Translation for cloud / overlay deployments (IP-Least Cost Routing)</li></ul>\r\n<ul><li>Fits into virtualized architecture (VMware), delivered as a vApp</li></ul>\r\n<ul><li>Industry leading scalability up to 100,000 users on a system</li></ul>\r\n<ul><li>100% call failover support – no lost calls on a single node failure</li></ul>\r\n<ul><li>Multi-tenant support</li></ul>\r\n<ul><li>Licensing options – Permanent (CAPEX), Subscription (OPEX)</li></ul>","shortDescription":"OpenScape Voice is IP-based Unified Communications Platforms: We’ve learned to communicate in a lot of ways, but when it really counts, we use the tool that matters most — our voice.\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":15,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Unify OpenScape Voice","keywords":"","description":"<span style=\"font-weight: bold;\">Speaking with a unified voice</span>\r\nAs part of the OpenScape Enterprise portfolio, OpenScape Voice enables your enterprise to talk—with each other, with your customers, with all your stakeholders, with immediacy and richness.","og:title":"Unify OpenScape Voice","og:description":"<span style=\"font-weight: bold;\">Speaking with a unified voice</span>\r\nAs part of the OpenScape Enterprise portfolio, OpenScape Voice enables your enterprise to talk—with each other, with your customers, with all your stakeholders, with immediacy and richness.","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Unify_logo.jpg"},"eventUrl":"","translationId":5066,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":152,"title":"Contact Center","alias":"contact-center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Contact_Center1.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5087,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/cisco_logo.png","logo":true,"scheme":false,"title":"Cisco MediaSense 8.5","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":125,"alias":"cisco-mediasense-85","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"Cisco MediaSense is an open-standards, network-based, scalable platform that supports recording, playback, live streaming, and storage of media, including audio and video, with rich recording metadata. It captures conversations between businesses or organizations and their customers for a variety of purposes, including regulatory compliance, quality management, service optimization, agent training, and real-time analytics that can dramatically improve customer care. The platform provides an efficient, cost-effective foundation for capturing, preserving, and mining conversations for business intelligence.\r\n<span style=\"font-weight: bold;\">Business Value</span><br />\r\nContact centers handle thousands of customer conversations a day, but unfortunately much of the enterprise intelligence that could be gleaned from those conversations is never used - because it is either too expensive to capture or too difficult to mine for useful information. Cisco solves these challenges by recording conversations on the network - rather than a device - simplifying the architecture, lowering costs, and providing optimum scalability.<br />Just as important, Cisco’s network-based recording approach allows the captured media to be quickly available to different applications - regardless of location - through simple application programming interfaces (APIs). These interfaces implement open web standards, enabling a new ecosystem of applications that can gather useful information from conversations, either in real time or afterward. Such information can provide insights into caller concerns, guiding customer service agents toward speedy first-call resolution, thereby improving agent productivity while increasing customer satisfaction. With Cisco, gaining valuable business intelligence from customer conversations is no longer a daunting challenge. <br /><br />","shortDescription":"Cisco MediaSense is an open-standards, network-based, scalable platform that supports recording, playback, live streaming, and storage of media, including audio and video, with rich recording metadata","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":19,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco MediaSense 8.5","keywords":"","description":"Cisco MediaSense is an open-standards, network-based, scalable platform that supports recording, playback, live streaming, and storage of media, including audio and video, with rich recording metadata. It captures conversations between businesses or organizati","og:title":"Cisco MediaSense 8.5","og:description":"Cisco MediaSense is an open-standards, network-based, scalable platform that supports recording, playback, live streaming, and storage of media, including audio and video, with rich recording metadata. It captures conversations between businesses or organizati","og:image":"https://old.roi4cio.com/fileadmin/user_upload/cisco_logo.png"},"eventUrl":"","translationId":5088,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"},{"id":275,"title":"Conferencing Applications","alias":"conferencing-applications","description":"<span style=\"font-weight: bold; \">Conferencing applications</span> may be used as an umbrella term for various types of online collaborative services including web seminars ("webinars"), webcasts, and peer-level web meetings.\r\nServices may allow real-time point-to-point communications as well as multicast communications from one sender to many receivers. It offers data streams of text-based messages, voice and video chat to be shared simultaneously, across geographically dispersed locations. Conference application includes meetings, training events, lectures, or presentations from a web-connected computer to other web-connected computers. \r\n<p class=\"align-center\">Typical features of a web conference include:</p>\r\n<ul><li><span style=\"font-weight: bold; \">Slideshow presentations </span>- where images are presented to the audience and markup tools and a remote mouse pointer are used to engage the audience while the presenter discusses slide content.</li><li><span style=\"font-weight: bold; \">Live or streaming video</span> - where full motion webcam, digital video camera or multi-media files are pushed to the audience.</li><li><span style=\"font-weight: bold; \">VoIP</span> (conference call applications) - real time audio communication through the computer via use of headphones and speakers.</li><li><span style=\"font-weight: bold; \">Web tours</span> - where URLs, data from forms, cookies, scripts and session data can be pushed to other participants enabling them to be pushed through web-based logons, clicks, etc. This type of feature works well when demonstrating websites where users themselves can also participate.</li><li><span style=\"font-weight: bold; \">Meeting Recording</span> - where presentation activity is recorded on the client side or server side for later viewing and/or distribution.</li><li><span style=\"font-weight: bold; \">Whiteboard with annotation</span> - allowing the presenter and/or attendees to highlight or mark items on the slide presentation. Or, simply make notes on a blank whiteboard.</li><li><span style=\"font-weight: bold; \">Text chat</span> - For live question and answer sessions, limited to the people connected to the meeting. Text chat may be public (echoed to all participants) or private (between 2 participants).</li><li><span style=\"font-weight: bold; \">Polls and surveys</span> - allows the presenter to conduct questions with multiple choice answers directed to the audience.</li><li><span style=\"font-weight: bold; \">Screen sharing</span>/desktop sharing/application sharing where participants can view anything the presenter currently has shown on their screen. </li></ul>\r\nThere are different types of web conferencing:\r\n<span style=\"font-weight: bold; \">Webinars.</span> In webinars, on one hand the presenters can share information with the participants and on the other the participants can respond or ask questions regarding that information. Though, this web conference option shows possibility of interaction between the presenter and the audience but to a limited extent.\r\n<span style=\"font-weight: bold; \">Webcast.</span> It is web conference's another type that is similar to a broadcast made on TV but both of them are different from each other on the ground that this broadcast can be done by using web instead of a TV. Though webcast can be broadcasted to large number of people as a time still there are least or no possibilities of interaction between the presenter and the participants in this format of web conferencing.\r\n<span style=\"font-weight: bold; \">Web Meeting</span><span style=\"font-weight: bold; \">and Event App for conferences.</span> The virtual meetings on the internet fall in this category of web conferencing. It makes the participants in the meeting interactive to each other. The flow of information can be both way, forward and backward i.e. from the host to the audience as well as from the audience to the host. \r\n<span style=\"font-weight: bold; \">Online Collaboration.</span> Online collaboration format of web conferencing allows you to view shared files, documents and papers live along with making changes in them to modify their style instantly on the internet. The participants of a web based online collaboration can do much more than seeing and speaking to each other on internet. \r\n<span style=\"font-weight: bold; \">Online Presentations. </span>Web conferencing can also be used for presenting presentations online. The online presentations can be presented online with the help of web based chats, streaming videos or audios and slide shows. The participants have to log in to the web conference to see these presentations. They can also interact with the presenter of the presentation through web based chat or through mobile application conference.\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: bold; \">What are the benefits of online conferencing?</span></h1>\r\nInternet conference has its own nuances and features in contrast to the traditional conference. And most importantly, it also has a number of obvious and very significant advantages, namely:\r\n<ul><li>wide audience coverage - users of various categories who are remote control of a computer via the Internet by potential consumers of goods and services;</li><li>independence from geographical location - users from different cities and even countries can participate in Internet conferences, which allows to significantly expand the boundaries of business in the world wide web;</li><li>accessibility - you can take part in online meetings, sitting at a computer at home or at work, the main thing is the presence of the computer itself and Internet access;</li><li>the opportunity to significantly save on the financial costs of holding a conference, which is relevant at all times;</li><li>stakeholder participation in the topic that the Internet conference offers for consideration, which allows to achieve greater efficiency and effectiveness;</li><li>thanks to preliminary preparations for the Internet conference, you can develop the most successful mechanism for selling information to participants in order to focus on the most important aspects of a product or service;</li></ul>\r\nformation of positive public opinion among participants regarding the services of remote control of a computer or products, which is achieved using special methods.\r\n<h1 class=\"align-center\">The Benefits of Conference Event Apps</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">A More Personalized Experience</span></p>\r\nConference planning app can solve the common problems that many attendees run into at large events. According to pewresearch.org another important fact to consider is that “More than half of smartphone owners say they get news alerts on their phones” which is largely due to notifications from apps downloaded on their smart device, so why wouldn’t you include apps at your events? Planning and event apps give the attendee a personalized experience by allowing the attendee to take notes and mark which sessions and exhibits they want to see.\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Track Users</span></p>\r\n<p class=\"align-left\">Event apps give you the ability to track the users to see what they like and dislike so you can continually improve your event products and cater to the needs of your attendees. Most event apps track attendees by GPS, badges, or the most frequently used low-energy Bluetooth device. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Provides Instant Feedback</span></p>\r\n<p class=\"align-left\">Best event apps for conferences provide instant analytic feedback. Most conference event apps track which booths the attendees favored, how long they listened to the audio tours at each exhibit, and overall what topics or things interest them the most. You can also set up polling to get the specific feedback you want from your attendees. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Push Notifications</span></p>\r\n<p class=\"align-left\">Including event apps at your next conference gives you the ability to send push notifications if the schedule changes or in case of an emergency. With push notifications can set geo alerts to alert your attendees of important reminders based on their location. You can also implement AR ability so that attendees can try out new products. Your contributors can publish audio tours to impress the attendees by filling them with information at each exhibit and e-brochures that the attendee can view before, during, and after the event. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Boost Revenue</span></p>\r\n<p class=\"align-left\">Conference event apps make navigating the event easier on multiple levels. Event apps are especially beneficial for allowing your attendees to purchase items easily right from their smart device and for you to showcase unique event items right at their fingertips.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Monetize Sponsors</span></p>\r\n<p class=\"align-left\">It’s important to take time to recognize the sponsors that helped you put on the event. You can do this by adding a section of the custom conference app that is dedicated to your sponsors. By taking time to thank them, you are giving your sponsors a unique platform and driving leads with just a click of a button. Make sure you take time to talk to your app developer on how to create ads that highlight your sponsors and allows your sponsors to track data and leads from the event.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Instantly Connected</span></p>\r\n<p class=\"align-left\">Paper brochures, maps, and schedules are difficult to keep track of and hard to map out. I remember losing brochures and having to sit down and figure out the event layout, circling which booths I wanted to see. Conference event apps give your attendees access to important information instantly. </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Conferencing_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4859,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Keyo_logo.png","logo":true,"scheme":false,"title":"Keyo's Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"keyos-platform","companyTitle":"Keyo","companyTypes":["vendor"],"companyId":5267,"companyAlias":"keyo","description":"Keyo's infrastructure was built to slot right into all of your operations. The app, console, and terminal are all designed to seamlessly integrate with your existing systems, allowing you to implement Keyo throughout your organization quickly and effortlessly.\r\n<span style=\"font-weight: bold;\">Integration-ready API & SDK</span>\r\nOur flexible, integration-ready technology enables you to create custom-tailored solutions for your business.\r\n<span style=\"font-weight: bold;\">Expertise</span>\r\nOur team of experts is ready to guide you every step of the way to ensure your deployment is smooth and seamless.\r\n\r\n<span style=\"text-decoration: underline;\"><span style=\"font-weight: bold;\">Benefits:</span></span>\r\nEnhanced Security\r\nAs an internal biometric, Keyo is the most secure and accurate biometric on the market.\r\n<span style=\"font-weight: bold;\">Reduced Cost</span>\r\nWith Keyo, you'll never have to replace another keycard, ID, or fob again, allowing you to save on replacement costs.\r\n<span style=\"font-weight: bold;\">Increased Efficiency</span>\r\nWith a simple scan of the palm, your customers, employees, and guests can instantly identify themselves, increasing convenience and efficiency.\r\n<span style=\"font-weight: bold;\">A Better Customer Experience</span>\r\nThe Keyo network allows your users, clients, and guests to easily interact with your business across your brand — without needing anything other than themselves.\r\n<span style=\"font-weight: bold;\">Easy Legal Compliance</span>\r\nKeyo is a privacy-focused biometric, making it easier to gain compliance with privacy regulations around the world.\r\n<span style=\"font-weight: bold;\">Improved Sanitation</span>\r\nUnlike other biometrics such as fingerprint, Keyo's device doesn't require physical contact, making it more hygienic.","shortDescription":"Keyo's platform comes with ready-made capabilities for access control, payments, time & attendance, ticketing, and identification. Integrate our solutions, or build your own.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":20,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Keyo's Platform","keywords":"","description":"Keyo's infrastructure was built to slot right into all of your operations. The app, console, and terminal are all designed to seamlessly integrate with your existing systems, allowing you to implement Keyo throughout your organization quickly and effortlessly.","og:title":"Keyo's Platform","og:description":"Keyo's infrastructure was built to slot right into all of your operations. The app, console, and terminal are all designed to seamlessly integrate with your existing systems, allowing you to implement Keyo throughout your organization quickly and effortlessly.","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Keyo_logo.png"},"eventUrl":"","translationId":4860,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":750,"title":"Biometric Identification","alias":"biometric-identification","description":"<p itemprop=\"headline\">Biometric systems use people’s intrinsic physical characteristics to verify their identification. The characteristics that can be used by biometric systems include fingerprints, facial identification systems, voice recognition systems and in new developments – the analysis of DNA. Biometric security systems are applied wherever there is a need for personal identification where control of access to material objects or information is required.</p>\r\n<p itemprop=\"headline\" class=\"align-center\"><span style=\"font-weight: bold; \">Types of biometric identification</span></p>\r\n<ul><li><span style=\"font-weight: bold; \">DNA Matching.</span> The identification of an individual using the analysis of segments from DNA.</li><li><span style=\"font-weight: bold; \">Ear.</span> The identification of an individual using the shape of the ear.</li><li><span style=\"font-weight: bold; \">Eyes - Iris Recognition.</span> The use of the features found in the iris to identify an individual.</li><li><span style=\"font-weight: bold; \">Eyes - Retina Recognition.</span> The use of patterns of veins in the back of the eye to accomplish recognition.</li><li><span style=\"font-weight: bold; \">Face Recognition. </span>The analysis of facial features or patterns for the authentication or recognition of an individuals identity. Most face recognition systems either use eigenfaces or local feature analysis.</li><li><span style=\"font-weight: bold; \">Fingerprint Recognition.</span> The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.</li><li><span style=\"font-weight: bold; \">Finger Geometry Recognition.</span> The use of 3D geometry of the finger to determine identity.</li><li><span style=\"font-weight: bold; \">Gait.</span> The use of an individuals walking style or gait to determine identity.</li><li><span style=\"font-weight: bold; \">Odour. </span>The use of an individuals odor to determine identity.</li><li><span style=\"font-weight: bold; \">Hand Geometry Recognition. </span>The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.</li><li><span style=\"font-weight: bold; \">Typing Recognition. </span>The use of the unique characteristics of a persons typing for establishing identity.</li><li><span style=\"font-weight: bold; \">Hand Vein Recognition. </span>Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.</li><li><span style=\"font-weight: bold; \">Voice - Speaker Identification. </span>Identification is the task of determining an unknown speaker’s identity. Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user’s knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.</li><li><span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold; \">Voice - Speaker Verification/Authentication.</span>The use of the voice as a method of determining the identity of a speaker for access control. If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker’s voice is matched to one template (also called a “voice print” or “voice model”). Speaker verification is usually employed as a “gatekeeper” in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user’s knowledge and typically require their cooperation.</span></li><li> <span style=\"font-weight: bold; \">Signature Recognition.</span> The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.</li></ul>\r\n<br /><br />","materialsDescription":"<h1 class=\"align-center\"> Biometric Identification or Biometric Authentication?<span style=\"font-weight: bold; \"><br /></span></h1>\r\n<span style=\"font-weight: bold; \">Biometric identification</span> answers the question “who are you” and can be applied to both physical and digital scenarios. It is an established solution that is being used in many applications including law enforcement, defense, and border control.\r\nBiometric identification system usually applies to a situation where an organization needs to identify a person. The organization captures a biometric from that individual and then searches a biometric id system repository in an attempt to correctly identify the person. The biometric repository could be managed by a law enforcement agency, such as the Integrated Automated Fingerprint System (IAFIS) run by the FBI in the USA, or be part of a national identity system like India’s UIDAI system.\r\n<span style=\"font-weight: bold; \">Biometric authentication </span>asks the question “can you prove who you are” and is predominantly related to proof of identity in digital scenarios. A <span style=\"font-size:10pt; font-family:Arial; font-style:normal; \">biometric identity verification</span>system will challenge someone to prove their identity and the person has to respond in order to allow them access to a system or service.\r\nBiometric authentication involves use of a factor that is something a person is – a biometric identifier from a person can include a fingerprint, their voice, face, or even their behavior. This biometric is indexed against other identifiers, such as a user id or employee number, with the identifier being matched against a single stored biometric template – one-to-one match.\r\n<h1 class=\"align-center\">Where is biometric identification technology used?</h1>\r\nHistorically, applications using have been predominantly initiated by authorities for military access control, criminal or civil identification under a tightly regulated legal and technical framework. \r\nToday, sectors, including banking, retail, and mobile commerce, are demonstrating a real appetite for the benefits of biometric identity systems.<br />Most importantly, awareness and acceptance have been boosted in the past seven years, as millions of smartphone users are unlocking their phones with a fingerprint or a face. The most typical use cases of biometric technologies are:\r\n<ul><li>Law enforcement and public security (criminal/suspect identification)</li><li>Military (enemy/ally identification)</li><li>Border, travel, and migration control (traveler/migrant/passenger identification)</li><li>Civil identification (citizen/resident/voter identification)</li><li>Healthcare and subsidies (patient/beneficiary/healthcare professional identification)</li><li>Physical and logical access (owner/user/employee/contractor/partner identification)</li><li>Commercial applications (consumer/customer identification)</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Biometric_Identification.png"},{"id":834,"title":"IoT - Internet of Things Security","alias":"iot-internet-of-things-security","description":" IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).\r\nIoT involves adding internet connectivity to a system of interrelated computing devices, mechanical and digital machines, objects, animals and/or people. Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network. Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.\r\nIoT security has become the subject of scrutiny after a number of high-profile incidents where a common IoT device was used to infiltrate and attack the larger network. Implementing security measures is critical to ensuring the safety of networks with IoT devices connected to them.\r\nIoT security hacks can happen in any industry, from smart home to a manufacturing plant to a connected car. The severity of impact depends greatly on the individual system, the data collected and/or the information it contains.\r\nAn attack disabling the brakes of a connected car, for example, or on a connected health device, such as an insulin pump hacked to administer too much medication to a patient, can be life-threatening. Likewise, an attack on a refrigeration system housing medicine that is monitored by an IoT system can ruin the viability of a medicine if temperatures fluctuate. Similarly, an attack on critical infrastructure -- an oil well, energy grid or water supply -- can be disastrous.\r\nSo, a robust IoT security portfolio must allow protecting devices from all types of vulnerabilities while deploying the security level that best matches application needs. Cryptography technologies are used to combat communication attacks. Security services are offered for protecting against lifecycle attacks. Isolation measures can be implemented to fend off software attacks. And, finally, IoT security should include tamper mitigation and side-channel attack mitigation technologies for fighting physical attacks of the chip.","materialsDescription":" <span style=\"font-weight: bold;\">What are the key requirements of IoT Security?</span>\r\nThe key requirements for any IoT security solution are:\r\n<ul><li>Device and data security, including authentication of devices and confidentiality and integrity of data</li><li>Implementing and running security operations at IoT scale</li><li>Meeting compliance requirements and requests</li><li>Meeting performance requirements as per the use case</li></ul>\r\n<span style=\"font-weight: bold;\">What do connected devices require to participate in the IoT Securely?</span>\r\nTo securely participate in the IoT, each connected device needs a unique identification – even before it has an IP address. This digital credential establishes the root of trust for the device’s entire lifecycle, from initial design to deployment to retirement.\r\n<span style=\"font-weight: bold;\">Why is device authentication necessary for the IoT?</span>\r\nStrong IoT device authentication is required to ensure connected devices on the IoT can be trusted to be what they purport to be. Consequently, each IoT device needs a unique identity that can be authenticated when the device attempts to connect to a gateway or central server. With this unique ID in place, IT system administrators can track each device throughout its lifecycle, communicate securely with it, and prevent it from executing harmful processes. If a device exhibits unexpected behavior, administrators can simply revoke its privileges.\r\n<span style=\"font-weight: bold;\">Why is secure manufacturing necessary for IoT devices?</span>\r\nIoT devices produced through unsecured manufacturing processes provide criminals opportunities to change production runs to introduce unauthorized code or produce additional units that are subsequently sold on the black market.\r\nOne way to secure manufacturing processes is to use hardware security modules (HSMs) and supporting security software to inject cryptographic keys and digital certificates and to control the number of units built and the code incorporated into each.\r\n<span style=\"font-weight: bold;\">Why is code signing necessary for IoT devices?</span>\r\nTo protect businesses, brands, partners, and users from software that has been infected by malware, software developers have adopted code signing. In the IoT, code signing in the software release process ensures the integrity of IoT device software and firmware updates and defends against the risks associated with code tampering or code that deviates from organizational policies.\r\nIn public key cryptography, code signing is a specific use of certificate-based digital signatures that enables an organization to verify the identity of the software publisher and certify the software has not been changed since it was published.\r\n<span style=\"font-weight: bold;\">What is IoT PKI?</span>\r\nToday there are more things (devices) online than there are people on the planet! Devices are the number one users of the Internet and need digital identities for secure operation. As enterprises seek to transform their business models to stay competitive, rapid adoption of IoT technologies is creating increasing demand for Public Key Infrastructures (PKIs) to provide digital certificates for the growing number of devices and the software and firmware they run.\r\nSafe IoT deployments require not only trusting the devices to be authentic and to be who they say they are, but also trusting that the data they collect is real and not altered. If one cannot trust the IoT devices and the data, there is no point in collecting, running analytics, and executing decisions based on the information collected.\r\nSecure adoption of IoT requires:\r\n<ul><li>Enabling mutual authentication between connected devices and applications</li><li>Maintaining the integrity and confidentiality of the data collected by devices</li><li>Ensuring the legitimacy and integrity of the software downloaded to devices</li><li>Preserving the privacy of sensitive data in light of stricter security regulations</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/iot.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}