EM360 公開
[search 0]
もっと

Download the App!

show episodes
 
A weekly show hosted by Matt Harris, Content Producer at EM360, exploring the ever-changing world of enterprise tech. Every week a new expert walks us through a different topic in such areas as cybersecurity, data, AI, emerging tech, unified communications, and more!
 
Loading …
show series
 
Artificial intelligence. The catch-all term defines the machines that can mimic and display sentient cognitive skills such as learning and problem-solving. A key part of modern technology, the advancements of AI indicate just how far the human race has come. AI can be used by businesses to interpret and use massive volumes of data. In this third ep…
 
The cloud experience has had far-reaching benefits on all sectors within the enterprise. Digitally, cloud-based IT has evolved the capabilities of technology, while cloud-based infrastructure lets IT teams deliver flexible and on-demand resources that boost a company’s agility. But with a recent study showing that 3 out of 5 companies who have move…
 
Cyber insurance helps to provide critical cover for those who need protection against digital threats. While businesses are responsible for their own cybersecurity, liability coverage can help provide crucial support to help them stay afloat when the worst happens. This includes the costs of investigating a cybercrime, recovering lost data and rest…
 
Digital twins are virtual models designed to accurately reflect a physical object or process. The real-world applications of this are endless - from city planning to construction and decoration, digital twins can help you visualise concepts within spaces with ease. When it comes to processes a digital twin can represent measurements of flows that a…
 
A recent F-Secure survey of 7,200 internet users showed that two-thirds of remote workers have reported worrying about their online security and privacy. And with a large percentage of the UK population transitioning into remote work following the pandemic, many have had to take cybersecurity seriously when accessing company platforms and data on o…
 
Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source information. Like other areas of important business intelligence, cyber threat intelligence is qualitative information put into action to help develop sec…
 
Full-stack Observability (FSO) allows real-time monitoring across the whole modern technology stack - bringing applications, software, storage, services and network under one roof transforming siloed data to allow for omniscient management and actionable insights. Through FSO, IT teams can develop a deeper understanding of how the cogs of their app…
 
Breaches are nothing new to the tech world. But since the beginning of the pandemic especially, the world has seen serious security attacks which have massively disrupted the functionality of enterprises. Moving to the cloud over the last two years has seen the world shook with some of the biggest and most unforgettable safety breaches like Accentu…
 
Data democratisation is the continuous process of enabling company-wide access to data, regardless of technical know-how, in a bid to spread a data-led decision-making mindset across all departments of an organisation. It can be a big challenge - and serious investment - for companies as employee education and tool implementation is not trivial und…
 
Identity sprawl describes the growth in the many differing and incompatible accounts a user creates to access online services. As the number of accounts increase, a user’s identity and online presence spreads, or ‘sprawls’, which can be excessively confusing and even dangerous when compared to a more unified approach. So how can organisations help …
 
CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applications and services. Usually providing a variety of features including customer registration, self-service account management, and 2FA/MFA, the best CIAM solutions ensure a secure and seamless customer ex…
 
Cybersecurity has traditionally been the responsibility of the CTO and IT department, casting a company-wide forcefield to protect businesses from exterior attacks. But in the modern age of heightened connectivity, as remote workers bring sensitive company information into their homes, the responsibility could - and should - fall upon every member …
 
Social media offers an important outline for people of all ages and walks of life to connect, share life experiences and post pictures of their breakfast. But oversharing - or not being wary of impostors - can lead to serious compromises in personal and professional security. In a press release on the report's findings, Phishlabs “enterprises must …
 
The current state of wide data is that it is not as widely used for Artificial Intelligence as it is for analytics. While analytics needs a treasure trove of historical data, AI merely needs a variety of big data. And big data needs AI, too. It's the most efficient and effective way for organisations to optimise their processes and identify their a…
 
In this age of technological evolution and industrial resilience following the fallout of the Covid-19 pandemic, businesses have had to modernise working practices in a big way. From installing unified communications software to ensuring cybersecurity as employees bring sensitive information and company data out of the working environment, business…
 
In this EM360 Podcast, we delve into the use cases and benefits of CX and scalable unified-communications-as-a-service (UCaaS) in the modern contact centre with Chris Selby-Rickards, UK Marketing Director at NFON, and Steve McSherry, Commercial Director at Daktela UKEM360 による
 
Edge computing places information processing closer to the consumer, allowing for lower latency and higher reliability to transfer faster and more secure data. Growing in popularity, edge is often talked about with decentralisation, an important and unique advantage to a company's digital strategy. It sounds simple; but the best place to run busine…
 
The data-driven revolution has enabled brands to achieve true customer centricity — but only if they have the right data analysis and experience orchestration capabilities. Whether creating a single customer view, generating predictive insights, or orchestrating seamless omnichannel experiences, organisations must work to make sure their customer d…
 
Antivirus software, and indeed all security systems for businesses, have existed since around 1971 to address some of the potentially devastating effects unwanted adversaries could cause to our systems. The current threat landscape has hugely shifted over the last few years with the increase of hybrid work. According to the BCC, more than half of a…
 
When looking into Unified Communication and Collaboration tools, there are many factors to take into account that, if not navigated around carefully, can slow down implementation. Your end-users need to be well trained, and they need to be versatile enough to adapt to any changes in the software. We saw enough problems with employees saying, "I can…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login