Showing posts with label LiveEnsure. Show all posts
Showing posts with label LiveEnsure. Show all posts

Tuesday, 8 March 2011

Remote Working - simplified with LiveEnsure- Unified Communications Show.

LONDON, March 8, 2011

A key subject at todays Unified Communications Expo 2011 http://www.ucexpo.co.uk is the new era of the 'remote worker' Today new research indicates that remote working is still a controversial topic in the UK.

Research among delegates who pre-registered to attend illustrates that there's still a difference of opinion when it comes to remote working in the UK. Almost exactly half of those surveyed claimed that people are accepting of remote working and that home working can be just as productive, indicating that attitudes here are almost perfectly split down the middle. There is however a marked difference between the technology- and business-focused attendees with 61% of the technology audience against just 45% of the business audience agreeing that it's acceptable.

79% of respondents agreed or strongly agreed that smartphones are essential to their business, implying that, even if attitudes towards home working are divided, attitudes towards mobile integration are not.

LiveEnsure™, is able to provide secure multi-factor authentication for a variety of corporate network resources for internal and external security.

Remote Access / VPN
Protecting remote access mechanisms in the corporate network is crucial to prevent unauthorised access by external users. LiveEnsure™ is able to protect these resources with strong authentication and is easily integrated by your web developer or digital agency. It is a mashup.

Web- Authentication Security- Protecting Login.
LiveEnsure™ is the solution for providing convenient, strong authentication to an external user base which accesses a web service or application, such as internet banking, e-commerce sites, commercial portals or document repositories. LiveEnsure™ can be deployed directly from our portal it easy is to deploy and manage, and will integrate simply into your web infrastructure.

GetLiveEnsureā„¢

Full Article
http://www.finanznachrichten.de/19571253

Wednesday, 20 October 2010

IP Expo Update from Today Earls Court

Today, in Westminster, Chancellor George Osborne unveiled plans to cut public spending by £83 billion. I was among the thousands of IT professionals crowded into Earl's Court 2 to discover how IT investment can help their organisations survive the new era of fiscal austerity, and emerge financially stronger, more competitive and more profitable.

They were not disappointed.

Addressing a packed audience for the opening keynote address of IP EXPO 2010, Acadia Enterprises CEO, detailed how the new age of cloud computing is set to revolutionize IT service delivery and the business effectiveness of the organisations that adopt it.

"Cloud" said Capellas "will be mainstream within 24 months."

"This bus has already left the station. You can either be under it, or on it," he said.

The same message, with different emphasis was heard from other quarters. In the seminar theatres, VMware's Paul Strong detailed some of the technical challenges that still lay ahead.

Freeform Dynamics' Jon Collins offered timely advice on how to distinguish marketing hype deliverable reality in today's increasingly competitive IT infrastructure markets.

Meanwhile, I enjoyed talking directly to the latest compute, storage and network infrastructure product and technologies showcased by more than 230 exhibitors. LiveEnsure partnered with The Virtual Tech Group Basingstoke were busy as they talked to Cloud providers who need authentication to secure entry points of their systems.

Far sighted organisations are ready to invest in their future, and those who are will be looking closely at the security aspects of their cloud provider.

Monday, 11 October 2010

LouiseRobertson@Innovate 10


The UK Technology Strategy Board is hosting Innovate 10 the leading networking, conference and exhibition event for businesses to meet other businesses, government and academia with the aim of making innovation happen – creating opportunity and growth for the future.

Innovate 10 will address all aspects of technology innovation, with a special focus on the commercial exploitation of the DIGITAL economy, HEALTHCARE markets of the future, ENERGY generation and supply and the SUSTAINABILITY economy.


I was surprised to see that cybercrime and fraud are not main discussion subjects at this forum.

I will be introducing LiveEnsure™ accessible, affordable authentication SaaS solution for web and mobile to attending digital and creative agencies who are looking to secure and protect the websites they are building. LiveEnsure™ is authentication solution, designed to protect consumers as they transact. LiveEnsure™ provides a revolutionary, multifactor, authentication solution for a multitude of applications, using unique Digimetric™ technology to recognise user’s mobile devices and laptops as part of triangulation process that secures the session. LiveEnsure™ takes the inconvenience out of bulky hardware token or sms-based authentication solutions.

Wednesday, 6 October 2010

Cyber Criminals, New Job Option....


e-crime Mid-Year Meeting 5 October 2010, Victoria Park Plaza, London.

As we all know Technology is continuing in it relentless advance at such a rapid pace that even 10 years ago anyone predicting our current technology-enabled capabilities would have been considered crazy. We are all living in a world that is totally connected 24/7. We are the martini generation of computers, anytime, anyplace and anywhere, just like martini time we are very relaxed about our security.

The e-criminal- A Growth Profession!
These quantum changes are matched in the way e-criminals operate, singularly or as very sophisticated groups. Their objective is to find a way around website, apps and mobile protection. E-Criminals are the cyber equivalent to burglars who pick locks and break windows. There is one obvious area where commercial organisations are ‘holding the door’ open for the e-criminal, and that is around login and authentication, research tells us that the 2 factor username and password is not enough you may have left your door open for the e-criminal.
The Cost of CyberCrime to business.
Studies by the Ponemon Institute reveal that a security breach costs a company:
• an average of £64 per file
• £10,000-£120,000 of admin costs
• An ICO fine
• Reputation Damage.

Pro-actively investing in security can help a business avoid potential costs, loss of resource and productivity that security violations can have on a company. Attacks on organisations are becoming more frequent and the attacks are moving outside of the financial sector into all sectors that transact on the web. (Retail, Gaming and Social Networks)

Cloud Computing its coming... well actually everyone is going that way!


The sessions focused on cloud computing, the buzz words of revolutionary cost and savings and operational flexibility, were tainted with concerns for security. Realising the cloud’s benefits is determined by the trustworthiness of the Cloud Infrastructure- in particular the software applications that control, access, private data and automate critical processes. Assuring the inherent security of your associated software is a key factor to successfully embracing cloud options.

The pan-European survey by Portio indicates that 75% of CIO’s viewed security as a barrier to adopting cloud computing, more than 65% said they would move between 21% - 60% of their applications to the cloud in the next year.

STATS
I love all the stats, and they make great colourful graphs but the fact is businesses are moving into the cloud, they need to protect themselves and their users . There is a growing need for effective non invasive security like LiveEnsure authentication.

The content of this mid -year meeting was exceptional, delivering practical advice focussing on how security can help businesses to adapt to change, take advantage of opportunities and remain secure.

http://www.e-crimecongress.org/forum/

Thursday, 9 September 2010

Secure the entry point of Cloud...


Cloud computing is one of the most widely adopted IT trends of recent years. Flexible, low-cost and easily scalable IT, many businesses are relying more and more heavily on cloud-based applications, storage and security. The big issue is of confidence remains a barrier to adoption for many businesses, and significant questions remain unaddressed around key issues affecting this, one of the key being that of security.

The cloud security debate rages on fiercely is the fact that issues or breaches have the potential to be catastrophic – to the extent where they transcend business departments to become a major business issue.

But the issue of cloud security is not necessarily as hugely complex as some assert. One of the basic premises for cloud security is the fact that securing the cloud itself is an almost impossible task due to the numbers of providers involved and the level of sharing that is inherent with many cloud-based services.

The fact is that by the time data has reached the cloud, it’s normally too late. The potential for data getting in to the wrong hands starts from the moment it leaves an organisation, and it’s therefore at this boundary point between the organisation and its external environment that security has to be the key priority for those looking to use cloud-based services.

The key priority for improving security of cloud computing lies in the routes between a business and the cloud, not the cloud itself. LiveEnsure is the affordable, accessible, authentication layer for that.

Addressing the security of a company’s specific cloud entry and exit points is the best – and simplest – way to get a grip on the potential issues involved to enable businesses to take advantage of all that the cloud has to offer.

Palm Tree Technology on LinkedIn

Friday, 13 August 2010

Creating Trust Online- Needn't cost a fortune!



The best ecommerce sites ensure a satisfactory online experience for their customers through ease of navigation, effective customer service and online security .


SET UP SHOP
An online presence provides a storefront for all the services that customers have come to expect when online. The following are some of web best practices for setting up a website to engage and give a satisfactory online shopping or service experience for customers in terms of navigation, customer service and online security.

EASY NAVIGATION
An ecommerce website's navigation should be intuitive, assisting customers to locate what they need with ease. Products offered should be sorted by type and information about the products that assists the customers in their purchase should be provided.

Provide ONLY Valuable Information (Keep the adjectives for christmas cards)
Provide customers with information about each item or services that are for sale . Show information about delivery time frames and an indication on stock availability.

SEARCH (FunnelBack)
Customers use the website search facility to locate the products they need. The website's search engine needs to provide accurate information, relevant results and also provide users with the choice to sort through their search results by price, type or availability.

Customer Service
Clearly show information about policies and standards relating to deliveries and returns of goods purchased. Offer LiveEnsure protected areas whereby users can log in to track the status of their order.

Confidentiality and Security
The interception of customers’ details can pose a serious risk to sites resulting in loss of customer confidence, website security should be a mandatory consideration.


The highly visible nature of LiveEnsure can have a positive effect on online sales figures.

With a recent survey revealing that:
22% of respondents had fallen victim to phishing attacks,
15% to online scams,
and 21% to identity theft,

Trust online is a real competitive advantage.

www.liveensure.com

Monday, 9 August 2010

According to Nielsen, social networking is the most popular activity online.


In the battle for our digital attention, social media appears to be winning

Email now occupies less of our time online than gaming.

According to Nielsen, Americans spend almost a quarter of their time online on social networks and blogs. That's up from 15.8% a just a year ago (a 43% increase).

We are already seeing companies and individuals replacing email with social media using the share and chat facilities to communicate. Email seems set to become more of a utility tool for attachments and formal communication. Extended messaging and interaction between friends and coworkers now happens in other social media, twitter, facebook and linkedin.

Clearswift research shows the importance to employees of social access http://www.fastcompany.com/1650131/clearswift-employees-trust-internet-social-networking-management-pay.

Clearswift even labelled these folk "Generation Standby," and noted that some 57% of 25- to 34-year-olds surveyed already are social networking, shopping, and reading personal email at work. 21% of those surveyed even said they'd turn down the offer of a job that was otherwise good, but forbade access to the web Facebook and Twitter.

With so much emphasis on social interaction our focus is upon authenticating and protecting users. We are already working with intranet developers, web creators, web sites and apps on the Web that want/need strong security but not the hassle of being "sold" a security product. We are engaging with small/medium sites that the big guys cannot afford to chase down.
Finally, we offer no barrier to entry or exit, providing a smooth and seamless decisions process, take-up, integration, clear pricing and simple payment process.
http://www.liveensure.com/

Find out more on Facebook http://bit.ly/cQIp27

Tuesday, 13 July 2010

'How to achieve excellence in joined-up marketing'

Embracing Social Media in your Promotional Mix.

Savvy businesses understand the power of social media. It can be very challenging to integrate with traditional marketing.Below is a list of which social media tools can be easily integrated, how to use them in an effective way alongside traditional methods and how to prove they're a good investment.

The Marketing Mix has changed Dramatically

Socialmedia: Twitter:The News Feeder/Seeder

Twitter allows direct contact with the audience, in a simple and effective way: messages are limited to140 characters.
Twitter can be used to perpetuate messages/news, create, support competitions to monitor people’s opinions and market activity. It is proven as an effective media to launch a product on the market. There are automatic tools you can use but the business needs to engage with it to make it successful. (Dell. Sun and BestBuy, Liveensure, are excellent examples)But your followers unless you are a full on A lister are unlikely to be interested in the fact you are enjoying a frapocino as starbucks...keep it real, re-tweet your news, research and information.

Facebook and Linkedin

Social media campaign and communities: Linkedin Network/Facebook Fan Page
Facebook is the biggest social network all around the world with more than 28 million active profiles in the UK representing over 70% of the UK community.

LinkedIn has 50 million business users worldwide and is growing at one new member per second ‘Groups’ are a compelling way to communicate to your end users..
Buzz Words: Tribe, lurk and blurt.(I admit to being a bit of a lurker it comes from my heritage in online customer experience and natural female curiosity).

We have formed groups on both:

Facebook Short: http://bit.ly/cQIp27

LinkedIN :Short: http://bit.ly/c5F4jq

Simply link these to your website and add to email signatures, let people share your information and you will increase your digital footprint.

Blogger Outreach
Direct communication with bloggers is a effective way of increasing buzz online. Certain bloggers are considered experts in their sector and “opinion leaders”: they are the ones to activate the word of mouth viral activity getting too the real influencers. In internet security we have the effervescent Graham Cluley. The main objective is to grab their attention and interest and get them to endorse the product/brand. Create a list of key influencers in your sector and start to engage with them, don't sell- cut and paste will not work with these guys).

Social Success is Measurable

Marketing Analytics, Measurement, Metrics, Social Media, Twitter
More than ever, hard numbers are necessary to demonstrate success. They are all but incontrovertible and easy to communicate, and they can point out what is or isn't working.

There are some leading players in agencies who can help largers organisations get Social:

For new-media Twitter, with its established tweetocracy (and people coining phrases with "tweet" left, right, and center), marketers are finding more tools to help them understand how their efforts are performing in this new medium.
There are many free time saving tools to measure the dynamics of activity.

Social Streams

You can very simply activate,monitor and connect:

ActiveTwitter Profiles,
Active Blog Content ,
FACEBOOK Page,
Viral Videos- You Tube,
Case Studies- video and editorial,
Communities,
MEET UP.

Once activated, communicate alongside your usual email and telephone details, let your customers and staff know you are social.

Summary

The good news facebook pages, linkedin communities and blogs are free BUT the challenge is engaging with internal resource to make the strategy work to ensure the messages are consistent in traditonal and social media. For best results a company needs to as a whole get social.

This post is part of the #JUMPchallenge, a blogging competition designed raise awareness on how to join up online and offline marketing, launched to support Econsultancy's JUMP event

Vote for me at http://advice.perkettpr.com/err-on-the-side-of-caution/

Tuesday, 1 June 2010

Privacy in the Digital Society

Next Tuesday sees Europes most influential data privacy conference - A fine Balance in the digital society is at Westminster.

Todays world is powered by complex digital systems that create privacy challenges alongside great opportunities.

• It is estimated that humankind created 150 exabytes (billion gigabytes) of data in 2005. In 2010 we will create 1,200 exabytes. Despite an abundance of tools to capture, process and share this information, data is continuing to multiply at such a rate we need new ways to manage who can see, access and use it.
• There is no current regulatory model for a digital society. We need new rules based on what we already know about privacy, technology and data.
• We need to educate, consult and communicate with the people whose information is on the frontline.

A Fine Balance 2010 features high-profile speakers including from the Information Commissioner's Office, the legal profession, technology companies and civil liberties experts who will debate the latest thinking on how to maintain the integrity of data in a digital world.

Delegates will have the opportunity to ask questions, vote and contribute to a report being developed to influence politicians and decision makers.

If you are transacting over the web this will bring you up to speed with the new legislation around privacy, the law has got tighter.
http://www.pdsfinebalance.com/