search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Business opportunities


participants can access our pri- vacy notice directly. Recordings are only available to the people on the call or people invited to the meeting. Recordings are stored in a controlled repository that is protected by permissions and encryption.


Do’s and don’ts


Microsoft has a security check- list • We never use your Teams data to serve you ads. • We do not track participant attention or multi-tasking in Teams meetings. • Your data is deleted after the termination or expiration of your subscription. • We take strong measures to ensure access to your data is restricted and carefully define requirements for responding to government requests for data. • You can access your own cus- tomer data at any time and for any reason. • We offer regular transparen- cy reports on the Transparency Hub, detailing how we have re- sponded to third-party requests for data. • We protect your identity and account information


• Multi-factor authentication (MFA), a feature turned on by your IT administrator, protects your username and password by requiring you to provide a sec- ond form of verification to prove your identity.. • We protect your data and defend against cybersecurity threats


Microsoft processes more than 8 trillion security signals every day and uses them to proac- tively protect you from security threats. In Teams, we encrypt data in transit and at rest, stor- ing your data in our secure net- work of datacentres and using Secure Real-time Transport Pro- tocol (SRTP) for video, audio, and desktop sharing. “We meet more than 90 regula- tory and industry standards”


Security built-in


Some rival solutions are de- signed around different ar- chitectures that offer security integral features. Starleaf com- ments: “organisations need to ensure that when they engage with a video services vendor, they are absolutely sure it is one that they can trust with their data. Security is of para- mount importance to StarLeaf, and we have invested heavily in it. Our robust security measures have enabled us to achieve ISO/ IEC 27001 certification. This is the most respected and interna- tionally-recognised information security and compliance stan- dard.”


“Organisations need assur- ance that the data they share with a service provider will be processed in compliance with data protection regulations in their own jurisdiction. The Star- Leaf data jurisdiction guarantee assures our customers that their data remains under their control and in their own territory. There is only one way to deliver an en- terprise-grade communications service and that is through end- to-end platform ownership. To-


tal platform ownership means that StarLeaf can mitigate against, identify, and respond to risk much more quickly and effectively than other vendors and is the key reason that we can assure service availability.” “StarLeaf has multiple Points of Presence (PoPs), strategical- ly located all around the world to ensure unparalleled connec- tivity and efficient call routing with low latency as well as the ability to offer our customers a choice of data jurisdiction. The platform is also fully redundant and duplicated at each of our PoPs. Therefore, in the excep- tional case of failure at any one of our data centres, we will automatically redirect connec- tions to an alternative PoP


Checklist. William


MacDonald, CTO of


StarLeaf recommends a check- list of requirements for those concerned about security: “We encourage all organisations that are choosing a video con- ferencing provider to consider the following security criteria when making their decision: • Where is the company based and where is the engineering developed? •


What 3rd party secu-


rity certifications has the pro- vider achieved?


• What data jurisdiction, if any, does the organisation offer? • What is the provider’s privacy policy?”


Changing requirements


When the use of collaborative technology was predominantly social. sacrifices in levels of privacy and data security were perhaps


tolerable. Now, col-


laboration provides the frame- work for work, financial data exchange and even healthcare. Those offering collaborative solutions realise the vital role their technology could play in the crisis. Take Clevertouch as an example:


“The way we work and learn is changing, and we want to make the transition as easy as pos- sible for you, your colleagues, and your family. That’s why we’ve created some new ini- tiatives to make life a little bit easier. For those of you either working from home or with customers trying to work from home, we are giving away 60- day licences to STAGE. This platform allows you to video chat with groups of people, screenshare and annotate in re- al-time. Ideal for virtual meet- ings, or for group hangouts, STAGE enables face-to-face meetings without needing to leave home. You can get your 60-day licence here: https:// www.clevertouch.com/work- and-learn-anywhere .” “Of course, we haven’t forgot- ten those of you still at work. We have the upmost respect and gratitude to the key work- ers who are continuing to keep the country safe and moving. For those companies or schools with digital signage or Clever- Message enabled displays, we have created a selection of templates that are free for you to download via the SedaoLive.


P14 AV News May 2020


Before coronavirus, average meeting duration varies by nearly 100%, with some countries living up to their stereotypes with gusto: the average Italian meeting, for example, lasts nearly twice as long as meetings in countries considered to be more reserved and direct, like the UK and Germany. Post-coronavirus, meeting durations become closer, with a dip in duration occurring as coun- tries are put into lockdown, causing them to experience a short period of widespread disruption.


Steve Law, CTO, Giacom, Steve Law, CTO, Giacom, comments; “Cyber security threats


have been continuously increasing, and now with the uncertain- ty created by COVID-19, people are at more risk than ever while working remotely. That’s why it’s fantastic to be adding Web- root SecureAnywhere to Giacom’s security portfolio. As one of the world’s leading cyber security vendors, Webroot is a known and trusted brand, that will help our partners through leading security technology, offering Endpoint and DNS Security, and a world class training module. Our partners have made clear their interests, so it’s great to be able to offer them a service they want.” Selling Webroot through Giacom means MSPs will benefit from the simple-to-use management portal, with no minimum users and one monthly bill. Migration or deployment through the portal can be done in seconds and with Webroot’s Security Awareness Training module, MSPs can enhance their support offering with a provider they know and trust.


com platform. These templates are to encourage safe work- ing measures during difficult times. We hope you are stay- ing safe and keeping healthy, and that our new initiatives go some way towards making your lives easier.”


Weekly meeting minutes, percentage change: Starleaf


The coronavirus crisis is truly global as all countries listed have seen a significant surge in video conferencing usage on the Star- Leaf platform. Italy, which was the first European country to en- force lockdowns in its response to the crisis, sees its usage growth start earlier.


Third party security solutions


Giacom has added Webroot SecureAnywhere, the cybersecu- rity product favoured by the top 500 MSPs. Webroot delivers real-time protection and prevents malware, viruses and ransom- ware infections from taking root. As the number of cyberattacks increases year-on-year, Webroot SecureAnywhere has DNS pro- tection which automatically blocks inbound threats giving cus- tomers 360° security, covering both users and their devices. Giacom, the UK’s fastest-growing reseller-only Cloud Services Provider (CSP), has added Webroot SecureAnywhere to their portfolio of industry-leading security cloud solutions. “The number of cyber-attacks has been increasing year-on-year and this trend will only carry on going up - we’ve already seen an increase in attacks in 2020.” Hal Lonas, Senior Vice President and CTO at OpenText, Webroot's 2020 Threat Report interview with Information Security Media Group. Webroot delivers real-time protection and prevents malware, viruses and ransomware infections from taking root. Its DNS protection automatically blocks inbound threats giving custom- ers 360° security, covering both users and their devices. Web- root also includes a Security Awareness Training module to help the end user be ready for potential threats when they come.


Starleaf: “organisations need to ensure that when they engage with a video services vendor, they are absolutely sure it is one that they can trust with their data.”


Average meeting duration, in minutes: Starleaf


“I can’t recommend Webroot (both endpoint and mobile) pro- tection highly enough. This has literally been a gamechanger for our business and has allowed my IT department to finally get to a lot of big projects that we never had time to do before. If you’re not using Webroot, you are wasting company money, time and resources that far outweigh the yearly cost of this product. It’s simply the best.” Steve Bryant, Manager of Infor- mation Services, Arkansas Hospice.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16