May 17, 2020

Gartner has revealed the top technologies for security for 2017

Data
protection
Cyber Security
hacking
Callum Rivett
2 min
Gartner's top technologies for security in 2017
Analysts at the Gartner Security and Risk Management Summit have highlight the toptechnologies that can be used to protect information, and what their i...

Analysts at the Gartner Security and Risk Management Summit have highlight the top technologies that can be used to protect information, and what their implications could be.

Vice President of Gartner Research, Neil MacDonald, said that the threat levels to enterprise IT has continued to be 'at very high levels' in 2017.

"There has been daily accounts in the media about large breaches and attacks on IT systems," MacDonald said at the summit. 

"Ultimately, attackers are only going to improve their capabilities so we too have to improve and move to defend ourselves from these breaches."

"We must look at using the very latest technologies to protect against advanced attacks and embrace new computing styles, such as the cloud and DevOps."

Gartner's analysts then detailed a list of eleven top technologies that will be at the forefront of information security, including cloud workload protection platforms and network traffic analysis.

As well as talking about how to prevent attacks, there was also the topic of how to limit the damage done by any attacks that manage to breach the security systems. 

Such strategies included microsegmentation, which works by implementing isolation and segmentation in the data centre by acting like bulkheads in a submarine. This can be achieved as attacks usually move laterally to other systems.

Prevention methods include monitoring and analysing traffic to detect behaviours that could be signs of malicious intent. 

To help prevent from browser-based attacks - which is the leading source - Gartner says that companies can isolate the browsing function which would keep the malware from infecting the system by shifting the risk to the server session using a remote browser.

Another method that could help is deception - deceiving the attacker by using decoys could disrupt the tools used by the hacker and stop the threat. This strategy is already being used to great effect, with several layers stacked within the system. 

Deception can also be used to detect the attackers that have been able to break through the firewall and subsequently be able to reinforce their current defence systems.

Other top technologies for information security include: endpoint detection and response; managed detection and response; software-defined perimeters; cloud access security brokers; container security and OSS security scanning and software composition analysis for DevSecOps. 

 

 

 

Share article

Jul 26, 2021

Five9: the cloud software industry leaders acquired by Zoom

five9
Cloud
contact centre
Catherine Gray
2 min
Following the announcement of Zoom buying cloud company Five9 for almost $15billion, we take a deeper look into the company’s history and success

Five9 is the leading provider of cloud contact centre software. Driven by a passion for transforming contact centres into customer engagement centres of excellence, Five9 have a deep understanding of the cost and complexity of running a contact centre.

Founded in 2001, Five9 help contact centres of every size create powerful connections. 

The company has over 20 years of cloud contact centre experience, reaches over 2,000 customers worldwide, and annually reaches over 7 billion customer interactions. 

Built on a highly reliable, secure and scalable cloud platform, Five9 makes it easy to rapidly trial and deploy new services. Its software also future proofs businesses by supporting AI and other emerging technologies.

Utilising cloud capabilities for improved customer experience

Offering software that creates more successful customer interactions, Five9’s cloud contact centre software increases contact centre productivity. This is without the capital expense and maintenance costs of premise-based systems.

Built on flexible architecture that adapts to a company’s changing needs, Five9 customers benefit from a secure, reliable and scalable contact centre.

Five9’s cloud contact centre platform also gives customers access to an extensive ecosystem of partners. Its platform can be enhanced with leading customer relationship management, analytics, workforce management, performance management solutions and telephony providers.

By utilising cloud technology, Five9 customers have access to the latest capabilities through no-touch, non-disruptive real-time upgrades.

Five9’s recognition for industry-leading software

As a leading cloud contact centre software provider, Five9 has been recognised by leading industry publications and organisations for its success and innovative solutions.

For the fourth consecutive year, Five9 has ranked as a global leader for The Aragon Research Globe for Intelligent Contact Centres 2021. 

Five9 was also one of only three providers to earn the MetriStar Top Provider award when evaluated as part of Metrigy’s global 2021-2022 Workforce Optimisation and Engagement research study.

Five9: Zoom’s first major acquisition

Zoom Video Communications has agreed to buy Five9 for about $14.7bn, marking the company’s first major acquisition.

This deal with Five9 will help expand the company’s Zoom Phone offering.

“I believe the combination of Zoom and Five9 will be a game-changer. Joining forces will create a transformative opportunity for two strong companies with complementary capabilities and shared values,” said Five9’s CEO, Rowan Trollope.

With Zoom’s reach and brand, the acquisition will help Five9 propel forward and help the company deliver on its goal of significant international expansion

Share article