NEC Secures Business with Android Based Cloud

NEC Secures Business with Android Based Cloud

NEC Corporation is securing businesses with two new products “LifeTouchNOTE Business Model” and the “LifeTouch Security Pack Model.”

The launch of two new business-use models of NEC’s Android based “LifeTouch” Cloud Communicator series has begun shipping in Japan from today August 26, 2011.

NEC specializes in the integration of IT and network technologies that benefit businesses and people around the world. The company is providing for a range of business needs with an elevated level of security with these new additions to the LifeTouch series.

The newly released terminals leverage a variety of business friendly functions such as remote access that enables creation of email, schedules and company documents in an easy manner.

The flow of information as a result of this capability enables convenient management of retail stores, factories, production lines and inspections.

The new Android based Cloud Communicator Terminals feature the Android operating system, and include NEC’s proprietary security features.

The company notes that in addition to preventing information leaks, its security features prevent fraudulent use and also enable users to remotely and safely access company networks.

Earlier this year, NEC Corporation introduced a tool that enables organizations to directly implement communication-as-a service delivery models as part of their private or hybrid clouds.

The company is offering UNIVERGE Sphericall as a VMware software-based virtual appliance that allows Cloud Service providers to deliver high-availability, scalable communication-as-a-service solutions in the cloud.

The offering also enables Unified communications functions such as VoIP, conferencing, IM, and Presence, to be deployed alongside other virtualized business applications in businesses’ NEC and VMware software-based private or hybrid cloud.

By Anuradha Shukla

Sorry, comments are closed for this post.

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…