securitylinkindia

Tata Tele Business Services Recognized as the: Enterprise Service Provider of the Year 2022- at ET Telecom Awards

Tata Tele Business Services (TTBS), leading enabler of digital connectivity and cloud solutions for businesses in India has won the prestigious ‘Enterprise Service Provider of the Year’ award at the ET Telecom Awards 2022. This award recognises the companies which have been working closely with enterprise customers to help drive their businesses successfully. Recognised as the Enterprise Service Provider of the Year 2022, TTBS has always strived to bring the best technology and services to businesses that enable them to improve processes, reach customers more effectively, and enhance their productivity. TTBS has maintained a progressive approach of partnering with enterprises as a technology enabler by providing innovative solutions that allow enterprises to be resilient and maintain business continuity in a flexible, scalable, and secure manner. “We are truly honoured and delighted to be recognised as the best Enterprise Service Provider in the country. At TTBS, our focus has always been on serving the evolving needs of the enterprises and help them build advance digital capabilities to compete and win in their respective businesses. This award reflects our organizational purpose of accelerating adoption of digital technologies by businesses aspiring to Do Big and creating enduring partnerships” Vishal Rally Sr. Vice President – Product and Marketing, Tata Teleservices TTBS has taken several initiatives in the recent times to empower enterprises with innovative and reliable solutions as they move up the digital transformation curve. The company has strengthened its portfolio of enterprise grade solutions such as Smartflo – an advanced cloud communication suite; SmartOffice® – a one-box startup kit with voice, data, apps and storage, SD-WAN iFLX – an intelligently flexible solution (built on Fortinet’s platform) for network optimization, EZ Cloud Connect – a dedicated private network gateway to public clouds, Ultra-Lola – point to point connectivity with latency in microseconds for brokerage/ BFSI firms, Smart Internet leased line with built-in cloud security and manageability, collaboration solutions, IoT solutions, cloud applications, and a comprehensive suite of cyber security solutions across industries. It has also partnered with Zoom Video Communications, Inc. to offer world-class unified communication solutions to enterprises. All these solutions appropriately address the needs arising out of a distributed and remote working environment and enable businesses to deliver superior customer experience.  

Read More

Forcepoint Brings Personalized Automation at Scale to DLP

Today Forcepoint is delivering greater personalization and automation to DLP policy enforcement while also directly addressing the huge data growth problems organizations of all sizes are facing. Personalized automation with Forcepoint DLP is enabling tremendous efficiency gains in managing security incidents. To help enterprises manage their data growth, Forcepoint is scaling up to 8x the data visibility capabilities that were previously possible. We already led the industry in simplifying visibility with over 1,500 pre-built out-of-the-box templates (3x more than our leading competitors) that made it much easier to quickly deploy and efficiently manage DLP. Additional scalability brings needed power to these capabilities to easily manage much larger, unwieldy data sets. Bringing personalized automation to DLP Organizations strive to identify data loss as it happens. But what if it was possible to identify data loss before it happens? That’s the idea behind something we call Risk-Adaptive Protection (RAP). On average, it takes organizations 287 days to clearly identify and then contain a data breach. RAP utilizes over 150 ‘Incidents of Behavior’ (IoBs) to continuously monitor users for risky behavior. It brings true zero-trust capabilities to DLP while delivering context, automation, and precision to DLP policy enforcement. In the same way that Forcepoint DLP (DLP Everywhere) covers all the main vectors of security or channels (endpoint, web, cloud applications, cloud web and cloud email) RAP will soon cover not only the endpoint but also cloud web, cloud email, cloud applications and removable storage. As one Forcepoint RAP customer stated, “She finds the capability …incredibly exciting by virtue of the fact that we can start to be much more targeted in our security.” Handling exponential growth of data both today and tomorrow The amounts of data that organizations create, ingest and very often lose track of has been growing exponentially for many years. That aggressive data growth shows no signs of slowing in the future. It’s estimated that by 2025, there will be 181 zettabytes of data globally. It’s hard to get our minds wrapped around how much data that is but if you just look at the number (18 1,000,000,000,000,000,000,000 bytes) it already looks huge. Put another way, if each grain of sand equaled one byte, then there would be around 7.5 exabytes of sand on the earth. 1024 exabytes = 1 petabyte and 1024 petabytes = 1 zettabyte. Data can be a tremendous resource – but organizations require visibility and control of all of that data. For organizations, that means going beyond knowing what data you have, to understand who’s using it, how it’s being used and where it’s being used from. Getting a handle on dark data For many companies, the ability to collect data far exceeds their ability to derive any use from it. In most cases the majority of data collected becomes dark data. Dark data is data organizations possess that remains unused. In other words, dark data is not being used to gain insights or make informed decisions. Why not just delete all this extra data? One reason of course is data is valuable – ‘the new oil.’ Many companies don’t simply delete dark data because a lot of it contains sensitive information which needs to be retained for compliance purposes. Due to compliance regulations, organizations are held responsible for all the data they acquire. Our new DLP capabilities help organizations shed light on dark data. Combining this scale with Forcepoint DLP capabilities enables customers to solve their dark data issues on two fronts. The first front is by dramatically increasing the amount of data that can be processed. Secondly, we’ve made it faster too. As an example, Forcepoint DLP simplifies things like compliance audits with its ability to handle up to 8x more data at 15x the speed. With out-of-the-box policies covering 86 countries and over 155 regions we can help customers with the most challenging regulations to successfully account for all the data they have at remarkable speed. With Exact Data Match (EDM), Forcepoint DLP now allows customers to fingerprint 5x more data (up to 100 million records or 600 million fields) to give them incredible visibility and control across their data. “We’ve fingerprinted almost 20+ million files with Forcepoint DLP and look forward to scaling that up to 100 million files in the near future.”  Elif Ahmetoglu, Information Security Manager, VakifBank Forcepoint DLP is also now able to retain 8x more incidents for forensics purposes. Bringing visibility and control to removable storage To round things out, Forcepoint is also announcing new device control capabilities. Forcepoint DLP already had ways of controlling data exfiltration to USB drives. Now, we’re adding important capabilities that allow for much stronger control of these ubiquitous storage devices that are regularly being plugged into endpoints. Data security admins can see exactly what removable storage device is being plugged in, what data is going into those devices, what data is coming into the organization from those devices and be able to apply simple controls such as allowing, read-only, and blocking.  

Read More

Fortinet Enhances the Industry’s Only True Converged Networking and Security Platform with New Suite of FortiGate Network Firewalls

Fortinet®, a global company in broad, integrated, and automated cybersecurity solutions, recently announced a suite of new FortiGate appliances that features ASIC-based performance acceleration and integrated AI-powered FortiGuard Security Services to support campus, branch, and hybrid data center environments. The new FortiGate 600F, FortiGate 3700F, and FortiGate 70F each feature Security Compute Ratings that offer better performance than competitive offerings. This means organizations that choose FortiGate realize better ROI, more scale to protect against advanced threats, and realize better user experience with a converged networking and security platform. Consistent networking and security convergence is key In today’s era of hybrid IT, the network is more important than ever to connect users, applications, physical locations, and multi-cloud environments. And as digital acceleration further drives the distribution of workers, devices, and data, the digital attack surface continues to expand. The ability of an organization to converge networking and security consistently across its physical and cloud locations will determine its success in securing the rapid expansion of these new edges. FortiGate Network Firewalls serve as the foundation of the industry’s most comprehensive converged networking and security platform powered by FortiOS everywhere to deliver advanced security that is seamlessly integrated with modern networking capabilities such as SD-WAN, universal ZTNA, LAN edge controllers, and support for 5G. And because FortiOS has been organically developed with both networking and security in mind, this convergence is available and consistent across all form factors, including appliances, virtual machines for multi-cloud deployments, containers, and SaaS. This makes FortiGate powered by FortiOS everywhere a powerful enabler of network modernization with security integrated across all parts of the network. New FortiGate network firewalls deliver converged networking and security to branch, campus, and hybrid data center environments FortiGate 600F Supports Today’s Dynamic Campus: The new FortiGate 600F series delivers a converged networking and security solution for campus edge deployments to support a Zero Trust Edge strategy. As enterprises balance their return to the office and support a hybrid workforce, rich media services such as video and application access must be included to support new growth initiatives in a hybrid IT model. To power today’s new, highly dynamic campus, Fortinet is bringing data-center-class capabilities to its mid-range line, including support for an average of seven times more connections per second than comparable industry offerings. These innovations are powered by Fortinet’s purpose-built Network Processor 7 (NP7) ASIC and include built-in 25GbE interfaces to stop the lateral movement of threats. FortiGate 600F also offers 7Gbps of SSL inspection with AI-powered security services enabled to eliminate network blind spots. FortiGate 3700F Delivers High-Speed Connections Between the Data Center and Multi-cloud: The new FortiGate 3700F secures data centers that are part of hybrid IT networks and are critical to an organization’s digital acceleration journey. As the industry’s only compact network firewall appliance with multiple 400GbE interfaces, FortiGate 3700F supports high-speed connections between the data center and multi-clouds to deliver an optimal digital experience for customers no matter where applications are hosted. With low latency at nearly two microseconds, it also supports high-frequency trading. Natively integrated ZTNA enforcement in FortiGate 3700F allows organizations to enact explicit application access to ensure that data and applications remain protected. When combined with our newly introduced in-line sandboxing service, FortiGate 3700F delivers real-time prevention of never-before-seen attacks with minimal impact on operations. FortiGate 70F Supports WAN Edge Transformation for Branch Offices: With FortiGate 70F, Fortinet continues to empower IT leaders to transform their WAN edge with SD-WAN, advanced security, advanced routing, and ZTNA enforcement capabilities in a single appliance that is right-sized for branch offices. FortiGate 70F has been re-engineered to enable alternative part sourcing as part of Fortinet’s strategy to remain resilient in the face of supply chain constraints. FortiGate and AI-Powered FortiGuard Security Services These new appliances integrate with all of the recently announced AI-powered FortiGuard Security Services introduced in FortiOS 7.2, including industry-first in-line Sandboxing, Advanced Device Protection for OT and IoT environments, outbreak detection delivering immediate alerts and threat hunting scripts for outbreaks, SOC-as-a-Service providing Tier 1 hunting and automation with options for Tier 2 and Tier 3 support, dedicated IPS, and in-line CASB. All FortiGuard Security Services are powered by trusted machine learning, artificial intelligence, and independent research from FortiGuard Labs, and integrate across the Fortinet Security Fabric to better protect against known and unknown modern attacks across today’s expanded attack surface. FortiGate 600F vs. Competitors Below is a comparison of the datasheet performance numbers of the top firewalls on the market against the target performance numbers of the FortiGate 600F series. Security Compute Rating is a benchmark (performance multiplier) that compares FortiGate performance versus the industry average of competing products across various categories that fall within the same price/performance band. Vishak Raman, Vice President of Sales, India, SAARC and SEA at Fortinet said, “FortiGate is more than just the most deployed network firewall in the world. It’s one of the top SD-WAN solutions on the market, a powerful LAN Edge controller and 5G controller, and delivers the industry’s only universal ZTNA enforcement. Most importantly, it’s the foundation of the only true converged networking and security platform available today. This convergence is over 20 years in the making and made possible by custom ASICs, integrated security services, and FortiOS, a single organically developed operating system shared across the Fortinet Security Fabric that is consistent whether on-premises or in the cloud.”  

Read More

OSH & SAFE South India: India’s Bid for Global Manufacturing Leadership in Occupational Health & Safety and Security

Informa Markets in India, a leading B2B exhibition organiser is set to host the 7th edition of Occupational Safety & Health (OSH South India) India and the 6th edition of SAFE South India 2022 at the Chennai Trade Centre, Chennai. The two-day co-located shows, slated for 17-18 June 2022, will provide a combined platform addressing a broad range of solutions to occupational hazards and security with preventive technologies, and innovation, to support the growth of both occupational health and safety and the security industries. India represents only about 2% of the manufacturing output, and further India’s manufacturing accounts for only about 16% of the country’s GDP. Safety at the workplace is the key differential that helps boost productivity and hence the manufacturing output. The expos will bring over 200 Plus brands from 100 Plus domestic and international exhibitors. The key exhibitor brands & partners at OSH South India include Mallcom, Venus, Torpedo, LRQA, Venus, ion Science, Marshal, VMEDO, Sure Safety, Red Star Safety, Karam, Udyogi, Joseph Leslie, Midas Safety and Jayco Safety to name a few. Key brands and partners at SAFE South India include Hikvision, Prama, Syrotech, In4, ZkTeco, Biomax, Gtropy, Hiware, Magtech, Picsys, Timewatch, Toshiba, Trueview, TVT and XYZ Digital to name a few. OSH South India is well-supported by reputed associations such as Tamil Nadu Chamber of Commerce, Safety Appliances Manufacturers Association (SAMA), International Power Access Federation ( IPAF ), Indian Technical Textile Association (ITTA), and many other safety consultants. The SAFE Expo is supported by APSA (Asian Professional Security Association), ASIS (American Society for Industrial Security) Bengaluru, New Delhi and Mumbai Chapters, ESAI (Electronic Security Association of India) and OSAC (Overseas Security Advisory Council) Chennai Chapter, IISSM (International Institute of Security and Safety Management), GACS (Global Association for Corporate Services), and Mitkat Advisory. OSH South India gives way to many emerging trends strengthening industrial and workplace safety market share and will witness demonstrations on Personal Protection Equipment’s, Fire & Gas Detection/ Protection, Passive Fire Protection, Safety Signage, Ergonomical Workstation, Safety Training And Consultancy, Safety Software, Medical And Travel Security Services, Lockout Tagout and Machine Guarding, Material Handling, Respiratory Protection, Fall Prevention Accessories & Height Safety Products like Safety Accessories & Uniforms, Electrical Safety, and Transport Safety. SAFE Expo will provide trends and solutions pertaining to products such as Alarm Centres/ Intruder Alarms, Access Control, Biometrics, Building Management Systems, CCTV, Computer Security, Integrated Systems & Networked Security, IT Security, Manned Guarding, Physical Security, Retail Security, Screening/ Anti – Terrorism, Secure Communications, Surveillance and Traffic Monitoring & Valuables in Transit. The Expos aim to improve safety and health at work and security in all forms which will contribute to the sound socio-economic development of India. Speaking on the announcement of OSH South India and SAFE Expo 2022, Yogesh Mudras, Managing Director, Informa Markets India said, “India has a population exceeding 1.4 billion out of which, 63.6% form the working age group. Similarly, in the security industry, several trends have even accelerated that go beyond the traditional ‘physical security,’ such as a host of frontiers like AI, cloud computing, IoT, and cybersecurity are being rapidly pioneered by entities big and small in our industry. India’s Video Surveillance Market size is projected to grow with a CAGR of 16.6% during 2020-26. OSH South India and the SAFE Expo 2022 is an attempt to showcase these two industries in a new light giving a much-required boost to the Indian manufacturing industries. The Expos will represent the entire value-added chain of the Occupational health & safety and securities industries to the buyer-seller community in South India. These are industries that bank on newer and improved technological innovations on a constant basis. We see there an immense growth potential along with the learning and networking opportunities for suppliers and service providers at these expos”. OSH South India will be visited by professionals such as Safety Managers, Consultants, personnel from Defence Establishments, Disaster Management Experts, Distributors and Manufacturers Of Health & Safety Products, Electrical Contracting/ Engineers, Facility Managers, Logistics professionals, Municipal Authorities, System Integrators and Town Planners especially from the industrial hubs of Andhra Pradesh, Telangana, Karnataka and Tamil Nadu. Meawhile, the SAFE Expo will be visited by professionals Procurement Managers, Consultants & Specifiers, Electrical Consultants, Fire Consultants, Safety Managers, Security Managers, Floor Managers, Plant Managers, Operation Managers, Estate Managers, Facilities Managers IT Managers, Design & Instrumentation Managers from hospitality, construction, legal, retail to name a few. The expos will be backed by two knowledge based conferences which will bring together government officials, experts, industry associations and evangelists, and technical leaders. Some of the key topics that will be discussed as part of the Conference at OSH South India under the theme – Decoding Occupational Safety & Health Challenges in 2022 include, Workplace safety practices – The leader’s role, Workshop: Industrial Hygiene and Practical Approach, Emerging Fire Risks and Strategies to Life Safety, E-Waste Management – A 360-degree approach including all stakeholders, Protective Devices – Best Practices for Sizing and Selection and many others. Based on the theme ‘New-Age Threats to Security’, the SAFE Expo will conduct a technical seminar and will cover topics like Technology-Enabled Disruptions, ‘Emerging Paradigms in Security Architecture,’ Leading Technologies that have become Ubiquitous in the ‘New Normal’ in Security, Emerging Cyber Threats and their Implications for Corporate Security, How Smarter, Intelligent and Self-Learning Security Systems Make Life Easier for a CSO and many more. Informa Markets creates platforms for industries and specialist markets to trade, innovate and grow. Our portfolio is comprised of more than 550 international B2B events and brands in markets including Healthcare & Pharmaceuticals, Infrastructure, Construction & Real Estate, Fashion & Apparel, Hospitality, Food & Beverage, and Health & Nutrition, among others. We provide customers and partners around the globe with opportunities to engage, experience and do business through face-to-face exhibitions, specialist digital content and actionable data solutions. As the world’s leading exhibitions organiser, we bring a diverse range of specialist markets to life, unlocking opportunities and helping them to thrive 365 days of the…

Read More

Matrix Joins Hands with Intellve Solutions Private Limited as a Technology Partner

Matrix, a leading OEM manufacturer in Telecom and Security Solutions joins hands with Intellve Solutions Private Limited as a technology partner. Intellve Solutions Private Limited is a technology company (OEM) and has developed state-of-theart integrated, intuitive and intelligent operative Command and Control centre applications (Intellve ICCC) for smart cities, large enterprise operational security, and e-surveillance for BFSI and for safety & security of the critical infrastructure. Matrix developed an integrated access control and visitor management solution with Intellve Solutions intelligent command and control centre for Indian Oil Petronas Private Limited, Haldia. The Command and Control Center Platform helps the client successfully manage complex operational environments by giving real-time alerts. Integrated maps, GIS, alarm reporting, rule engine SOPs, integrated real-time dashboards, Pattern & Trend Analysis and other features can help the enterprise to manage its operations better. Speaking on the same topic, Kaushal Kadakia, Marketing Manager, Matrix said, “This interoperability will provide a point of control to the end customers for managing the crowd flow in their premises without any technical glitches. Furthermore, system integrators can suggest both solutions to end customers without worrying about the integration part for a seamless operation.” Likewise, Aayush Agarwal, Co-founder at Intellve said, “Access control systems play a very crucial role in critical infrastructures such as an LPG import terminal and bottling plant. It detects and delays any unauthorised door breach into premises that could disrupt business operations and be life-threatening. At Intellve, we have integrated Matrix ACS onto our Integrated Command & Control (ICCC) platform for this specific purpose of access annunciation. With an integrated approach, the user is now able to visualise this breach in real-time and mitigate the risk. Unauthorised Access (in time domain) and unauthorised credentials (card) are the 2 critical parameters being monitored at the Indian Oil Petronas Pvt. Ltd. (IPPL) plant in Haldia.”  

Read More

Matrix Perimeter Security Solution

Perimeter security is the first line of defense to protect your assets, information, and people using advanced technology. Just as the human skin protects the body against the external environment and infections, the perimeter security system is designed to keep away unauthorized intrusion in your property. Keeping that in mind, Matrix offers their Perimeter Security Solution to deter intrusions from happening by detecting them in real-time. With intelligent video analytics one can detect intruders in real-time and mitigate the threats easily. The system has been designed to work with both Matrix network cameras as well as third-party cameras and ancillary devices such as motion detectors, electric fences, fire alarms, burglar alarms and more. Again, the cognitive analytics ensure that there are no false alarms being detected because of the camera events. Making the system a reliable security solution for your needs. Key features Intrusion detection, tripwire detection. Integration with motion sensors, fire alarms, burglar alarms. Integration with parent and third-party cameras. Real-time notifications. Cognitive analytics – no false notifications.  

Read More

Panoramic Camera Range with ColorVu for Wide Field of View in Vivid Color

Hikvision India has introduced a new range of panoramic cameras that use integrated ColorVu technology to provide vivid and full-color video imaging for a wide field of view in light conditions as low as 0.0005 lux: nearly total darkness. Large areas can be very difficult to secure, often requiring multiple cameras to provide full coverage. With traditional cameras, monitoring these kinds of area can also be difficult in low light conditions, or at night. To address all of these challenges, Hikvision has integrated ColorVu into our industry-leading panoramic cameras, which use the ‘image fusion’ algorithm to stitch together images from two side-byside lenses for a seamless, 180-degree view. The results are reduced equipment requirements (with fewer cameras needed to cover large areas); improved situational awareness based on a single, wide-angle image and no blind spots; and the ability to capture every detail in full color – even in near-total darkness. A super-wide angle view, with no blind spots Hikvision image fusion technologies in the new panoramic cameras provide significant benefits over traditional wide-angle cameras. By using ‘pixel-level’ matching between the images from the left-side and right-side sensors, this prevents any blind spots, or image ‘twisting,’ or ‘distortion.’ Equally importantly, the image fusion process includes both brightness and color processing technologies that ensures consistency across the entire wide-angle image. This is a significant improvement vs. traditional panoramic cameras, which do not compensate for the different lighting conditions experienced by left- and right-side lenses. AI capabilities that further boost security All models in the new panoramic camera range use Hikvision AcuSense AI technology to differentiate between real security threats and other moving objects such as animals, falling leaves, and heavy rain. This helps security teams to focus on real security incidents, and to minimize costly false alarms. Additionally, the devices can be equipped with Hikvision Live Guard sound and light alarms, which deter would-be trespassers from entering sites or buildings – preventing losses or damage to property and improving safety. Ideal for multiple scenarios and locations The new panoramic cameras provide reliable 24×7 security in a wide range of expansive indoor and outdoor locations. These include parking lots, parks, scenic areas, farms, stadiums, and traffic intersections.  

Read More

Retention Marketing

Retention marketing has taken the e-commerce world by storm. This school of marketing aims to maximize the value of existing customers and retain them. It varies from the traditional methods of acquisition-based marketing as the goal is not to get more customers, but to encourage repeat purchases and increased product usage from existing customers. We can increase the Customer Lifetime Value (CLV) which aids in long-term profitability by delivering engaging and relevant content to the active customers. The customers are plausible to churn if we make customer acquisition our basis which additionally affects revenue and profit margins. For retention marketing in the E-commerce sector, encourage customers to revisit your website, and return to your app (if any) to keep making high-value purchases repeatedly. In the case of Subscription, stimulate users to keep the subscription active or upgrade them to a more advanced/premium plan. Retention marketing strategies are aimed at current, active, or retained customers. Researchers state that 10% of your loyal customers spend 3 times more per order/subscription than the other 90%, and the top 1% of your customers spend 5 times more than the other 99%. Existing customers know your brand well and the chances of selling to them are higher as you’ve already established a relationship with them. The success rate of selling to a new customer is comparatively low. Statistics have repeatedly concluded the nature of retention marketing to be more feasible & profitable. Customer retention can boost revenue. There is a high possibility of spending in the 30+ months of the customer-engaged relationship as compared to the first 6 months. A customer makes multiple purchases than a first-time visitor, in e-commerce alone. The retention marketing strategy also depends upon the nature of the business. For example, a brand selling clothes needs to invest more heavily in retention marketing than a brand selling sanitaryware. Clothes are bought repeatedly but sanitary fittings are once-a-decade things. The retention marketing mix thus will vary from business to business. Retention Marketing Approach Personalization – It is the key to winning a customer. Addressing the customer by their names in emails or messages, sending messages/pop-ups based on their purchase history can delight the customers. According to a survey in the US, UK, and Canada of 3000 consumers, more than 60% of customers expect personalization when being sent special offers, to be a standard procedure. Offers and Discounts – It is a sure-shot way of retaining existing customers and boosting sales. With discounts and offers, customers tend to stick, and their purchase frequency increases. Email Marketing – A newsletter works as a constant reminder and aids in brand recall. The launch of a new range or an upcoming sale can be communicated through the newsletter. Email strategies like welcome mail and cart abandonment help in keeping a customer engaged. Loyalty Program Business Model – This strategy is a mutually beneficial one. It offers valuable rewards and special perks to the customers subscribed under the loyalty program of your choice. These users will be less inclined to switch to competitors, and it adds up to the customer’s lifetime value. These loyalty programs will assure you about the customer’s willingness to stay connected with your brand. Customers tend to leave when they think you’re indifferent to them or the content is not relatable. Customer Progress – Make a customer-friendly UX/UI interface for users to easily slide through. Existing users are familiar with the onboarding process and have built trust around it. In this process, monitor the progress of your customers and notify them about the positive progress they have made on your portal/app. It could be educational, health-centric, crypto news, or as simple as a notification of your shopping cart. Over the past years, the cost of customer acquisition has risen for both B2C and B2B companies. Adobe’s CEO Shantanu Narayen in an Ad News interview said that too many companies are chasing customer acquisition when the real value lies in driving product usage and understanding high-value actions from customers. Customer Retention More reasonable to acquire repeat customers than to find new customers Recurring customers are more loyal to your brand Minimum product onboarding/information required by repeat customers Retention Marketing is the new catalyst for growth. Here’s how. According to Harvard Business Review, it is more expensive to acquire a new customer than it is to retain an existing one. Existing customers understand the value proposition of your organization, so making an advertising pitch to them is not a budget-friendly move. Due to an established relationship with your existing customers, you have a 60-70% chance of selling to them. The success rate is less than 20% in the case of new customers. Money invested on retention is more effective than money disbursed on acquisition. Data shows that improving your lifetime value or retention is more impactful than improving your acquisition. This will ensure a larger return on investment on your marketing budget to engage current customers. Retention fuels acquisition. It is a proven product with the primary goal of retaining and not bringing in new users. The best acquisition strategy to retain your satisfied customers is through referrals and word-of-mouth marketing, something that more than 90% of the consumers trust more than any other form of advertisement. Customers have more chances to give a referral if they return to your business. The average new user may refer your shopping app to 2-3 people. While after regular purchases, the shopper will most expectedly refer it to approx. more than 5 people. According to Neilsen’s Global Consumer Study Report in 2019, customer “disloyalty” is on the rise. Today, nearly half of the global consumers are more likely to try new brands that they’ve never tried before when compared to their willingness five years ago. Consumers can now download new apps in seconds and set up an account in merely 3 simple steps. Brands need a dedicated team of professionals to counteract the fact that customers are in line when shifting costs are inherently low. Retention strategies are no longer pleasant to have for digital businesses. The ability…

Read More

Johnson Controls Acquires SES to Extend Access Control to Critical Infrastructure

Technology includes Bluetooth-enabled locks and mobile applications for the security of assets such as cellular and communication towers and sites The provision of local and off-site access via cellular adds to Johnson Controls robust access control portfolio Johnson Controls, the global company for smart, healthy and sustainable buildings, announced recently that it acquired Security Enhancement Systems LLC (SES), a provider of mobile-based, keyless access control solutions used in critical infrastructure, including telecommunication towers for major providers. “We are committed to providing the best and most complete access control solution to our customers,” said Sanjeev Singh, Vice President, Product Management, Johnson Controls Security Products Business, “This technology allows us to own the entire experience of secure and streamlined access to remote sites and critical infrastructure by service providers. Our customers will benefit from a single, trusted source for security solutions for corporate and other locations.” SES integration of mobile, cloud and on-premise technology provides a complete solution for multi-site security. SES has pioneered highly optimized and versatile locking solutions for remote sites that include diverse security needs for perimeter control, equipment, shelters and other valuable assets for telecommunication, utilities, transportation and data centers. “This combination validates our product realization efforts of the past seven years and we are excited that Johnson Controls will bring our technology into its product portfolio,” said Philip Ufkes, SES President and Founder, “This partnership will further benefit our current and future customers by providing a wide array of cost-effective security and productivity solutions.” SES will add to Johnson Controls’ comprehensive portfolio of security and access control technology available today including security and access controls, video management, security as a service, IP cameras, door controllers and card readers. Raymond James served as the exclusive financial advisor to SES.  

Read More

Entrust Recognized as a Leader in Global Holistic Transport Layer Security (TLS) Certificate Market by Frost & Sullivan

Entrust, a leading provider of trusted identity, payment, and data protection solutions, has been recognized by Frost & Sullivan as a leading TLS/ SSL certificate services provider. In a field of more than 10 global industry participants, Frost & Sullivan independently plotted the Top 7 companies in its analysis. Noting the company’s unwavering focus on high assurance certificates and disruptive innovation, Entrust received the highest score on the growth index, making it the second-largest Certificate Authority (CA) in the global holistic TLS certificate market with a 14.4% market share. As the report notes, it is imperative to maintain the chain of trust in public key infrastructure (PKI), especially as security compromises can lead to loss of credibility among customers. With more than 10,000 enterprise customers using Entrust solutions to enable trusted identities, payments, and data protection, the report highlights the company’s growth pipeline, including product development to address customer pain points. This innovation has delivered new use cases such as PKI as a Service (PKIaaS), Digital Signing as a Service (DSaaS), Verified Mark Certificates (VMCs), certificate lifecycle management and automation, and expansion of partner integrations, which drive TLS certificate usage and customer adoption. The Entrust technology roadmap supports expanded certificate usage, lifecycle automation, and ease of use and control, which will deliver faster time to value for customers. As such, the company has introduced more as-a-service use cases, such as PKIaaS and DSaaS. Additionally, the report highlights how Entrust product development is aligned with industry trends such as growing PKI adoption and proliferation of IoT devices, certificate management automation, and enterprise cloud adoption. “Entrust has secured the second-highest market share in the global holistic TLS certificate market. The CA has recorded consistent growth in the last three years, powered by a strong vision to keep the world moving safely by enabling seamless and secure transactions,” said Swetha Krishnamoorthi, Senior Industry Analyst, Frost & Sullivan’s Security Practice, “The growing volume and variety of devices deployed in organizations demand a correspondingly large number and types of certificates. Therefore, organizations prefer to have a single-stop destination for all types of certificates to reduce the complexity of certificate lifecycle management. Entrust offers an extensive portfolio that includes certificates such as DV, OV, EV, S/MIME, digital signatures, qualified certificates, code signing certificates, and IoT certificates. In addition, Entrust Certificate Services (ECS) platform is CA-agnostic. It offers a seamless and single-pane-of-glass user interface to manage multiple certificate types across both on-prem and cloud-based environments. Entrust has consistently demonstrated its commitment to innovation, thereby recording a high score on the innovation index of the Frost Radar.” Frost & Sullivan also pointed out that Entrust is the only vendor in its study to offer a Cryptographic Center of Excellence to accelerate PKI and cryptography discovery, strategy, and management efforts. Entrust is also one of the two vendors reviewed offering Verified Mark Certificates to support strong identity in email. “With over 50 years of experience in providing solutions for high-trust environments, it’s pleasing to see this report acknowledge that our offerings are built on top of a robust infrastructure and that highly security-conscious organizations such as Microsoft, Visa, Mastercard, VMware, and more rely on Entrust for their PKI needs demonstrates the reliability we offer,” said Jay Schiavo, Vice President of Products for Certificate Solutions, Entrust, “This recognition from Frost & Sullivan reinforces the fact that our TLS/ SSL encryption protection goes beyond the certificate. Rather, we continue to innovate an advanced certificate management solution to provide security beyond the certificate.”  

Read More