Tech Advancements in 2019 and Looking Ahead to 2020

Cloud computing, security and collaboration top the list of enterprise technology trends in 2019. Gartner estimated early in the year that cloud services would grow 17.5 percent over 2019 and infrastructure services would be the fastest growing segment. In 2019 and 2020, business leaders must consider the cost of scalability, communications adaptability and how to help increase efficiency for IT staff.

NEC led the charge with a banner year of new releases, updates and development in the cloud computing and unified communications market.

As we close out the year, let’s review technology trends firmly established in 2019 and what to expect from NEC in 2020.

Reduce the Complexity of Data Center Management

A 2019 Spiceworks survey found that 46% of enterprise organizations planned to adopt hyperconverged infrastructure solutions by 2020. With the complexity of datacenter applications, virtualization and other cloud-based services, IT staff is challenged with managing it all. Each application or service typically involves installing its own server, requiring more storage, networking and skill requirements. Inefficient resource utilization and disorganization leads to unnecessary purchases, the inability to innovate and increased downtime.

In 2019, NEC released a new HCI solution powered by Scale Computing’s HC3 software. HCI consolidates and streamlines IT processes, bringing the hardware costs down and making management easier through one virtualized system and interface. A more stable and simplified environment means that IT staff can be proactive, with far less downtime, and the ability to scale easier.

Solve Communications and Collaboration Challenges

Unified communications helps businesses of all sizes to collaborate from across the globe. As more employees work from remote locations, team communications must be adaptable and easily accessible for reliable availability and a better employee experience. Unified communications requires technology that is easily integrated into current IT environments, cost effective, flexible and scalable.

NEC continues to be a world leader in UC research and development. In 2019, NEC was proud to announce the latest evolution of UNIVERGE-SV9000 series for communications and collaboration.

Securely Prioritize UC Network Traffic

When enterprises rely on unified communications, they are challenged with delivering cost-effective bandwidth while helping critical applications coexist securely and efficiently. In 2019, NEC announced a partnership with Infovista that combines Infovista’s Software defined WAN (SDWAN) capabilities with NEC’s software defined unified communications services. This partnership helps to reduce WAN operating costs while delivering optimal voice quality and dynamic routing of voice traffic based on real-time network traffic and conditions. By leveraging multiple WAN links and centralizing management, application performance is safeguarded and operational efficiency is improved.

Move to More Cloud-Based Solutions

2019 saw the increase in use of as-a-service options including infrastructure, unified communications, collaboration and backups, and this increase will continue throughout the New Year. In 2019, NEC expanded the UNIVERGE BLUE cloud portfolio to include Team Collaboration and BaaS (backup as a service).

NEC’s UNIVERGE BLUE Team Collaboration improves workforce communications and cooperation, anytime and from anywhere. By simplifying the complexity of voice, video, screen sharing and meetings, the employee experience is enhanced and employee retention improves.

BaaS solutions can reduce the likelihood of data loss and save money on the cost of backup infrastructure. Built on NEC’s powerful distributed grid platform, HYDRAstor®, and secured in Iron Mountain® data centers, this backup as a service solution securely backs up onsite data centers cost-effectively with advanced encryption and easy scalability.

NEC continues to deliver excellence in cloud computing, business continuity, infrastructure and unified communications.

Tech Trends to Look for in 2020

Research shows that IT budgets will continue to increase in 2020, much of it to be spent on new technology as well as hardware replacement. According to a survey of 1,000 North American and European companies conducted by Spiceworks, 44% of businesses plan to increase IT spending in 2020 (vs. 38% in 2019). Gartner also predicts increased worldwide IT spending in 2020 with a growth rate of 3.7% overall.

Here’s a look at some of the trends for 2020 and beyond.

Cloud Computing and Everything as a Service

Installations of cloud-based computing will continue to grow at a record pace as organizations become more familiar and comfortable with the advantages it offers to a mobile workforce. Cloud infrastructure is maturing beyond being separated into public, hosted private and on premises buckets to instead becoming more portable and mobile as well as more standardized.

Spending-wise, Spiceworks’ IT spending survey found that hosted and cloud-based services are expected to make up about 22-23% of the total IT budget in 2020 (for NA and European companies). Online backup and recovery services will represent the second largest budget allocation in cloud services, with larger companies allocating more money toward desktop-as-a-service and platform-as-a-service than smaller organizations.

Edge Computing and IoT

Another leading-edge trend that is gaining momentum is edge computing. Defined as distributed computing, edge computing moves computation and data storage closer to where these services are needed, improving latency and saving bandwidth. Spiceworks reports that 68% of large companies plan to use edge computing by the end of 2020.

Artificial Intelligence

Artificial intelligence (AI) and machine learning (ML) are no longer part of science fiction. Spiceworks estimates that businesses using AI-powered tech is going to triple by 2021. As an example, AI/ML can be used to help reduce costs by increasing the efficiency of cloud computing. Workplace efficiency can also be improved by using AI to sort through volumes of data to find the information that is most pertinent. AI also is making its way into collaboration and communication within the enterprise. Both internal and external teams continue to become dispersed, so better and more intelligent collaboration is needed to provide information and insight for decision-making.

Facial Recognition

NEC has paved the way for the use of facial recognition in aviation, government entities and retail and in 2020, use of NEC facial recognition will continue to expand across all industries including healthcare, education and hospitality to increase security and improve the customer experience.

NEC Face Recognition Technology Ranks First in 2019 NIST Accuracy Testing

In retail, NEC facial recognition will continue to be expanded as it’s used to personalize the online and in-store experiences for shoppers. Retailers also use it to fight retail crime and shoplifting.

Several new applications for using facial recognition in healthcare are in development. For example, rather than waiting in line to be seen, a virtual assistant can scan a face and assign a patient to a doctor. In education, administrators will be able to take attendance with the help of facial recognition. Facial recognition will be used to enhance identity management and verification systems within healthcare, education and hospitality. NEC’s goal by developing cross-industry facial recognition solutions is to help businesses enhance their employee and customer experience by enabling seamless, frictionless, and more efficient environments by automating operations with this technology.

Star Alliance and NEC Sign Partnership to Enhance Passenger Experience

Technology will continue to improve in hospitality, including security and access, payment authorization and customer service. Hotels, cruises, airports and restaurants are using facial recognition to personalize the customer experience, including using their face to pay for a meal, check into a flight, get recommendations or receive special offers.

Which of these trends does your organization plan to embrace in the coming year? Talk to an NEC expert to learn more about our award-winning research and development and we can customize a solution for your technology needs.

NEC Corporation of America

Free Strategic Consultation
Let us assist you with your current business needs!

Fill out the form today and we will get back with you.

 
 
 
 



Soar To New Heights with NEC UNIVERGE Blue Cloud Services

Take Your Unified Communications to the Cloud

Today’s businesses have customers and employees that expect reliable and secure communications from anywhere at any time. Unfortunately, building and maintaining this infrastructure can be cost-prohibitive. Cloud-based communication services are available but could put businesses in a bind paying for services they don’t use or limiting them to one-type of solution.

Small businesses and large enterprises need flexibility when investing in cloud computing. Enterprise businesses expect scalability that’s available when needed. Small businesses are limited in resources and require the ability to do more with less.

No matter the path: on premise, cloud or hybrid, NEC’s UNIVERGE BLUE offers a dynamic and flexible delivery model that’s tailored to your business needs and built on our award-winning IT infrastructure.

Why Move to Cloud-Based Solutions?

Your customers, whether internal or external, desire an easily accessible, secure and responsive experience. Employees must be able to perform their duties effectively and rely on dependable technology to fully support a positive customer experience.

Organizations are challenged with implementing communication systems and technology that allows their employees to work together from anywhere at any time. The solution typically involves multiple types of software, infrastructure and other platforms across many locations. Complex system integrations and management can raise IT costs and limit the IT staff from enjoying a productive and efficient employee experience. With IT employees in reaction mode, the customer experience falters due to downtime or unavailable data.

Adapt, connect, and transform your business with UNIVERGE BLUE Cloud-based solutions and unified communications streamline the employee experience while reducing costs and simplifying management. Employees have access to their data and systems via the internet or anywhere they have cell data coverage.

The challenge becomes deployment of these new solutions (legacy systems, reliability, security and cost) and choosing a technology that will continue to grow with the organization.

NEC UNIVERGE BLUE: Unified Communications as a Service (UCaaS)

UCaaS provides tools for organizations choosing to move voice, mobility, messaging, chat, video collaboration and more into the cloud. Employee teams can communicate anywhere, at any time, on any device. As an enterprise-grade communications solution, UNIVERGE BLUE is cost-effective, built with the latest UC tools at the cost of a standard user license. Best of all, this solution is fully customizable so any business can scale up or down as needed. UCaaS replaces outdated communication systems and reduces the need for extended disaster recovery planning and resources.

NEC’s UNIVERGE BLUE delivers this solution while shouldering the burden of maintenance and upgrades, freeing your staff to focus on other business needs.

NEC UNIVERGE BLUE: Contact Center as a Service (CCaaS)

Meet your customer where they are by implementing a cloud-based contact center solution that can be accessed from anywhere. Empower agents to use social media, SMS, webchat, phone, video and more to provide an elevated customer experience. Customers speak to a real human, specifically chosen through CCaaS skills-based routing and, if needed, moves your high-priority customers to the front of the queue. Any size business can benefit from this solution that scales from 5 agents to 20,000.

Again, NEC manages and maintains the system 24/7/365 and business continuity and disaster recovery is built into the solution.

NEC UNIVERGE BLUE: Team Collaboration

Team Collaboration creates a digital workplace in the cloud by improving workforce and remote communications and cooperation. Voice, video, screen sharing, messaging, meetings and file sharing is accessed through a single dashboard on multiple devices at any location. Either used in real time, or off-line, all team members are kept connected and up to date as communications follows them to whatever device they’re using.

Simplifying collaboration and reducing the cost and complexity of multiple applications improves the employee experience and employee retention.

What Makes NEC UNIVERGE BLUE Better?

NEC UNIVERGE BLUE enables a phased approach to organizations moving to cloud as well as a flexible delivery model. Built on highly secure JITC-certified encryption technology and offering two layers of support, NEC’s innovative solutions and customizable approach to communications allows businesses to:

  • Improve the customer experience
  • Improve the employee experience
  • Reduce IT costs
  • Reduce risk
  • Simplify technology management
  • Improve productivity

NEC also has extensive expertise in the market with more than 120 years of experience across all environments. Our solutions integrate into your current environment and scale to where you want to be in the future. Our dynamic delivery model gives you the options of on premises, cloud, hybrid, public or private environments. Payment options are just as flexible, with capex, op-ex or a combination of both.

NEC’s Cloud services allows your organization to grow and deliver a unified, reliable and secure experience with minimal investment. Customize the solution that’s perfect for your organization. Contact an NEC Solutions Expert to learn more or download the UNIVERGE BLUE ebook.

NEC Corporation of America

Free Ebook

Reach Sky-High Communications

This ebook will help you understand how UNIVERGE BLUE can support your communications system while allowing your team to remain focused on what matters most—your business.
 
 


Honoring Those Who Serve and Have Served

NEC Commemorates the Day with Maj. Eric King and #VETSWHATSNEXT

Each year on November 11, America honors and celebrates the brave men and women who serve and have served in our nation’s armed forces.  Here at home and around the world, 1.3 million active duty military and 860K reserve service members protect our freedoms and secure our liberty.  There are 18.2 million veterans in the United States, according to the most recent statistics from the US Census.  To each and every one, we owe our sincerest gratitude.

Earlier this year, NEC’s effort to help thank one of these veterans was completed as he received the keys to his new mortgage-free home located in Irving, Texas, home to NEC Corporation of America’s headquarter office. Major King is a father of three who served three combat tours overseas. This decorated veteran medically retired from the military in 2016, and since has been focused on getting healthy and raising his three children. Maj. King and his family received their new home courtesy of Operation FINALLY HOME, built on land donated by the City of Irving, and supported by donations and volunteers from several companies, including NEC.

Watch the video the day that Maj. King and his family learned they were going to be given the home up to the day they received the keys.

This gift of thanks given to U.S. Army Major Eric King and his family has had a tremendous impact on them, prompting Maj. King to write to Operation FINALLY HOME:

“Thank you Dan Wallrath, Operation Finally Home and all supporters. We are at 6 months of being in our beautiful home and we still have the same feelings we had on the day of the key dedication ceremony…still filled and overwhelmed with joy, love and appreciation. Thank you!!”
– Eric K. King

Honoring Those Who Serve and Have Served – NEC Commemorates the Day with Maj. Eric King and #VETSWHATSNEXT

Maj. King has dedicated himself to giving back by helping other veterans reclaim their lives. He launched #VetsWhatsNext, a nonprofit charity to help change the lives of disabled Vets and their families. Through fundraising activities and #VetsWhatsNext product sales, he hopes to benefit organizations such as Operation Finally Home and Veterans scholarship foundations. For more information go to https://www.VetsWhatsNext.com/, and follow on Facebook, Twitter (@VetsWhatsNext), and Instagram (#vetswhatsnext). NEC supports #VETSWHATSNEXT.

Honoring Those Who Serve and Have Served – NEC Commemorates the Day with Maj. Eric King and #VETSWHATSNEXT

Pictured with Maj. King and modeling some of the #VetsWhatsNext gear are some of our NEC Veterans (from L to R): Charlie B. – Army, Auby T. – Army, Tammy L. – Navy, Stacey T. – Navy, Maj. Eric King – Army, John W. – Air Force, John E. – Air Force, Russell H. – Marines.

AFIS Internet Conference 2018

Please join NEC in offering our heartfelt thanks to Maj. King, our NEC veterans, and all that are serving or have served.  We honor their service and sacrifice that allows us to continue to enjoy freedom and democracy in this great country. Your show of gratitude can have a far reaching impact on so many, just as it did with Maj. King.  If you are looking for additional appreciation ideas, here are 8 Ways to Express Appreciation on Veterans Day from Military.com.

Be Prepared When Ransomware Attacks Strike

While ransomware attacks are certainly nothing new, a recent report indicates that such incidents have increased more than 360% year-over-year in the first half of 2019. In addition to businesses and individuals, more and more cyberattacks are targeting local governments in several states, including  Maryland, Michigan, Florida, Indiana and the recent attacks on 23 Texas towns.

These attacks not only cause disruptions and inconvenience, but cost millions in recovery and restoration efforts, loss of revenue, decreased productivity and reduced levels of customer service. Ransomware and other cyberattacks will probably never be eliminated completely, but organizations can mitigate the negative effects of an attack and be prepared before one occurs.

Being Prepared Before an Attack

Here are a few recommended steps that businesses and other organizations should consider before and after an attack.

  • With the help of a security expert, conduct a “health check” on your systems to identify any vulnerabilities. Consider both external attacks as well as internal breaches (intentional or not).
  • Keep backup data off premise, both physically and logically away from production data.
  • Ensure that all systems used for backing up data have the latest software patches, follow protocols and can detect ransomware.
  • Reduce the complexity of having multiple systems by consolidating backup data from all systems—disaster recovery, applications and cloud systems.

Education and communication also play an important part in cyberattacks. Makes sure all end users are educated about security protocols, including not falling for spoofing attacks. If a ransomware or other attack does occur, communication with all stakeholders—employees, partners and customers—is a critical step. Mitigating anxiety and alleviating fear through ongoing communication help make things go more smoothly during the recovery process.

Once an attack occurs, acting quickly will be critical as well. Hire a professional with experience to help you make the right business decisions regarding recovery efforts based on the amount of time it will take, cost considerations and what losses are occurring.

Expertise in Data Backup and Recovery Solutions

NEC, with our experience and expertise in data backup, business continuity planning and recovery solutions, can be a powerful ally in mitigating risks prior to an attack and enabling faster recovery should an attack occur.

NEC delivers Backup as a Service (BaaS) by providing a suite of off-site data backup services. Our BaaS solutions range from ensuring that systems are up-to-date to providing secure targets, which can optionally move data to and from tape storage. Our staff is fully trained on a range of backup systems and can ensure that data is backed up locally and off-premise.

As the first technology infrastructure provider to join Iron Mountain’s Data Center Marketplace, we offer protection and accessibility through infrastructure built to our specifications and made available at Iron Mountain’s secure, compliant and energy efficient above-ground and underground data centers.

In order to optimally address a wide range of customer requirements, NEC offers a suite of BaaS deployment options:

  • Customers with data stored in public clouds, and with highly dispersed systems, often require a fully managed backup solution, with backups performed at the application and bare metal/VM level. Once notified of a ransomware attack, it’s important to scan backups to detect any malware (not just ransomware) so that the system will not be re-infected when restoring from backups prior to the incident. Examining ransomware-encrypted data upfront will help prevent overwriting old “clean” data inside the backup. NEC uses industry leading agents to isolate and not transfer ransomware-encrypted data from any client/server locations. This action is performed to ensure data integrity prior to storage and to alert customers of any intrusion.
  • NEC also provides physical and virtual backup appliances deployed on premise for customers with: a requirement for local storage; a large amount of servers or data and a need for a fully managed backup solution. Through this option, application and bare metal/VM-level backups are stored locally and analyzed for ransomware prior to deduplication, compression, encryption and secure transmission to NEC.
  • Other customers use their own backup software and have strict backup time windows that require the highest performance data backup ingestion. For them, NEC offers an upgraded BaaS Appliance using our HYDRAstor platform. This platform provides the highest ingestion and deduplication performance and delivers highly secure replication to NEC HYDRAstor systems located at Iron Mountain. NEC offers ransomware detection services based on the customer’s specific policies and landscape.
  • For customers that use their own backup software, but don’t require high performance, NEC offers the HYDRAstor Virtual Appliance (HSVA). The HSVA runs in a virtual machine and acts as a backup target for a customer’s own infrastructure. It deduplicates using localized NEC HYDRAstor technology before encrypting data for transfer to NEC HYDRAstor at Iron Mountain. NEC offers ransomware detection services based on the client’s specific policies and landscape.
  • Sometimes customers prefer to push data to tape using industry standards. NEC, in collaboration with Iron Mountain, offers tape restoration and long-term retention services for all the services listed above.

Providing Protection from Both Outside and Inside Threats

Dedicated NEC-based infrastructure is built according to best practices for redundancy and security. Ensuring that data backup systems and storage are off site reduces access to these critical systems by both hackers and insiders. For a reasonable monthly fee, NEC offers low total-cost-of-ownership BaaS that provides:

  • Industry Leading Backup Agents
  • Secure off-site data storage
  • Disaster recovery for 24/7 business continuity
  • Value Added Services
  • On-Premise Appliance Options

For a complimentary Backup Assessment, fill out the form below.

Learn more about NEC’s back up, recovery and business continuity offerings and download the white paper.

NEC Corporation of America

Free Strategic Consultation
Let us assist you with your current business needs!

Fill out the form today and we will get back with you.

 
 
 
 



Facial Recognition: How Policy Can Catch Up to the Technology

Facial recognition (FR) stands at a critical point in its development.

The technology is racing forward and improving rapidly. Adoption of FR tools as a law enforcement asset is growing. It’s now commonly accessible by police agencies nationwide.

And beyond its original applications in the military, counter-terrorism and law enforcement, the technology is improving other sectors, such as aviation and travel, hospitality, healthcare, financial services and retail.

Yet public understanding of FR lags behind. And, driven by incorrect popular perceptions, public policies that would ban or over-regulate FR’s use seem ill-informed and out of step with present realities.

This poses a challenge to those of us committed to the success and propagation of FR: How can we ensure that public perception — and policymakers’ perception — of FR is better aligned with the technology’s value to society, and, specifically, to law enforcement?

Recently I had the privilege of moderating a blue-ribbon panel of FR leaders who assembled to tackle this precise question.

The panel convened for the 33rd Annual International Biometrics Association User Conference — formerly known as the AFIS Internet User Conference – in Scottsdale AZ.

“We’ve got to get better at helping policymakers understand the value and positive outcomes of this technology,” said Ashwini Jarral, executive director of the Integrated Justice Information Systems Institute, setting the tone for the discussion. “That way, we can go and fix these policies and laws.”

It was heartening to see our panelists rapidly establish a consensus around at least three themes:

Theme #1: Educate policymakers and the public on two key points: Propelled by misapprehensions, some municipalities have banned FR in law enforcement. Leveraging public education as a basic push-back strategy, the panel recommended two areas of focus:

First, the public isn’t distinguishing between FR as an investigative tool and as a surveillance tool. People need to understand that FR doesn’t mean constant video surveillance. It’s not “Big Brother,” rather it’s used for investigatory leads.

“Investigation and surveillance are two different things completely,” said Lt. Derek Sabatini of the Los Angeles County Sheriff’s Department. “Detroit and Chicago, for example, have large surveillance systems, but these systems don’t include live facial recognition. Facial recognition tools are only used for investigative purposes.”

Secondly, the public seems unaware of procedural safeguards already in place to regulate the use of FR.

“This is not the ‘Wild West,’” said Lt. Sabatini. “There are governance systems that mandate that you must have a right to know and a need to know before you can access that data. There are criminal penalties if you misuse that data.”

“People mistakenly think that sweeping and universally accessible databases are being freely shared between states and the federal government,” said Tovah LaDier, executive director of the International Biometrics + Identity Association. “In fact, states must give individual permission for the federal agencies to permit access.”

Existing federal legislation provides that states may enter into agreements with the FBI to provide state-level department of motor vehicle (DMV) database access, only for the specific purpose of assisting the FBI in fulfilling its law enforcement responsibilities.

Theme #2: Publicize FR’s positive track record: Popular fears of FR overreach are disproven by the technology’s excellent performance in law enforcement.

Lt. Sabatini told the conference that Los Angeles County has been using FR as an investigative resource since 2009, and deployed it in 11,000 cases last year alone. Yet the County has never faced a civil liberties court challenge charging abuse. He said that the New York Police Department had leveraged FR for 7,000 investigations last year, which had helped generate some 1,000 “legitimate arrests.”

Faith Contreras, the Facial Recognition Program Administrator for the Arizona Department of Transportation, pointed to successes in child trafficking and child smuggling. She said it’s also been used to investigate a range of cold cases and to identify unknown deceased individuals.
 
Theme #3: Embed governance capabilities within the technology: Panelists concurred that when it comes to protections relating to such matters as privacy and consent, the desired policy objectives have to actually be built into the technology.

“You can write policies all day long,” said Mr. Jarral. “But if you can’t demonstrate that your policies are actually embedded within the technology, you’re going to lose this battle.”


At the panel’s closing, Ms. LaDier affirmed her association’s commitment to the “transparent and secure use” of FR and related technologies. She also announced the forthcoming launch of a “responsibleid.org” site that would serve as an educational platform and a repository of “good news” about FR.

“Any technology can be used properly, and it can be abused,” she said. “Considering facial recognition’s enormous benefits, we cannot ban the technology. We have to do the hard work to regulate it so that it is used properly.”