intelligent services for cloud computing, predictive ai ... · embedded devices work by isolating...

64
Cloud Computing Predictive Artificial Intelligence Business Intelligence Intelligent Services for Cloud Computing, Predictive AI and Business Intelligence

Upload: others

Post on 19-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

July Issue

Cloud Computing Predictive Artificial Intelligence Business Intelligence

Intelligent Services for Cloud Computing, Predictive AI and Business Intelligence

Page 2: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

contentCloud Computing, Predictive Artificial Intelligence and Business Intelligence

01020304

Cloud9 Solutions

Cloud ComputingEnterprise Cloud Services to Streamline Your IT Environment.

Business IntelligenceAdvanced Software & Big Data

Predictive AI & IoTData Analytics & Machine Learning to Predict Future Behaviours

Cloud Computing Predictive AI & IoT Business Intelligence

Page 3: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

solutions01

Cloud Computing Predictive AI & IoT Business Intelligence

Enterprise Cloud Services to Streamline Your IT Environment.

Data Analytics & Machine Learning to Predict Future Behaviours

Business Management Software & Big Data Analytics

Achieve a unified cloud management system to secure, simplify & visualize your entire network. The Cloud9 management console includes cloud backup, data recovery, network security, network optimization, virtual management & flexible software solutions.

Gain real-time insights for future living. The future of IoT relies on gaining insights from collected data. Furthermore, Algorithms are created for machine learning in order to predict future behaviours, monitor statistics, predict opportunities and prevent risk.

Businesses & enterprises can gain valuable insights & in-depth reporting on their industry, customer, competitor & internal environments. Real-time data management allows for management to take control, share & collaborate within a secured cloud network.

Page 4: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Cloud Computing

02 StorageCraft

0304 Ninja

- Teamviewer

Webroot- Malwarebytes

Cloud Computing

01 SANGFOR

02

EnterpriseCloud

NetworkOptimization

NetworkSecurity

DisasterRecovery

Threat IntelligenceServices

Turnkey Mail Solution

05 Repairshopr

06 Smileback

07 Microsoft Azure

08 Office 365

09 ITGlue

10 Openfind

Page 5: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

SANGFOR HCI - THE 3RD GEN HCIDriving Hyper-Convergence to Fully Converged

Leading IT Revolution

1 Management Console Removing Silos

1 Hardware Consolidating Legacy Appliances

1-Click Deployment & Modification Reducing the Time-to-Market

1-Step to Enterprise Cloud

1-Stop Solution Cutting TCO Up to 80%

Sangfor HCI

Protection Against BYOD / IoT

Sangfor HCI Highlight

Management Silos

Long Time-to-Market

Heavy Upfront Investment

Low Utilization Rate

Huge Hardware Footprint

Multiple IT Specialists

The Software-Defined Solution that Enables You to Transit Smoothly to Cloud

What you think is what you getCreate topology with just a few

clicks of mouse

ComputeVirtualization

StorageVirtualization

NetworkVirtualization

NFV

Page 6: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Virtual Desktop Infrastructure SolutionDeeply Integrated Desktop Cloud with Outstanding Performance

Sangfor aDesk - Virtual Desktop Infrastructure (VDI)

Desktop/Application/Data Run on Server Push User Interface Push User Interface

SRAP Desktop Delivery Protocol

Thin-Client

PC Terminal

PAD Terminal

Sangfor aDesk is the newest virtual desktop solution based on hyper-converged infrastructure. Through deeply integrated server virtualization, desktop virtualization and storage virtualization, it only takes aDesk appliance and cloud terminal to deliver rapid deployment of cloud platform. This virtual desktop provides outstanding user experience and software-hardware compatibility that are comparable to PC, plus it’s more secured and efficient.

Sangfor aDesk places what’s originally on PC – desktop, applications and data – in data center, via SRAP desktop delivery protocol, it outputs OS interface as image to front-end terminals such as cloud terminal, laptop, PC, smart devices, etc. As long as network is up, users can use all kinds of terminals to access their personal desktop stored on server. Data is more secured, desktop management is more efficient, user access is more flexible.

Page 7: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

SANGFOR aDeskTM

Virtual Desktop Infrastructure Solution

Innovative Virtual Desktop Performance that Beats PC

OPEX

220,000+ Commercial Deployment in 3 Years

Challenges Faced by Traditional PC

HARDWARE COST

POWER COST

Why Choose Sangfor VDI

SecurityAssurance

EffectiveDeployment

ConvenientManagement

EnergyConservation

- Centralized storage of sensitive data.

- Employees can only read and write but not TAKE the data.

- Create hundreds of new desktops in 30 minutes.

- Distribute desktop resources as required.

- Flexibly adjust CPU memory or disk.

- Update all apps with one click

- Power consumption of thin client less than 10W.

- Thin client life cycle could be 5-8 year with low failure rate.

User experience ComparesFavorably with PC

High compatibilityfor Peripheral Devices

Highly EfficientDesktop O&M

Convenient RemoteAccess to Desktop

Extremely Difficult forData Protection

MobileFriendly

Hard to Managewith High OPEX

Page 8: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

SANGFORINTERNET ACCESS MANAGEMENT

Advanced Bandwidth Management withValuable Big Analytics

Comprehensive authentication methods with the most powerfulbandwidth management

Personalized analytics reports to create business value fromuser online data

Rich value added services to transform IT department into arevenue generating center

Wireless NetworkManagement

Multiple AuthenticationMethods

AbundantApplication Control

GranularBandwidth Management Big Data Analytics

Sangfor Behavioral Analytics

Generate Value from your own Data!

- Internet addiction analysis- Low-performing student analysis- Mental health analysis- Employee resign risk analysis- Information leakage analysis and more!

Smart Billing Solution

Bring New Revenue “Cow”

Help you generate new revenue through your IT dept.- Reduce Bandwidth Consumption- Improve User Experience- Reduce Investment in IT Infrastructure

Page 9: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

SANGFOR NEXT GENERATIONAPPLICATION FIREWALL

SECURED . CONVERGED . SIMPLIFIED

Reduced Security Hardware Footprint Up to 70%

One Management Panel for All Security Operations

Security Expertise Enablement Through Visualization

Do More With Less. Minimum 50% of TCO Reduction

Protect Your Organization From

TRADITIONALFIREWALL

INTRUSIONPREVENTION

CONVERGED SECURITY

ADVANCEDTHREAT PROTECTION

VULNERABILITYTHREAT SCANNER

WEB APPLICATIONFIREWALL

Web-Defacement Attacks Ransomeware Attacks BYOD & IoT Attacks

Sangfor Concept of Security

- Simplified Security Management- Real-Time & Rapid Response Protection from existing, emerging and future attacks- Holistic Security Overview

CONSOLIDATED REPORTING TOOL

Page 10: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

SANGFORWAN OPTIMIZATION (WANO)

Enjoy a LAN speed on your WAN

High SpeedVPN

VSATOptimization

Video ConferenceOptimization

HQ-Branch DC-DRC Entire network flow visualization“without blindspots”

Save 70% of investmentscost in dedicated lines

Secure & Stable VPNBuilt-in Intranet

Speed up systemaccess by 3-10 times Reduce 70% of traffic transmitted over the WAN

Page 11: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Protect the data created in your cloud-based applications from acts of human nature.

Even though your organization’s SaaS data is in the cloud, that doesn’t mean it’s completely safe.When it comes to working in cloud-based applications, the option of granular recovery isn’t a given. But the opportunity for human error is. Humans delete important files, overwrite one another’s documents, and accidentally download viruses. And SaaS vendors may or may not have a recovery solution for you. If they do, there’s no guarantee that it’ll be easy, that you’ll get the data in a useful format, or that the recovery will happen quickly or inexpensively.

StorageCraft® Cloud Backup provides granular protection of your business’s Microsoft Office 365 data and G Suite by Google Cloud data. Once set up, backups happen automatically. In a few seconds, you can recover the version of a file or folder that you need, in its original format, through an easy-to-use web interface. And you don’t need to sweat storage space, software upgrades, or the possibility of an onsite backup server failing.

Features and benefits of StorageCraft Cloud Backup

Cloud-to-cloud Backup Security and Availability One-stop Management Search Recovery Reporting

Page 12: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

It’s all about recovery.

Disaster Recovery Solutions

Getting your business running again immediately after a disaster is the whole point.With the StorageCraft® Recovery Solution™, you can recover your organization’s systems and data no matter what happens. The secret? StorageCraft prepares you for every eventuality. Recover lost documents. Restore failed servers. Eliminate IT downtime after a fire, hurricane, or earthquake. Sleep well every night.

File and folder recovery

Restore documents, spreadsheets, and other

individual items easily from a point-in-time backup

image.

Microsoft Exchange Email Recovery

Find and recover missing emails and other Exchange message items, even whole

mailboxes.

System Recovery

Quickly restore a failed physical or virtual system

to the same or new hardware or virtual

environment.

Pre-Staged Recovery

Start a restore operation on a critical server before disaster hits, and reduce

downtime to the length of time it takes to reboot the

server.

Temporary System Failover

Create a temporary virtual machine (VM) of a failed server or workstation to tide over your team until the failed system can be

restored.

Virtual Failover

Instantly virtualize a failed server or an entire network in our cloud, and maintain uptime during a site-wide

disaster.

Page 13: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

BrightCloud® Threat Intelligence ServicesIntegrated by leading security vendors worldwide, BrightCloud services

help you proactively protect your customers against modern threats.

Block maliciousinbound traffic

Enforce UserCompliance

Stay Ahead of theLatest Malware

Proactively PreventFraud

BrightCloud® Threat Intelligence ServicesWebroot offers a diverse set of threat intelligence services that span URL, IP, file, and mobile threat vectors. Learn more about each of the services below.

InternetBrightCloud IP Reputation ServiceBrightCloud Web Classification ServiceBrightCloud Web Reputation ServiceBrightCloud Real-Time Anti-Phishing Service

FileBrightCloud Streaming Malware DetectionBrightCloud File Reputation Service

MobileBrightCloud Mobile App Reputation ServiceBrightCloud Mobile Security SDKBrightCloud SecureWeb Browser SDK

Page 14: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Discover an extensive set of threat intelligence services and lightweight embedded device software, optimized to provide future-proof protection against modern malware, zero-day exploits, and other advanced threats.

PROBLEM:Traditional cybersecurity is ineffective

SOLUTION:It’s time for a Smarter CybersecurityapproachTraditional cybersecurity approaches are difficult to integrate and aren’t

effective in keeping operational devices secure. Many approaches for embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors. But there’s a smarter way.

The Webroot approach to IoT security is based on collective threat intelligence and the benefits of machine learning. Using tens of millions of threat sensors around the world, we can analyze new threats and exploits as fast as cybercriminals launch them, and actively correlate global threat data for up-to-the-minute protection and policy enforcement.

BrightCloud Threat Intelligence for IoT GatewaysBrightCloud® Threat Intelligence for IoT Gateways offers builders of IoT gateway appliances the most effective way to secure critical infrastructure and devices against internet and network based threats. Webroot provides industry-leading, cloud-based intelligence and highly

efficient and effective device agent technology to stop internet-borne threats. Coupled with our flexible and proven integration approach, this enables IoT designers and manufacturers to create unique offerings with built-in, future-proof security.

Ideal for securing the Internet of Things

Inbound Protection Outbound Protection

Lightweight Device Agent Threat Intelligence

Page 15: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

GET FREE MALWAREBYTES 3.0 WITH YOUR PURCHASE ON NINJA MSP

MALWAREBYTES 3.0: NOW STRONGER AND SMARTER

MAKESANTIVIRUSOBSOLETEFour layers of malware-crushing tech. Smarter detection. Specialized ransomware protection. It’s the security you’ve been looking for.

Page 16: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

COREX Cloud Computing www.corex.co.za 67

Unparalleled monitoring to detect and remediate problemswith a single pane for malware, antivirus,

screensharing, ticketing, patching and more.

Leverage the power of ourremote monitoring and management platform

Monitoring Automation IntegrationsThe most comprehensive monitoring engine for the cloud, networking gear,

workstations and servers.

Automate the management of your ITinfrastructure. Run scheduled and on

demand scripts, configure alerts,remotely configure policies and much more.

Manage key IT infrastructure componentsdirectly from your Ninja console including

patch management, antivirus, malware protection,screen sharing, backup and much more.

Page 17: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

In the ever evolving world of IT, it’s critical more than ever to have a firm grasp on your internal infrastructure so you can fix issues easily and quickly. Ninja has been designed to make your job easier more than ever by consolidating products you already love to use with remote monitoring

and management to provide a seamless solution to manage everything IT related.

For IT ProfessionalsReduce Clicks To ResolutionSingle Pane Of Glass VisibilityEasily Manage All DevicesSimple And Reliant Remote Access

For IT Service Providers

As a trusted advisor and consultant on behalf of your customers, IT Service Providers are busier than ever from

management of devices, network infrastructure to maintaining back-up and security environments. Ninja is designed to work with from as small as 1-man shops to large enterprise service companies providing full SLA

service offerings. In either case we think it’s really important to have an application that can scale for your

business that requires very little training time.

Minimize Training TimeSeamless IntegrationsSimple And Reliant Remote AccessConfiguration Of Device ManagementSupport To Help You Succeed

Page 18: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Smarter. Better. Faster. StrongerTurbocharge your remote support, improve your workflow with smart tweaks –

and show your customers that you care.

Remote Quick Steps Silent Host Roll Out Remote Device Dashboard

Faster File TransferTeamViewer Policy Assignment Mobile to Mobile Remote Connections

Page 19: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Email Marketing Free for Life Cool Integrations Computer Repair Cell Phone Repair Every Kind of RepairNot just a simple CRM

but a powerful integrated marketing platform

Our free tier lets you test things out to make sure

RepairShopr is the right fit

Quickbooks, Xero, Slack, eTech Parts, PayPal,

Google Calendar, Cloud Print, RepairTech, plus

much more

CRM, ticketing, invoicing, automated marketing,

3-way email, MSP features, inventory, scheduling

Mobile phone repair, inventory management,

automated ordering, refurbs, accessories POS,

time clock

Bike, Jewelry, Watch, Scuba, Auto, Camera, Small Engine, ATV, Drone,

Shoe Repair, IT Pros / MSP

All-in-oneplatform forrepair shops andmore.

The Most Complete Repair Shop Platform Available.

Page 20: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Repair Shops all over the world reply on our software

Great SupportSupport is included and will help you through any questions

Endless IntegrationsIntegrate your tools with our huge app center, or customize with our API

Integrated PaymentsMany payment integrations available, including mobile swipe on iOS

Stay InformedAlways be in-the-know about

your repair business

Easy to CustomizeLots of available options for

power users, endless customization

Great CommunicationYour team will ramp up quickly

with our software prompting the next action

Page 21: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Improve your business with daily feedback from the people who matter most

Behind every service ticket is a person. And that person has invaluable insights about your service delivery. SmileBack is the online platform that lets you actively engage with those clients and listen to their feedback, then instantly analyze, organize, and act on it.

SmileBackClient Experience Platform

Our simple survey goes in the email that concludes your support process. Clients leave feedback with one click.

Get notified about reactions, and address issues before clients cancel.

Set smarter goals and KPIs. SmileBack provides built-in reporting and metrics, plus integrations with other platforms.

Identify telling metrics about your team’s performance. Reward stand-out service to motivate your techs.

Instant Feedback

Actionable Data

Automatic Alerts

Team Motivation

Page 22: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Protect your business with identity and access management in the cloudGet single sign-on to thousands of cloud apps and access to web apps that you run on-premises with Azure Active Directory Premium. Built for ease of use, Azure Active Directory management tools enable collaboration and deliver holistic identity protection and adaptive access control.

Single sign-on to any cloud and on-premises web appAzure Active Directory provides secure single sign-on to cloud and on-premises applications including Microsoft Office 365 and thousands of SaaS applications such as Salesforce, Workday, DocuSign, ServiceNow and Box.

Works with iOS, Mac OS X, Android and Windows devicesUsers can launch applications from a personalized web-based access panel, mobile app, Office 365 or custom company portals using their existing work credentials—and have the same experience whether they’re working on iOS, Mac OS X, Android and Windows devices.

Protect on-premises web applications with secure remote accessAccess your on-premises web applications from everywhere and protect with multi-factor authentication, conditional access policies and group-based access management. Users can access SaaS and on-premises web apps from the same portal.

Enterprise scale and SLAAzure Active Directory Premium offers enterprise-grade scale and reliability. As the directory for Office 365, it already hosts hundreds of millions of users and handles billions of authentications every day.

Easily extend Active Directory to the cloudConnect Active Directory and other on-premises directories to Azure Active Directory in just a few clicks and maintain a consistent set of users, groups, passwords and devices across both environments.

Protect sensitive data and applicationsEnhance application access security with unique identity protection capabilities that provide a consolidated view into suspicious sign-in activities and potential vulnerabilities. Take advantage of advanced security reports, notifications, remediation recommendations and risk-based policies to protect your business from current and future threats.

Reduce costs and enhance security with self-service capabilitiesDelegate important tasks such as resetting passwords and the creation and management of groups to your employees. Providing self-service application access and password management through verification steps can reduce helpdesk calls and enhance security threats.

Page 23: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Your app. Your framework. Your platform. All welcome.Microsoft Azure is a growing collection of integrated cloud services—analytics, computing, database, mobile, networking, storage, and web—for moving faster, achieving more, and saving money. Here’s what you can do with Azure…

Digital MarketingConnect with customers worldwide with digital campaigns that are personalized and scalable.

MobileReach your customers everywhere, on every device, with a single mobile app build.

E-CommerceGive customers what they want with a personalized, scalable, and secure shopping experience.

Microservice applicationsDeliver scalable, reliable applications faster to meet the ever-changing demands of your customers.

Business intelligenceDrive better, faster decision making by analyzing your data for deeper insights.

Big data and analyticsMake the most informed decision possible by analyzing all of the data you need in real time.

Data WarehouseHandle exponential data growth without leaving security, scalability, or analytics behind.

Business SaaS appsUse business insights and intelligence from Azure to build software as a service (SaaS) apps.

Backup and ArchiveProtect your data and applications no matter where they reside to avoid costly business interruptions.

Development and TestSimplify and speed up the process of building and testing applications across every platform.

Disaster RecoveryProtect all your major IT systems while ensuring apps work when you need them most.

Predictive MaintainancePredict failures before they happen while you systematically prevent them.

Remote monitoring with IoTEnhance your business’ performance by monitoring devices, assets, and sensors in the cloud.

Hybrid IntegrationSeamlessly integrate applications, data, and processes across both on-premises and cloud.

SAP on AzureBring cloud scale and agility to your mission-critical SAP workloads.

SharePoint on AzureDeploy SharePoint servers rapidly and scale as needed with a cost-effective infrastructure.

Dynamics on AzureFuel business growth by bringing together enterprise resource planning (ERP) and cloud services.

High Performance ComputingTap into unlimited resources to scale your high performance computing (HPC) jobs.

Digital MediaDeliver high-quality videos to your customers anywhere, anytime, on any device.

GamingBuild, quickly launch, and reliably scale your games across platforms, and refine based on analytics.

BlockchainCreate a rapid, low-cost, and fail-fast platform to experiment with new business processes.

Page 24: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Office 365 is built for your business. Now with the all new Office 2016.

Deliver high-quality videos to your customers anywhere, anytime, on any device.

It’s the Office you know, plus tools to help you work better together, so you can get more done — anytime, anywhere.

Tools for the professionalBrand your business-class email address with your company name to build name recognition, and market your business with customized marketing materials that are easy to create. Connect better with customers and colleagues with a range of communication tools, from email and IM to social networking and video conferencing.

Tools for teamworkWith 1 TB of storage per user, you’ll have plenty of space for all your files. Plus, because your files are stored online, you can share with people in or outside your company, from wherever you’re working, whenever you need to. And with multi-party HD video, content sharing, shared calendars, and team chat, you’ll always be in sync with your team.

Easy setup and managementWith step-by-step guidance, you can set up users easily and start using the services fast. You can access the easy-to-use admin center from anywhere to manage all your services. And Office 365 takes care of IT for you, so your services are always up and running and up to date.

Page 25: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Office 365 Business PremiumIncrease your impact and expand your reach with Office powered by the cloud—must-have tools for business today.

Office across your devicesAlways have the latest versions of your familiar Office applications, no matter which device you’re using-PC/Mac, tablet, or phone.

Simplify how you work togetherStore, sync, and share your files online so they’re always up to date. Plus, you can edit documents with others in real time.

Easy setup and managementWith step-by-step guidance, you can set up users easily and start using the services fast. And Office 365 takes care of IT for you.

Capture your ideas however you work best—using a keyboard, pen, or a touchscreen.

Easily format information in Excel with tools that recognize your pattern and autocomplete data.

Easily incorporate content from PDFs to create your own great-looking Word documents.

Design customized marketing materials that fit your brand and customers.

Page 26: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Office 365 Enterprise E1Empower your people with the latest collaboration services and get the IT control and flexibility you need to run your business

Empower your teamsHelp your teams accomplish more, faster with simple file sharing, real-time coauthoring, and online meetings—all accessible anywhere.

Tailor your servicesGet exactly the services you want. Combine Office 365 with your existing investments and mix and match services for different users.

Gain IT controlReduce your IT overhead and hassles while staying in control. Move to the cloud on your terms, manage easily, and automate tasks.

Email with 50 GB mailbox

File sharing and 1 TB OneDrive storage

HD video conferencing

Office Online

Team sites

eDiscovery search

Data Governance manual classifications and manual policies for retention and deletion

Online versions of Office with email and video conferencing

Page 27: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Office 365 Enterprise E3Move your business ahead with the latest Office, fully installed, plus integrated collaboration services coupled with advanced compliance features and full IT power.

Office across devicesGet the familiar Office experience across most devices, empowering your employees to get work done wherever they are.

Compliance simplifiedArchive, use in-place legal hold, and find the documents you need fast. Advanced data protection helps keep your data safe.

Advanced IT controlsGive your IT flexibility and control while reducing IT costs. Move to the cloud on your terms, manage easily, and automate tasks.

Email storage for in-place archive

Unlimited OneDrive storage

eDiscovery legal hold

eDiscovery export and case management

Rights management, data loss prevention, and encryption

Hosted voicemail support

All the features of ProPlus and E1 plus compliance tools, information protection, and voicemail integration

Page 28: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

New! Office 365 Enterprise E5All new capabilities combined with the just-released Office 2016 apps means there’s never been a better time to get the most comprehensive Office 365 offering.

Built for teams and networksNow with Skype for Business you can simplify your infrastructure with one platform for calling, conferencing, video, and sharing. Connect your teams with the experience they love, in the Office applications they use every day.

Personalized and organizational insightsEasy-to-use live data monitoring and in-depth analysis tools let you discover new stories in your data with even more interactive reports, simpler dashboards and compelling data visualizations.

People centric securityMicrosoft handles your security so you don’t have to. Now you have even more control with increased privacy, transparency and refined user controls - it’s easy to see why this is the most secure Office ever.

Unlimited OneDrive storage

PSTN conferencing to dial in to Skype meetings from anywhere

Cloud-based call management

Advanced analytics with Power BI Pro and Microsoft MyAnalytics

Advanced eDiscovery

Advanced Data Governance

Advanced security with Advanced Threat Protection and Customer Lockbox

Enhanced visibility and control of your Office 365 environment

All the features of E3 plus a new class of unified communications solutions with advanced Skype for Business meetings and voice capabilities

Page 29: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Office 365 ProPlusYour Office, wherever you go. Get the latest tools for productivity, collaboration, compliance, and BI—delivered regularly.

Office across your devicesAlways have the latest versions of your familiar Office applications, no matter which device you’re using—PC/Mac, tablet, or phone.

Enhanced security and compliance toolsGet the tools to make it easier to ensure communications are more secure and within compliance policies.

Deploy the way you wantDeploy on-premises with your own tools or with assistance from the Office 365 online service, and get smooth upgrades.

(Email not included)

File sharing and 1 TB OneDrive storage

Fully installed Office on PC/Mac

Office apps on tablets and phones

Self-service BI in Excel

Fully installed Office on PC/Mac with apps for tablets and phones

Page 30: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Office 365 Advanced Threat ProtectionProtect your email in real time against unknown and sophisticated attacks.

Secure your mailboxes against advanced threatsNew malware campaigns are being launched every day, and Office 365 has a solution to help protect your email against them. With Office 365 Advanced Threat Protection, you can protect your mailboxes against new, sophisticated attacks in real time. By protecting against unsafe attachments and expanding protection against malicious links, it complements the security features of Exchange Online Protection to provide better zero-day protection.

Protect against unsafe attachmentsWith Safe Attachments, you can prevent malicious attachments from impacting your messaging environment, even if their signatures are not known. All suspicious content goes through a real-time behavioral malware analysis that uses machine learning techniques to evaluate the content for suspicious activity. Unsafe attachments are sandboxed in a detonation chamber before being sent to recipi-ents. The advantage is a malware free and cleaner inbox with better zero-day attack protection.

Protect your environment when users click malicious linksExchange Online Protection provides protection against malicious links by scanning content. Safe Links expands on this by protecting your environment when users click a link. While the content is being scanned, the URLs are rewritten to go through Office 365. The URLs are examined in real time, at the time a user clicks them. If a link is unsafe, the user is warned not to visit the site or informed that the site has been blocked. Reporting is available, so administrators can track which users clicked a link and when they clicked it.

Page 31: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Flexible Asset TrackingUse our built-in templates to track

common IT assets / services including applications, licensing, backup

configurations technology standards and network settings

Password ManagementYour password vault tightly integrates

with the various assets managed within the IT Glue platform, including devices,

domains, flexible assets and documents.

Device TrackingTrack devices simply, efficiently and keep your documentation up-to-date, enabling a higher level of confidence for your team

and their clients.

Enterprise-Grade SecurityThese features include granular access

control on a per-organization and per-en-tity basis, complete auditing of all key

read/write platform actions, and version control for recoverability & data integrity.

Enterprise-Grade SecurityThese features include granular access

control on a per-organization and per-en-tity basis, complete auditing of all key

read/write platform actions, and version control for recoverability & data integrity.

Powerful SearchLeverage our innovative search

technology to jump directly through thousands of records to the data you seek,

whether a device, password, document, location or organization.

Multi-Level Organizational StructureOrganize your IT assets and documentation in nested logical groups (e.g. business units or clients) and locations. Track contacts and manage system users with flexible access control.

Blazing fast, robust, IT documentation software that you’ll fall in love with.IT Glue™ is a proven, best practices-driven IT documentation platform packed with features designed to help you maximize the efficiency, transparency and consistency of your team.

Documentation is your most precious asset… nurture it and gain instant results.

Page 32: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Product Benefits

Security, Reliability, PerformanceSingle-server multi-domain management, full control over mail delivery/receiving privileges, IP and trafic-based controlProprietary mail queue processing technology that ensures normalmail service in the event of transmission errorsHigh-performance core that handles ISP telco-grade traffic loads with easeWeak password analysis, CAPTCHA, OTP protection, and unfamiliarlogin location warning for enhanced account security

Variety of mobile e-mail access operations and painless migration

Intuitive AJAX drag-and-drop interface with short learning curvePainless migration of existing corporate passwords and e-mail forseamless deploymentCan be synchronized with mail clients or mobile devices for enhanced personal message managementExclusive app for smart devices that delivers the full MailCloudexperience wherever you go

Carefully designed mail administration system that gives full control

Block privacy breaches at the sourceEnhanced protection with system auditing, automatic forwarding for monitoring, personal security code verification and active protectionVisualized monitoring dashboard to track critical information inreal-timeCustomizable routing policy with mail monitoring for full control overmail traffic flow

Fully-featured collaboration platform for improved communication efficiency

Establish an internal real-time messaging mechanism to accelerate organizational communicationSimple and convenient poll management tool to speed updecision-making during meetingsFast calendar planning with reminders, sharing and schedules all clearly displayedFlexible account authorization to assign proxies with ease

Page 33: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Precision filtering technologyGlobal sample collection and local service analysis provides two layers of real-time anti-spam protectionProfessional URL analysis technology to effectively remove phishing e-mails and advertising URLsReal-time detection of abnormal connection behavior with an effective core anti-virus engineExclusive automated white list mechanism for more precise mail filtering

Upgraded mail protection to ensure the security of corporate communications

Detect abnormal system connection frequency to effectively protect against DoS attacksBlock massive bounced mail attacks to ensure business operationsActive notification and removal of suspicious hyperlinks to prevent social engineeringProtective mechanism for dictionary attacks for more accurate interception

Adjustable filtering settings and comprehensive review of corporate security requirements

Detailed mail delivery/receiving logs for clear picture of reasons for filteringProtection against excessive sending of outbound e-mails to avoid becoming a springboard for spamUse smart gray lists and mail origin authentication to effectively block malicious e-mailsCreate tailored filtering conditions with custom IP/sender/content black/white lists

High-speed interception and report generation for optimal management efficiency

Highly reliable telecommunications-grade mail core designed for reliable operation in big data environmentsSupport for NAS and HA backups including enterprise-scale clustering architectureSupports graphical statistical and ranking reports with real-time protection for vulnerable accountsContent of intercept notifications can be customized in accordance with corporate filtering policy

Internet

Filtering of spam, maliciousand phishing e-mails

Corporate Mail Server

Openfind MailGates mail protectionsystem is equipped with advanced dualfiltering engines that create securechannels of corporate communications

Product Benefits

Page 34: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Product Benefits

Unique specifications that offer the best choice for mail archiving

Cloud-based mail archiving for more flexibility in deployment and savings in storage costsMail behavior analysis with conditional alerts for early detection of abnormal sending behavior7 different recovery methods including e-mails and CD-ROMs for the perfect disaster recovery solutionSupports Outlook® and smart mobile devices for a new mail browsing and recovery experience

Search engine technology + distributed architecture makes the No.1choice of massive mail archives

The most powerful evidence collection tool capable of searching tens of millions of e-mails within 5 secondsSupports full text search for more than 50 types of attachment file formatsDistributed cluster archiving architecture capable of processing hundreds of millions of e-mailsSearch by time interval, then sort resorts to find target e-mails faster and more accurately of inappropriate e-mails

The most rigorous mail auditing solutionVisualized mail traffic flow to simplify situational awarenessActive inventory of historical e-mails to identify all sensitive or personal informationAudit outcome reports to detect risks to business secrets and privacyEnhanced security with internal audit controls to prevent the spread of inappropriate e-mails

Complete mail archiving for mail life cycle managementArchive encryption technology for multi-layered protection of sensitive and personal informationComprehensive and integrated online, nearline and offline mail expiry and archiving mechanismFully automated mail database partitioning, backup and mountingwith no need for human interventionCompatible with all types of standard backup software for seamlessintegration with the corporate backup process

Internet

Mail ServerMailDuplication

Indexing and MailDatabase Management

1 Month ago

3 Months ago

2 Months ago

4 Months ago

MailDatabase

Standard Backup Software

External Storage Equipment

Page 35: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Product Benefits

Full detection of important personal and confidential information

Flow - Prevent information from being maliciously leaked to unauthorized parties and full log archivesPersonal Information - Compound personal information auditing thresholds to prevent false-positives from signature filesAttachments - Supports the scanning of more than 50 file formats including PDF and ZIPContent - Pick up illegal keywords in the mail subject or hidden within the body text

Comprehensive mail auditing process that satisfies corporate management requirements

DLP Policy - DLP policy can be tailored to the organizational structure and individual departmentsWarning - Monitoring personnel are alerted in real-time of abnormalmail behaviorReview - Automated or manual handling Reports - Visualized management of rankings and statistics formessages blocked under auditing policies

Handy helper to eliminate e-mails mis-sent due to human negligence

Alert - E-mails sent to multiple people are automatically converted to blind carbon copy (BCC) to protect recipient detailsReal-time - Delayed mail delivery to allow for recovery of mis-sent e-mailsProtection - Abnormal attempts to send large numbers of e-mails are immediately blocked to prevent system congestionTracking - Convert attachments to URL for sending large files or for deleting mis-sent files

World-class bilingual information security with one-step signing and encryption

Signature - Exclusive corporate signature that prevents the sending of counterfeit e-mailsThe PKI encryption - It used for securing important information has proven popular even with government usersIntegrated encryption with MailCloud - Mails can be set for encrypted transmissionExclusive PDF encryption - Background watermark to improve the confidentiality of contents and attachments

Page 36: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Secure and convenient file sharingCreate share links for files that allow partners to download the file with a clickSpecify the recipients, passwords, and expiry times forshared files to ensure that files are shared with the right people at the right timeView the file sharing and access records including access times, frequency and usersCreate a team folder to give designated colleagues direct file accessBy sharing the link, external user can upload files to the specific space or download the files they need

Product Benefits

Access files at any time in any placeUse the automatic sync function to synchronize filesacross all of your designated devicesSupport for Android and iOS mobile devices so you can always access the files you needMake collaboration easy with real-time sharing and synchronization of filesProvide online preview function comes with several watermarks,such as viewer’s IP, confidential

Secure and reliable storage spaceStore all the information on the company’s provate cloud to avoid the security concerns with public cloud services The company manages all of its own accounts and passwords.It can also define management policies that conform to theorganizational rules

Central Management by administratorsSet up multiple groups of administrators and user levels to control the sharing permissions of all membersSet up different types of administrative reports to give the administrator a clear picture of all file sharing within the organization

Page 37: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Predictive Artificial Intelligence

Predictive ArtificialIntelligence

01 Mobagel

02

SalesForecast

MalfunctionPrediction

AutomaticCampaigns

PredictiveMaintenance

ProactiveCRM

DeviceMonitoring

UsageAnalysis

Data FetchingBots

02 InfoPower

Page 38: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Predictive AI for Enterprise IoT

Universal CompatibilityChoose from our many different

options to integrate with MoBagel and start analyzing your device data today.

Cloud Infrastructure Big Data Ready DecanterTM PredictionMoBagel uses a highly secure and

reliable cloud infrastructure that is optimized for big data collection and

machine learning.

MoBagel’s infrastructure is built for large scale aggregated statistics and can process over 10M requests

per second.

Decanter™ Prediction automates the algorithm selection and delivers the

most accurate results directly to the users.

The 3-step solution to success.The future of IoT analytics is composed of three stages: connect, analytics, and predict. From fundamental data connection to advanced analytics to predictive modeling, MoBagel helps IoT companies grow and scale at every step of the way.

1. Connect 2. Analyze 3. Predict

Page 39: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Data ConnectionHaving a solid data connection is arguably the most important part of the data analytics process. This ensures that all the data coming in is consistent and accurate, thus guaranteeing the results of analytics and prediction.

Based on a company’s existing setup, MoBagel has different ways to connect your device data to our analytics service.

Decanter™ PredictionAt the heart of MoBagel’s solution is the Decanter™ technology. Decanter™ is a Big Data AI engine that automatically filters out meaningless data and optimizes machine learning models. Since Decanter™ does not require human interference in order to function, it allows anyone to use utilize deep learning and predictive analytics for their device.

With Decanter™, marketers and executives can get the right actionable insights without the need of data scientists.

Core AnalyticsWhether your product is a smart home device, a wearable device or any other type of IoT device, MoBagel has the right analytics for you. We have a growing library of analytics services, such as device monitoring, device management, usage analysis, and much more.

What is Mobagel?MoBagel is a cost-effective business intelligence solution that allows anyone to collect, understand, and drive decisions from IoT data.

Page 40: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

QuickCORE

QuickCORE is the Analytics Platform that supports both conventional Relational DB and Hadoop - 80% supports the structural information, 20% supports the non-structural. It can be integrated with existing enterprise application systems to generate various types of intelligence, including HTML5 business charts, maps and image intelligence applications and advanced visualization, and quickly build Enterprise WarRoom or Business Intelligence Center, to realize the vision of real-time enterprise.

1. Total solution including a full range of products. 2. Rapid deployment with immediate effectiveness. 3. Offers full range of development support. 4. High integration and flexibility. 5. 100% personalization on the platform. 6. Portal based, portal layout and configuration can be personalised. 7. High flexibility of customization support. 8. Highly compatible with enterprise technical aspects. 9. Cross-platform with Intel architecture 10. High security control.

Some of the key features of QuickCORE include:

Big DataAnalyticsPlatform

Perspective 1: by size or segmentationof enterprise

Perspective 2: by level or usersin an enterprise

Page 41: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Business Intelligence

Business Intelligence

01 InfoPowerPENTA Marketing

03

02 NextERP

04 UShop

Customer ProspectManagement

Digital Marketing

MobileReporting

Sales JourneyManagement

QuickReporting

ERP DigitalSignage

Retail StoreAnalytics

Retail LossPrevention

Wireless Marketing

03 AVSystem

Page 42: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Prospect ManagementCustomer

Excel to Database

Convert excel data into CRM database within seconds.

Customize Data Columns

User can quickly search, add, delete and edit customer

data ; also can add or customize data columns

Search with grouping

By gender, company, department searching to find

the customers you want.

Customer Data Base Analytic

Automatically analyze customers information by

geographic or demographic, with visualized charts.

Page 43: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

MarketingDigitalTraditional market survey has long been faced by two main problems: the low rate of respondents and the quality of answers. To solve the problems, Dolphin Interact is thus invented. Based upon the notion of dual-centric, which is user-centric for respondents and data-centric for campaign conductors, Dolphin Interact finely presents users a highly interactive platform that motivates users’ willingness to answer questionnaires with its built-in user experience.

Cross-Devices, Allowing Users to Answer at Any Space

FEATURES

Only 30-60 Seconds to Respond the Survey via Mobile DevicePersonalized Marketing, Turing Respondents into CustomersInteractive Design that Makes Survey a Win-winCross-Tab Report, Viewing Results from Multi-perspectives with Just One StepReal-Time Analytics, Capturing the Result Scenario in a BreezeParallel Processing, Conducting Several Surveys at Once

Page 44: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

ExamDolphin

DolphinExam – Exam & Learning AnalysisBased on u-centric and professional analysis technique, teacher can rapidly create exam and analyze the learning result from variousperspectives. Besides, students can take the exam via cross device/ platform and review exam record to efficiently improve learningmethod and knowledge management ability.

Some of the key features of Dolphin Exam includes: 1. Cross-platform test, users can be tested anywhere and across various devices. 2. Test questions flexibility, such as multiple choice, open questions and so on. 3. Accurate test results analysis after the test, correct answers provided after the test to promote learning. 4. Instantly check test results and refer to previous test results. 5. Design flexible and personalized test questions. 6. Cross-analysis of test results.

Page 45: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

EDMeDM/SMS marketing automation

Distribution list management

Distribution list can be easily added, deleted, and edited.

Sending result analytic

User can know the result immediately (mail-sending

success/failed; opened/ unopened).

Personalized

Recipient can get a mail with personalized title such as

“Dear Mr. Su”.

Mail sending schedule

User can choose the email sending time.

Page 46: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

MarketingCampaign

Marketing campaign registration system

Campaign statement

Distribution list can be easily added, deleted, and edited.

Common questions template

Support common questions template to be applied in different

campaign

Customized questions

Subject to each campaign requirements to customize

additional questions

Free template

User can choose template style depending on the topic

Registration analytic

Automatically calculate and present registration date, time, number and other information.

Page 47: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Social listening & competitive analytics

Social data visualization

With a variety of business graphics, userscan get points in

seconds.

Word Clouds analytics

View the keyword ranking with visualize way.

Competitor analytics

Monitor the volume of competitors or brand Article ranking

Rank articles with the amount of like, dislike, neutral, or comment.

Automatically generate article/news link

Facilitate users to read the associate articles friendly.

The volume analytic

It can get the volume data due to date.

AnalyticsSocial

Page 48: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

ReportingMobile

Information Integration

MobileReport supports common files such as PDF,

Word, Excel, PPT, picture and video

Manage Flexibility

Users can upload document to any category anytime

anywhere.

Authorization Control

MobileReport can set different authority to different account

Take note on document

Users can take notes or color highlight on document.

Share the document via mail

Users can share the document via email sending

Location and photo taking service

It supports photo taking and location services

Page 49: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

ReportingQuick

No. 1 Business Intelligence Product for UsersUsers just drag & drop Excel files to the system, the system automatically build a database based upon the files and convert Excel data into the date base. According to the testing records, 100,000 records conversion only took 6 - 10 seconds. With an engineer support to create some Tableviewswithin minutes, users can consolidate Excel data columns and Tableviews, in addition, the later can deliver dynamic real-time information without furtherengineer’s efforts.

Support File, SQL, No-SQL, Web Service

formatsIntegrate different

data sources

QuickReport supports Excel, major RDBMS, PostgreSQL, and web

service

Integrate different Excel files/data sheets, table views, open web service into a database for data

manipulation.

KPI alert

User can set KPI and choose different color of

that data

Support flat table,pivot table, and

business graphicWithin 30 seconds, users

can figure out a pivot table easily.

Reports and business graphic updated

automaticallyOnce database or Excel

data is changed, business graphic and reports are updated automatically.

Authorization Control

Users who publish reports set the view privilege.

Page 50: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Journey ManagementSales

Sales Report Sales forecast Action-centric Schedules management

Action-centric sales trip report

Customer status tracking

Effect managers and sales

communication

LSP planning and reminder

Page 51: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Cloud-based Accounting Software for Real-Time Reporting & Workflow Management.

NextERP cloud-based accounting software is a fully integrated, multi-user, period driven system designed specifically for the IT & related distribution and retail industries. Cloud9 NextERP software makes it easy to consolidate all of your financial data in one program. NextERP consists of Orders module, Debtors Module, Creditors Module, General Ledger,

Inventory (Stock) module, Serial number tracking, Workshop module and much more.

Customize Query Export to Excel Channel Subscription

Printing Dialog (download, email, print)

Remember your last query Auto complete

Customize Email Signature Ecommerce Customize group

role authorization My Favourite Right Panel Customized Voucher Approval process

Page 52: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

SHAPING THE WORLD ofCONNECTED DEVICES

LinkyfiLinkyfi is both a public WiFi access management solution and a powerful WiFi marketing platform. Thus it is an efficient value-added service for every Telco operator’s customers.

FeaturesPowerful landing page builder Wide Range of login options Advanced statistics component Integration with external solutions Powerful marketing engineWifi advertisement and monetization Indoor positioning and heat maps Robust multi-tenancy engine Deep packet inspection Customization on demand

Quality of service

Fair business modelfor Telco operations

Benefits

Scalable solution withno limits

Become our partner and grow your revenue by offering Linkyfi as a WiFi added service for your enterprise customers. Linkyfi is a solution that works great for all kinds of venues - shops, shopping malls, cinemas, restaurants, airports, railway stations and many more.

Linkyfi can be easily adjusted to your needs - there are no limits as to the number of enterprises added, accounts set up or logged in WiFi users.

Page 53: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Linkyfi Location EngineLLE is a smart WiFi solution for detecting and locating WiFi-equipped devices.

It allows Telecom and Enterprise Markets to provide WiFi value-addedservices for their customers.

WiFi-based indoor location for all types of venuesLLE enables to gain valuable WiFi users’ insights and understand their behaviors in a venue to adapt it to their needs and improve on-site experience.

What makes LLE outstanding

Location APIAvailable

Navigation in webbrowser

No additionalequipment

Ultra-scalability

It provides location-baseddata to your applications.

It gives users the indoornavigation that doesn’t need

any mobile app.

It only needs yourWiFi infrastructure.

It manages up to50 000 access points.

Heat Map Analytics API Access

More Features

WiFi user tracker

Based on the received RSSI, LLE can accurately locate and track all WiFi users in the venue. It allows to determine their precise location in real time, monitor what premises they visit and what attracts their attention, and use context-aware data to enhance their on-site experience.

As LLE provides data about each WiFi user, it can be used to trigger marketing campaigns based on the accurate location information or targeted user behavior. That includes delivering personalized emails or text messages with special offers to deepen customer engagement.

Proximity Marketing

Linkyfi Location Engine provides the only indoor navigation that operates fully within a web browser, with no need to download any external apps. Thanks to frequent location up-dates, at refresh rate down to 1 second, it allows to navigate customers to selected facilities truly in real time.

Real-time indoor navigation

Page 54: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Open Application Programming InterfacesStore Performance AnalyticsMultiple DataCross-AnalysisMobile Management

Shopper Engagement

Cashier Managem

entO

peration SupportBusiness Intelligence

Digital SignageOur WebAccess/IMM content editingand management software solutionhelps retailers to build rich multi-mediacontent.

Cloud QueuingOur cloud-based queue managementsolution enhances restaurant operatingefficiency by improving customersatisfaction, on-site management, andbig data analysis.

eMenu BoardMaximize target sales and customersatisfaction through dynamic digitalmenu board solutions.

Indoor Air Quality ControlDetects CO2 and PM2.5 automatically,upload data to the cloud platform andprovides visual reports.

Store EMSBased on Advantech’s WebAccess IoT platform, the solution provides remote device monitoring and energy management functions in order to achieve lean management.

Store Traffic AnalyticsIntegrate 2D and 3D video analysistechnologies with POS transactiondata for store traffic analysis.

In-store HeatmapIdendify in-store hot spot s and providing customer flow curves through panoramicreal-world scene analysis.

In-store Shopper AnalysisIdentify shopper ‘s demographic includes gender, age, and repeated customer rate through facial recognition and WiFi technology

UShop Solution IoT DeviceComputingPlatform

Digital Signage Player

Interactive Digital Signage

All-in-OnePOS Terminal

Mobile POS

Handheld Computer

Store Server

RFID Reader

POS Peripherals

IAQ Sensor

Camera

Supermarket

Restaurant

Transportation Hub

C-Store

Hotel

Shopping

Casino

Bank

Page 55: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

We provide several standard solution ready packages for retailers. The branch store and headquarter can manage each system easily on UShop+ platform.

Multi-Solution Integrated Platform

Analyzed data collected from the stores help you to optimize sales strategies and daily operation.

Sales Insight With Business Intelligence

Except for pre-determined set of metrics in a pre-set layout, you can control the data you wish to see such as POS transaction amount, store footfall, specific time period and choosen branch stores. You can also define dashboard’s structure and layout as well in order to make quick, informed decisions.

User Defined BI Dashboard

Log-in with your user account, you can check store performance data anytime, anywhere on UShop+ platform. Management

level can efficiently benchmark branch performance. The stable IT system architecture also supports central management for

large-scale group with over 3,000 brach stores.

Managing Chain Stores Through One Device

INTELLIGENTRETAILExperts in Digitalized Store Solutions

Page 56: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

IntelligentPOS Systems

Advantech’s POS systems offer stylish solutions that can be equipped with various modular peripherals and integrated with remote management software and cloud-based digital signage to support the provision of diverse value-added services that enhance customers’ shopping experience. These systems also enable store managers to collect consumer behavior data for subsequent analysis and operational optimization.

WISE-PaaS/RMM Remote Management Software

Cloud Based Software & Value Added Services

For See More Product Information

WebAccess+IMM Digital Signage Management Software

Ushop+ Cloud Management & Store Analysis for Business Intelligence

Space Saving Rich I/O Remote

Monitering

IntelligentPOS Systems

Advantech’s POS systems offer stylish solutions that can be

equipped with various modular peripherals and integrated with

remote management software and cloud-based digital signage

to support the provision of diverse value-added services that

enhance customers’ shopping experience. These systems also

enable store managers to collect consumer behavior data for

subsequent analysis and operational optimization.

WISE-PaaS/RMM Remote Management Software

Cloud Based Software & Value Added Services

For See More Product Information

WebAccess+IMM Digital Signage Management Software

Ushop+ Cloud Management & Store Analysis for Business Intelligence

Space Saving Rich I/O Remote

Monitering

Page 57: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Internet of ThingsA New Era of Retail

The retail industry has reached a turning point of transformation.

Big data analysis, enhancement of the customer experience, and

online shopping has become the main focus areas for retailers to

innovate. Advantech’s iRetail solutions focus on vertical markets

which include chain stores, food and beverage, supermarkets/

hypermarkets, and shopping malls. We dedicate ourselves to

achieving the most effective retail applications for IoT, cloud

services, and terminals. Taking the cloud retail service platform

as our core service,

Cloud Analysis and Platform Integration

For See More Product Information

Store Managment Platform integration & IoT Devices Cloud Analysis Consumer Insight & Business Inteligence

One-Stop ServiceFollowing the trends in IoT, Advantech’s iRetail team is committed to our company culture of “altruistic spirit” by providing assistance for retailers who want to break into omni-channel retailing in this new intelligent era. As a leader in providing intelligent retail solutions, Advantech not only improves customer satisfaction, but also enhances the efficiency of retail operations.

Equip your store with intelligent retail

systems and applications that capture

real-time data for business intelligence &

consumer behaviours to efficiently improver

store performance.

The UShop+ cloud platform provides an open

API for multi-solution integration. So retailers

can optimize store management in a more

efficient way.

Analyzing the operating performance of single

store or multiple branches helps headquarters

to further develop thei r operating

strategy.

Analyzed data collected from the stores help

retailers to optimize sales strategies and

daily operation.

Page 58: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Store Traffic Analytics In-Store Shopper Analysis In-Store Heatmap Mobile Access

Cloud Management & Business IntelligenceMulti-Purpose Fanless POS Box

for Retail, Self-Service and Digital Signage Applications

Intelligent KIOSK

Software Application

Intelligent POS Intelligent Digital Signage

Intelligent eMenu BoardDynamic and Appealing Content

with Real-time Management

UShop+ Cloud Management SystemGain Valuable Business Intelligence

Insights & Consumer Behaviors

Page 59: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Intelligent POS

IntelligentKIOSK

Intelligent Digital Signage

Cloud Management & Business IntelligenceUShop+, Digital Signage & Business Intelligence Solution

Headquarters

Branch Store B

Branch Store A

Internet

Internet

Internet

UShop+ Cloud & Business intelligence Solution

Advantech Digital Signage Software Solution

Equipped with Advantech’s WebAccess+IMM digital signage management software, UBX-310 can facilitate interactive multimedia communication and digital signage operations via cloud-based platforms. targeted messages to increase sales and engage your audience in real time. Real-time Data can be edited, analyzed and updated immediately via cloud-based platforms.

Centralized cloud management and real-time multi-media content viewing / editing helps business owners gain valuable insights & consumer behaviors. Various data analysis reports can be provided according to the applied software.

UBX-310 supports Advantech’s WISE-PaaS/RMM remote management software, which enables remote system status monitoring, database backups and recovery, and power on/off scheduling, while also protecting the system from unauthorized access.

Remote Management Software

Page 60: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Cloud Management & Business IntelligenceUShop+ System

Integrate 2D and 3D video analysis technologies with POS transactiondata for store traffic analysis.

Store Traffic Analytics In-Store Shopper Analysis In-Store HeatmapIdentify customers’ gender and agethrough video analytics and WiFi.

Identify in-store hot spots and commodity popularity throughpanoramic real-world scene analysis.

Page 61: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Advantech’s Intelligent Digital Signage solution delivers dynamic multimedia content with rich graphics for an immersive viewing experience for consumers. The solution combines industrial grade digital signage players with WebAcess/IMM, a web-based content editing and publishing software and remote management. The friendly interface of WebAccess/IMM allows users to easily edit and publish content to digital signage terminals around the world.

DIGITAL SIGNAGE

Easy to Use and Friendly InterfaceRich Features and ScalabilitySupports Multimedia FormatsLowering Labor Cost Via Central ManagementSystem

Page 62: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Advantech’s UShop In-Store Heatmap solution helps retailers to improvetheir product counters and window displays, price adjustment operations,and overall product performance by identifying hot spots and providingcustomer flow curves. Integrated with POS systems, the solution providescustomer purchasing behavior within the store and sales revenue insightsto retailers for further marketing strategy.

In-StoreHeatmap

Detailed in-store hot-spot analysis of

specific zones, shelves and aisle

helps you identifypopular commodities,

and helps retailersoptimize their counter

displays more effectively.

Real-World Scene Analysis

Compare hot zone popularity ofdisplay shelves and shopper’s

paths across different locationsand across multiple branch

stores. Equipped with cross-store performance data,

management can benchmark performance.

Multi Stores CrossAnalysis

A solution integrated with POS systems which helps retailers to

identify whether the consumer’s interests lead into actual purchasing behavior or

not.

POS SystemIntegration

Retailers can enhance sales revenues by adjusting the

pricing strategy based on the popularity of a commodity, or

changing the displays according to the hot spot analysis.

Marketing StrategyOptimization

Page 63: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

For retailers, sales revenue is always a key performance metric, but in-depth analysis of poor sales per formance is rare. Advantech’s SRPUST510 Store Traffic Analytics solution enables retailers to evaluate sales potential and establish customer service and marketing strategies for maximizing profit. SRP-UST510 integrates 2D and 3D video analysis technology with POS transactiondata for further analysis. Analysis of customer traffic data provides retailers with an in-depth knowledge of consumer shopping and purchasing habits, as well as insights into sales performance during periods of high/low traffic for each branch store.

Store TrafficAnalytics

SOFTWAREFEATURES

Store Operation KPI Dashboard

Marketing Campaign Result Analysis

POS and Store Traffic Data Integration

Page 64: Intelligent Services for Cloud Computing, Predictive AI ... · embedded devices work by isolating systems, which offers only partial protection, and only against known attack vectors

Johannesburg Branch

Copyright © Cloud9 All specifications are subject to change without notice. All brand names and registered trademarks are the property of their respective owners.

+ 27 11 357 8088+ 27 11 357 8089

[email protected], 16th Road,Randjespark, MidrandJohannesburg, 1685