News Stay informed about the latest enterprise technology news and product updates.

UC blogs: Kontiki's video streaming platform rebrand

In this week's UC blogs, analysts discuss why Kontiki's video streaming platform rebrand is signaling a market change and how LogMeIn finally got contact center video right.

Wainhouse Research Senior Analyst Steve Vonder Haar discusses the rebranding of enterprise video streaming platform Kontiki to Kollective Technology.

The rebranding charts a new course for the platform as it takes a more network-focused approach. The vendor's networking offerings will be under the Kollective name, while its enterprise video offerings will continue to use the Kontiki brand.

Vonder Haar writes that it is unclear how soon market conditions will drive users away from integrated end-to-end streaming services and toward modular, API-driven services. With the rebranding, Kollective Technology will have more flexibility to adapt to a changing market.

Read more about how the rebranding reflects a changing market.

Getting contact center video right

Frost & Sullivan analyst Brendan Read discusses how remote connectivity service LogMeIn gets video in the contact center right.

Read writes that contact center video has never caught on because there's no real value in being able to see a contact center agent during a call. But LogMeIn's Rescue Lens mobile application gets contact center video right because it allows customers to stream video from their mobile device, giving agents the ability to see the issue and act on it.

The application also has a whiteboard capability that allows agents to illustrate possible solutions to a customer issue.

Read more about where Read thinks LogMeIn can expand its contact center video capabilities.

Minimizing third-party provider risks

Nemertes Research CEO Johna Till Johnson discusses how to minimize the security risks that come with services offered by third-party providers, like software-as-a-service applications and document sharing. Organizations should develop security strategies and best practices to protect the sensitive data on third-party applications and services.

She offers best practices including investing in a governance and risk management platform, deploying a risk management framework and itemizing relevant regulators, standards bodies and compliance requirements. Johnson writes that risk can be effectively managed by taking the right approach.

Read more to learn other ways organizations can minimize risk.

Next Steps

Bringing WebRTC to contact center video

Tools to evaluate third-party application security

Dig Deeper on Business Video Conferencing and Telepresence Technology