Tag Archives: soon

At long last, Microsoft Teams to get multiwindow support

Microsoft Teams will soon let users open chats, calls and video meetings in separate windows. The long-sought feature will help people multitask in the team collaboration app.

Microsoft plans to finish rolling out pop-out chats this month. Teams will get multiwindow support for calls and video conferences sometime in June.

Nearly 20,000 people have asked Microsoft to add multiwindow capabilities to Teams since the first request in 2016. It’s yet another example of an essential feature of Skype for Business that’s still missing in Teams.

“It’s like not being able to open multiple Word or Excel documents at the same time,” said Andrew Dawson, an IT professional based in the United Kingdom. “Archaic!”

Without the ability to open multiple windows, users can only do one thing at a time in Teams. The limitation forces some companies to use other communications apps in conjunction with Teams.

Jacques Detroyat, an IT manager for a company based in Switzerland, said one common workaround is for users to message on Skype for Business or WhatsApp during Teams meetings.

The setup is not ideal, Detroyat said. “It’s a bit like writing with a badly sharpened pencil or trying to have a conversation in a noisy environment: You can do it, but the experience won’t be great.”

Screenshot of Microsoft Teams chat
Microsoft is rolling out multiwindow chat for Microsoft Teams in May.

Some users want the company to support multiwindow viewing in even more scenarios. For example, Microsoft could let users edit a document in Teams in one window while searching for information they need in another. But the company has not committed to doing so.

Users will be able to open multiple Teams windows only in the Windows and Mac desktop apps. Microsoft has not said whether users of the web app will eventually get the upgrade.

The launch of multiwindow support will not solve another problem that users face. People want to be able to open separate Teams windows for different accounts on desktop. Microsoft has committed to letting users sign in to multiple accounts at the same time. But it has not provided an update on the feature in months.

Teams has attracted millions of new users during the coronavirus pandemic. The app grew from 20 million daily users at the end of 2019 to 75 million daily users in April.

The increased usage of Teams has made its shortcomings more aggravating to users. Complaints include the app not having a large enough group video display or a robust calendar.

Go to Original Article

Proofpoint: Ransomware payments made in half of U.S. attacks

Ransomware payments to cybercriminals could soon become the rule rather than the exception, according to new research from Proofpoint.

Proofpoint’s sixth annual “State of the Phish” report, released Thursday, surveyed 600 working infosec professionals across seven countries: the U.S., Australia, France, Japan, the U.K., Spain and Germany. The report showed that 33% of global organizations infected with ransomware in 2019 opted to pay the ransom. In the U.S. alone, 51% of organizations that experienced a ransomware attack decided to pay the ransom, which was the highest percentage among the seven countries surveyed.

Gretel Egan, security awareness and training strategist at Proofpoint, said she wasn’t surprised that a third of survey respondents had made ransomware payments after being attacked. While law enforcement agencies and infosec vendors have consistently urged victims not to pay ransoms, she said she understood “the lure” such payments represent, especially for healthcare or critical infrastructure organizations.

“Often you see a hospital or a medical center having to completely shut down and turn patients away because life-saving services are not available,” she said. “Those organizations, in that moment, can look at a $20,000 ransom [demand] and say ‘I can be completely back online and running my business again very quickly’ as opposed to going through a relatively lengthy process even if they’re restoring from backups, which can take weeks to be fully operational again.”

Egan said that even when organizations do make ransomware payments, there are no guarantees. According to 2020 State of the Phish report, among the organizations that opted to pay the ransom, 22% never got access to their data and 9% were hit with additional ransomware attacks. Because this was the first time Proofpoint asked survey respondents about ransomware payments, the vendor couldn’t say whether the numbers represented an increase or decrease from 2018.

However, Egan said Proofpoint observed another concerning trend with ransomware attacks where threat actors exfiltrate organizations’ data before encrypting and then threaten to shame victims by making sensitive data public. “They’ll say ‘I’m going to share your information because you’re not going to pay me.’ It’s almost like doubling down on the blackmail,” Egan said. “I tell people there is no low that’s too low for [cybercriminals].”

Refusal to pay ransoms did not deter threat actors as 2019 saw a resurgence of ransomware attacks, according to Proofpoint’s report. Last year’s State of the Phish report showed just 10 percent of organizations experience a ransomware attack in 2018, as opposed to a whopping 65% in 2019.

“2018 was such a down year for ransomware in general, but it came storming back in 2019,” Egan said.

In addition to the survey, Proofpoint also analyzed more than 9 million suspicious emails reported by customers and an additional 50 million simulated phishing attacks sent by the vendor. Egan said the data showed phishing emails aren’t as big of a threat vector for ransomware attacks as in the past, which indicates cybercriminals are changing their strategies.

“We’re not seeing as many ransomware payloads delivered via e-mail,” she said. “From a threat level side, infections are coming in as secondary infections. There’s a system already compromised with malware and then threat actors take advantage of first level infiltration to then launch ransomware within the system.”

BEC on the rise

The report also found a significant rise in cybercriminals utilizing business email compromise (BEC) as a preferred attack. An alarming 86% of organizations surveyed by Proofpoint faced BEC attempts in 2019. Like ransomware payments, BEC attacks can result in millions of dollars in losses for organizations; 34% of respondents said they experienced financial losses or wire transfer fraud.

“There are many ways for attackers to benefit financially from initiating a BEC attack,” Egan said. “For example, the FBI has flagged cases of people going after W2 employee forms and using that to commit tax fraud. In many cases, BEC attacks are underreported because of the embarrassment and issue with having to admit you’ve been fooled.”

Egan said BEC attacks are typically successful because threat actors take their time and do their research, forging emails that appear innocuous to both the human eye and some email security products designed to detect such threats.

“Attacks like BEC are favorable for attackers because they don’t have malware or payload attachments. There are no dangerous links imbedded in them so it’s difficult for technical safeguards to stop and block them, particularly if you’re dealing with an account that’s been compromised,” she said. “Many of the emails are coming from a known and trusted account, or within an organization, or person-to-person from an account that’s been compromised. Attackers are switching to a more people-centric approach.”

The trend of more people-centric attacks led to 55% of organizations dealing with at least one successful phishing attack in 2019.

“Business email compromise is a longer-term kind of con,” Egan said. ” Threat actors don’t launch out of the gate asking for bank routing information. They establish a relationship over time to lull someone into believing they’re a trusted email account, so the user isn’t questioning it.”

Proofpoint said security awareness training is a method that saw success in combating such threats, with 78% of organizations reporting that training resulted in measurably lower phishing susceptibility. The report emphasized the importance of understanding who is being targeted, and more importantly, the types of attacks organizations are facing and will face, to reduce social engineering threats such as BEC and spear phishing emails.

Go to Original Article

Microsoft Teams to add smartphone walkie-talkie feature

Workers will soon be able to turn their smartphones into a walkie-talkie using Microsoft Teams. The feature is one of several Microsoft unveiled this week targeting so-called frontline workers, such as retail associates, nurses, housekeepers and plumbers.

The walkie-talkie feature will let groups of employees speak to each other by pressing a button in the Teams mobile app. The audio will travel over Wi-Fi and cellular networks, meaning users will be able to communicate with colleagues anywhere in the world. The feature will be available in private preview in the first half of 2020.

Many retailers, hospitals, airlines and hotels still rely on physical walkie-talkie devices. In recent years, startups like Orion Labs and legacy vendors like Motorola Solutions have begun selling smartphone walkie-talkie apps. Those mobile apps come with benefits like location tracking and integration with other business technologies.

Microsoft’s smartphone walkie-talkie feature is not innovative. But if it works well, the capability could help Microsoft boost adoption of Teams among workers who otherwise wouldn’t use the app. Microsoft has made targeting frontline workers a priority since late 2018.

In addition to the walkie-talkie app, Microsoft said Thursday it would add to Teams a task feature for creating and assigning small projects to employees. The system will give businesses a dashboard to track tasks in real time across multiple departments or store locations. It will launch in the first half of 2020.

Microsoft will also expand the scheduling capabilities of Teams by integrating the app with popular workforce management platforms by Kronos and JDA Software. Those integrations will let businesses keep existing scheduling software in place while giving workers the ability to swap shifts and request time off through Teams.

Microsoft is not the only collaboration vendor targeting frontline workers, said Rob Arnold, analyst at Frost & Sullivan. But Microsoft has a leg up on competitors because it can offer businesses so many complementary cloud services. Those include the customer relationship manager Dynamics 365 as well as e-commerce and Internet of Things (IoT) platforms within Microsoft Azure.

New identity and access features for Microsoft Teams

Additional features targeting frontline workers include SMS sign-in, off-shift access controls and shared-device sign-out. These features will roll out between now and the middle of the year. 

Workers will soon be able to sign into their Azure Active Directory account (which controls access to Teams) using only a mobile phone number. IT admins will decide which groups of employees use the method.

IT admins will also be able to prevent frontline workers from accessing Teams when they are not on the clock. Temporarily blocking access will help businesses comply with labor laws.

Finally, for Android, Microsoft will add an “end shift” button to shared mobile devices and tablets that will clear app logins and browser sessions. Purging that data will prevent employees from accessing information they shouldn’t.  

Collectively, the latest features show that Microsoft wants to take Teams beyond the 30% of corporate employees who work in offices, Irwin Lazar, an analyst at Nemertes Research, said. “I think Microsoft is aggressively trying to expand the reach of Teams.”

Go to Original Article

For Sale – N54L Microserver & Dell UP3017 Monitor

£55 collected for the microserver?

Go to Original Article

For Sale – U-NAS 800 RAID CARD PSU wd my cloud dl2100 12TB business class nas WD RED 6TB X 2 Cloud Storage Server

I’m keen on the Dell HBA card

Go to Original Article

Slack encryption will soon include enterprise key management

Slack will soon give businesses an additional level of security by letting them manage their encryption keys. The feature will appeal to a small number of large organizations for now, but it could help the startup expand its footprint in the enterprise market.

Slack already encrypts the messages and files that flow through its premium platform for large businesses, called Enterprise Grid. Now, the vendor plans to give customers control of the keys that unlock that encryption.

“Enterprise key management is another significant step that Slack needs to take to meet increasing security demands — and according to their promise, without hurting speed or usability, [which are] common side effects of EKM,” said Wayne Kurtzman, analyst at IDC.

Slack touted the forthcoming feature as providing “all the security of an on-premises solution, with all the benefits of a cloud tool.” But the vendor clarified that the keys will be created and stored in Amazon’s public cloud.

“In the future, we may expand this offering to support an on-prem or private cloud [hardware security module] key store,” said Ilan Frank, director of Slack’s enterprise products.

Cisco Webex Teams lets businesses manage encryption keys on premises or in the cloud. It also provides end-to-end encryption. In contrast, Slack only encrypts data in transit and at rest, which means the data may get decrypted at certain routing points in the cloud.

Slack has no plans to change its encryption model, Frank said, citing potential “usability drawbacks” related to search and advanced app and bot features.

Symphony also offers end-to-end encryption and enterprise key management. Its team collaboration app has found a niche among banks and other financial firms, which generally have strict compliance and regulatory standards.

“I think, from Slack’s case, it’s a good first step in allowing customers to control their own keys,” said Zeus Kerravala, founder and principal analyst at ZK Research in Westminster, Mass. But Slack should also ensure businesses can store those keys in their own data centers and eventually pursue end-to-end encryption, he said.

Slack’s enterprise key management feature will be particularly useful for external communications done through Slack, said Alan Lepofsky, a vice president and principal analyst at Constellation Research, based in Cupertino, Calif.

When partners communicate through a shared channel in Slack, the company that established the channel will have control over the encryption keys.

“I think this will be a very important use case, as it’s that external communication where you really want to ensure security and privacy,” Lepofsky said.

Slack expects to make enterprise key management available for purchase to Enterprise Grid customers sometime this winter.

Slack looks to appeal to more large enterprises

Slack launched Enterprise Grid last year in an attempt to expand beyond its traditional base of teams and small businesses. The platform lets large organizations unify and manage multiple Slack workspaces.

Slack said in January that more than 150 organizations had deployed Enterprise Grid, including 21st Century Fox, Target, Capital One and IBM. But the vendor did not mention the product in May when it announced that 8 million people at more than 500,000 organizations worldwide were using Slack daily.

As the vendor tries to win more contracts with large businesses, Slack faces competition from vendors that already have deep penetration in the enterprise market — notably Cisco and Microsoft.

Cisco recently tied its team collaboration app to the online meetings platform Webex, which has 140 million users. Also, Microsoft has been aggressively building out the features of Microsoft Teams, which integrates with the Office 365 productivity tools relied upon by 135 million people.

“[Enterprise key management] is an important addition to Slack as it becomes more mature for enterprise needs,” Lepofsky said.

As AI identity management takes shape, are enterprises ready?

BOSTON — Enterprises may soon find themselves replacing their usernames and passwords with algorithms.

At the Identiverse 2018 conference last month, a chorus of vendors, infosec experts and keynote speakers discussed how machine learning and artificial intelligence are changing the identity and access management (IAM) space. Specifically, IAM professionals promoted the concept of AI identity management, where vulnerable password systems are replaced by systems that rely instead on biometrics and behavioral security to authenticate users. And, as the argument goes, humans won’t be capable of effectively analyzing the growing number of authentication factors, which can include everything from login times and download activity to mouse movements and keystroke patterns. 

Sarah Squire, senior technical architect at Ping Identity, believes that use of machine learning and AI for authentication and identity management will only increase. “There’s so much behavioral data that we’ll need AI to help look at all of the authentication factors,” she told SearchSecurity, adding that such technology is likely more secure than relying solely on traditional password systems.

During his Identiverse keynote, Andrew McAfee, principal research scientist at the Massachusetts Institute of Technology, discussed how technology, and AI in particular, is changing the rules of business and replacing executive “gut decisions” with data intensive predictions and determinations. “As we rewrite the business playbook, we need to keep in mind that machines are now demonstrating excellent judgment over and over and over,” he said.

AI identity management in practice

Some vendors have already deployed AI and machine learning for IAM. For example, cybersecurity startup Elastic Beam, which was acquired by Ping last month, uses AI-driven analysis to monitor API activity and potentially block APIs if malicious activity is detected. Bernard Harguindeguy, founder of Elastic Beam and Ping’s new senior vice president of intelligence, said AI is uniquely suited for API security because there are simply too many APIs, too many connections and too wide an array of activity to monitor for human admins to keep up with.

There are other applications for AI identity management and access control. Andras Cser, vice president and principal analyst for security and risk professionals at Forrester Research, said he sees several ways machine learning and AI are being used in the IAM space. For example, privileged identity management can use algorithms to analyze activity and usage patterns to ensure the individuals using the privileged accounts aren’t malicious actors.

“You’re looking at things like, how has a system administrator been doing X, Y and Z, and why? If this admin has been using these three things and suddenly he’s looking at 15 other things, then why does he need that?” Cser said.

In addition, Cser said machine learning and AI can be used for conditional access and authorization. “Adaptive or risk-based authorization tend to depend on machine learning to a great degree,” he said. “For example, we see that you have access to these 10 resources, but you need to be in your office during normal business hours to access them. Or if you’ve been misusing these resources across these three applications, then it will ratchet back your entitlements at least temporarily and grant you read-only access or require manager approval.”

Algorithms are being used not just for managing identities but creating them as well. During his Identiverse keynote, Jonathan Zittrain, George Bemis professor of international law at Harvard Law School, discussed how companies are using data to create “derived identities” of consumers and users. “Artificial intelligence is playing a role in this in a way that maybe it wasn’t just a few years ago,” he said.

Zittrain said he had a “vague sense of unease” around machine learning being used to target individuals via their derived identities and market suggested products. We don’t know what data is being used, he said, but we know there is a lot of it, and the identities that are created aren’t always accurate. Zittrain joked about how when he was in England a while ago, he was looking at the Lego Creator activity book on Amazon, which was offered up as the “perfect partner” to a book called American Jihad. Other times, he said, the technology creates anxieties when people discover they are too accurate.

“You realize the way these machine learning technologies work is by really being effective at finding correlations where our own instincts would tell us none exist,” Zittrain said. “And yet, they can look over every rock to find one.”

Potential issues with AI identity management

Experts say allowing AI systems to automatically authenticate or block users, applications and APIs with no human oversight comes with some risk, as algorithms are never 100% accurate. Squire says there could be a trial and error period, but added there are ways to mitigate those errors. For example, she suggested AI identity management shouldn’t treat all applications and systems the same and suggested assigning risk levels for each resource or asset that requires authentication.

“It depends on what the user is doing,” Squire said. “If you’re doing something that has a low risk score, then you don’t need to automatically block access to it. But if something has a high risk score, and the authentication factors don’t meet the requirement, then it can automatically block access.”

Squire said she doesn’t expect AI identity management to remove the need for human infosec professionals. In fact, it may require even more. “Using AI is going to allow us to do our jobs in a smarter way,” she said. “We’ll still need humans in the loop to tell the AI to shut up and provide context for the authentication data.”

Cser said the success of AI-driven identity management and access control will depend on a few critical factors. “The quality and reliability of the algorithms are important,” he said. “How is the model governed? There’s always a model governance aspect. There should be some kind of mathematically defensible, formalized governance method to ensure you’re not creating regression.”

Explainability is also important, he said. Vendor technology should have some type of “explanation artifacts” that clarify why access has been granted or rejected, what factors were used, how those factors were weighted and other vital details about the process. If IAM systems or services don’t have those artifacts, then they risk becoming black boxes that human infosec professionals can’t manage or trust.

Regardless of potential risks, experts at Identiverse generally agreed that machine learning and AI are proving their effectiveness and expect an increasing amount of work to be delegated to them. “The optimal, smart division of labor between what we do — minds — and [what] machines do is shifting very, very quickly,” McAfee said during his keynote. “Very often it’s shifting in the direction of the machines. That doesn’t mean that all of us have nothing left to offer, that’s not the case at all. It does mean that we’d better re-examine some of our fundamental assumptions about what we’re better at than the machines because of the judgment and the other capabilities that the machines are demonstrating now.”

Visit Xbox at San Diego Comic-Con 2018 – Xbox Wire

San Diego Comic-Con, the world’s largest comic and pop-culture festival, is coming soon and Xbox is bringing the fun with exclusive gear, panels, celebrity guests, and more! See below for details on everything Xbox at SDCC and join the fun from California or from the comfort of your own couch.

Xbox Booth (San Diego Comic-Con badge required)
Hall A, Booth #100

For the first time ever, Xbox will have exclusive gear available at SDCC! Stop by to pick up exclusive clothing and items from Xbox and your favorite games and then get them customized on the spot with your Gamertag. See some of the items available here.

Visit us on Thursday, July 19 and Saturday, July 21 for signing sessions with some of your favorite developers and designers, but get there early: only the first 100 people to receive passes will be eligible!

Signings (San Diego Comic-Con badge required):

  • Brendan Greene (“PlayerUnknown”), Creative Director, PUBG Corp – Thursday, July 19 from 3 p.m. to 4 p.m. PDT
  • Joe Neate, Executive Producer, and Mike Chapman, Design Director, Sea of Thieves – Saturday, July 21 from 3 p.m. to 4 p.m. PDT

Xbox Gear Comic-Con Sweepstakes

Can’t make it to the booth to pick up the exclusive gear? Retweet @Xbox to potentially win an Xbox Gear Comic-Con prize pack! Four winners will receive a collection of exclusive Xbox Gear, and one grand prize winner will receive the gear and an Xbox One X.

Follow @Xbox or @XboxCanada on Twitter and retweet the following tweet when it goes live at the start of San Diego Comic-Con: “RT and follow for a chance to win exclusive #XboxSDCC #XboxGear! NoPurchNec. Ends 7/22/18. #Sweepstakes Rules: bit.ly/2KV2DQ1.” You have until July 22 to enter. Click through for the Official Rules.

Sea of Thieves Panel (San Diego Comic-Con badge required)
Room 5AB, Saturday, July 21 from 1:30pm – 2:30pm PDT

Special guest and Sea of Thieves fan Freddie Prinze Jr. (“Star Wars Rebels,” “24,” “Scooby Doo,” “I Know What You Did Last Summer”) joins the Rare crew, Joe Neate, Mike Chapman, and Peter Hentze as they discuss the lore and expanded universe of Sea of Thieves. Attendees will also receive a limited-edition Sea of Thieves comic and time-limited exclusive in-game DLC!

Xbox Live Sessions

If you’re not in San Diego but still want to follow along with the fun, we’re hosting two action-packed Xbox Live Sessions that you won’t want to miss.

  • PUBG featuring Brendan “PlayerUnknown” Greene: On Thursday, July 19 at 5:00 p.m. PDT, PUBG Creative Director Brendan Greene (@PLAYERUNKNOWN) and Microsoft Executive Producer Nico Bihary (@nico_bihary) will join Rukari Austin (@rukizzelrukizzel) to get their loot on in PUBG’s Miramar map live from inside of a PUBG Bus created by West Coast Customs. That’s right – Xbox, PUBG Corp., and West Coast Customs have teamed up to create a one-of-a-kind, tricked out PUBG Bus which will be home to the livestream and available to see in-person at The Experience at Comic-Con.
  • Sea of Thieves with Freddie Prinze Jr.: On Saturday, July 21 at 5:00 p.m. PDT, Sea of Thieves fan Freddie Prinze Jr. (@RealFPJr) will sail the high seas with members of the Rare team and Major Nelson in an episode of Xbox Live Sessions that’s sure to test the sea legs of the seasoned actor. Fans at home can tune in and watch on http://mixer.com/Xbox  and http://twitch.tv/Xbox.

Xbox at “The Experience at Comic-Con”

SDCC map

Head over to Petco Park where you can play Xbox One games, earn free swag, and win awesome prizes! No Comic-Con badge required.

  • Visit the Samsung truck at The Experience at Comic-Con, located in the Lexus Lot at Petco Park. Climb aboard the truck to compete in Forza Motorsport 7 on Xbox One X via Samsung’s 2018 QLED TVs. More information can be found here.
  • Come visit the first stop of the Xbox One Summer of PUBG tour. Win prizes, check out the PUBG Bus, and stick around for the Xbox Live Sessions! More information can be found here

For all the SDCC details, visit the Xbox SDCC website. For more Xbox news, follow @Xbox on Twitter and stay tuned to Xbox Wire. See you at San Diego Comic-Con!

Google Hangouts Meet adds interoperability with competitors

Businesses will soon be able to join meetings on Google’s web conferencing platform, Google Hangouts Meet, using Microsoft Skype for Business and video conferencing systems from Cisco and Polycom.

At the same time, Google is helping several competing video conferencing vendors better integrate with Google Calendar, so users will be able to schedule and join meetings on those platforms without downloads or plug-ins.  

The announcements underscore Google’s commitment to competing with Microsoft Office 365 in the enterprise collaboration market. The consumer tech giant continues to invest in G Suite’s cloud-based applications for web conferencing and team messaging, while also embracing integrations with a wide range of vendors.

“Google has remained a market contender in video conferencing for several years,” said Roopam Jain, an analyst at Frost & Sullivan. “However, its direction in the past was not concerted, and it seemed to be waiting to squarely jump in with an enterprise-ready tool.”

Google is now partnering with startup Pexip to make Google Hangouts Meet interoperable with standards-based video hardware and Skype for Business, starting later this month. Pexip’s code works behind the scenes, so everyone can participate in the same meeting from different interfaces.

Google Hangouts Meet’s incompatibility with third-party communications applications has slowed adoption of the product since its release last year, particularly among businesses already invested in video conferencing products from legacy vendors, Jain said.

“This is a smart move by Google in a very competitive market, where businesses look for a stable and open collaboration platform that they can invest in,” Jain said. It could also convince more existing G Suite customers to start using Google Hangouts Meet, positioning Google “as a viable alternative to any other leading video conferencing solution in the market,” she said.

Google Calendar add-ons for video conferencing

Cisco Webex is working with Google to let customers schedule and join Webex meetings directly from Google Calendar. The vendors Arkadin, GoToMeeting, LogMeIn, Dialpad, RingCentral, Vidyo and Vonage are working on similar add-ons, Google said.

Google will make those add-ons available in the G Suite app store “in the coming months.” It plans to release details for developers so additional web conferencing vendors can sync with Google Calendar in the future.

Google is also expanding its interoperability with Microsoft Exchange, announcing it will make it possible for G Suite users to book rooms, equipment and other resources registered in Exchange.

Google Hangouts Chat to add guest access

Businesses using Google Hangouts Chat will be able to add external participants to communication channels in the coming months — a feature already supported by all other leading team collaboration apps on the market today.

Google made Hangouts Chat available to G Suite subscribers earlier this year to keep its enterprise portfolio competitive with Microsoft Office 365, which includes Microsoft Teams.

In a 2018 Nemertes Research survey of more than 600 businesses, 10.5% of respondents cited Hangouts Chat as their primary tool for team collaboration. Google ranked fourth behind Microsoft Teams (32.9%), Cisco Spark (21.1%) and Slack (14.5%).

Google is continuing to improve its collaboration products, but it still needs to integrate them with Gmail better, said Irwin Lazar, an analyst at Nemertes Research, based in Mokena, Ill. For example, users should be able to launch a chat from a Gmail thread.

“They will grow as a threat, while at the same time also integrating with potential competitors,” Lazar said.