If you don't know about the latest trends, how can you act on them? Explore monthly updates covering everything from sustainability to cyber security and the tech solutions powering new waves of innovation.
July update: Olympic achievements in technology
At Exertis, we are committed to offering innovative, sustainable technology solutions focused on durability, security, and the latest AI enhancements. We've been at the forefront of many olympic achievements in technology and want to showcase some of these so you can see how Exertis can help you stay ahead in the tech landscape.
Immersive experiences in 3D
have now become glasses-free
Lenovo is introducing the ThinkVision 27 3D monitor, a trailblazing 27-inch screen that offers 2D/3D compatibility without the need for glasses, designed for more immersive creation, connection, and collaboration.
Contact us to find out moreASUS Expert Series – Enterprise-grade durability & reliability
Business and enterprise users need higher quality and reliability, so ASUS Business PCs undergo rigorous testing to exceed mainstream standards, ensuring they meet military-grade MIL-STD-810H durability requirements. Expert Series products also offer comprehensive security with multiple hardware and software layers, ensuring data protection, essential for both the workplace and education settings.
AI-enhanced innovation
Tim Griffin, CEO of Exertis
"Everybody will be using AI in some way, shape or form, in the same way the internet is insidious in our lives today. But when we started, we were all scrapping around during the .com boom in the late 90s. Everyone thought it was going to be amazing. And of course, it wasn't immediately, but it is today. It's in everything we do. The same will happen in AI."
Logitech MX Brio 705 for Business
Logitech recently released a high-end webcam for advanced users and enterprises. Their most advanced webcam yet, the ultra HD 4K resolution and advanced webcam sensor demonstrates Logitech’s continuous innovation with face-based image enhancement. AI-powered image enhancement on this computer webcam offers more natural and accurate skin tones with facial tracking in challenging lighting conditions.
At Exertis we have already achieved
our 2025 carbon reductions target
We are committed to working with sustainable leading brands, including Fairphone who we exclusively launched with last month.
With Fairphone products, users can easily repair or upgrade their devices ensuring extended long-life products for either your workforce or your customers.
Business updates
Exertis Cloud
The new and improved Exertis Cloud site is now LIVE! Backed by the same impressive portfolio and knowledgeable team - now easier to navigate than ever before, and with a fresh lick of paint from our design team.
May update: Zero Trust
Why you should incorporate a Zero Trust policy
According to the UK office for national statistics, half of UK businesses experienced some form of cyber security breach in the last 12 months.
Most of them have no cyber protection. When your company’s offices are located in almost every employee’s home, maintaining security becomes a growing concern and calls for a progressive security strategy.
What is Zero Trust?
Zero Trust is a strategic framework that organisations should work towards to enhance security and reduce the risk of breaches. It treats every user and device as a potential threat, requiring verification at every step rather than assuming everything inside the network is safe.
Why? Zero Trust
Modern businesses require a flexible security model that works for the complexities of an ever-changing workplace, without hindering productivity. Verifying every user, this framework ensures an organisation's resources and data are kept secure. Embrace your hybrid workforce.
Protect your employees, data, and commercial bottom line.
"Zero Trust is a journey, not a product and anyone looking to go on that journey should align themselves to the NIST 800-207 framework."
Dominic Ryles, Director of Sales and Commercial | Exertis Cybersecurity
The 3 key principles of Zero Trust
The 3 stages of implementing Zero Trust and how we can help:
Continuous verification
Constantly verifying access of all users within the network.
Limiting the blast radius
Minimising the impact if an external resource or insider breach does occur.
Automate content collection and response
Incorporating behavioural data, considering parameters such as user identity, device, location, and type of content.
Visualisation
Understand all of the resources, their access points and and visualise the risks involved.
Mitigation
Detect and stop threats or mitigate the impact of the breach in case a threat cannot be immediately stopped.
Optimisation
Extend protection to every aspect of the IT infrastructure and all resources regardless of location while optimising the end user experience.
If you are interested in learning more about adopting a Zero Trust strategy, get in touch with our cybersecurity team.
April update: Microsoft Copilot - the AI tool for business
At Exertis, we’re always on the lookout for innovative solutions that can improve productivity, creativity and efficiency. That’s why our team have been getting to grips with Microsoft Copilot.
The integration of CoPilot into various Microsoft 365 applications represents a shift in how businesses can utilise generative AI to improve their productivity, creativity and efficiency.
5 hours
per week saved on meeting note-taking
5 hours
Save 6 hours per PowerPoint presentation
Maximise Excel
without extensive training courses
Ben Voce, Modern Workplace Specialist from the Exertis Cloud team, shared his feedback highlighting some key benefits:
Save time and improve productivity, using Copilot to provide information, summaries, and suggestions from chat messages, emails, and files. The AI tool can also summarise key discussion points and suggest action items, all in real time during a meeting.
What to consider:
The circular economy aims to promote a more sustainable model of production, with a goal to minimise resource depletion, reduce the environmental impact, and maximise the product lifecycle.
Prompt engineering
Effective use of Copilot heavily relies on how queries are phrased. Employees may need to develop prompt-crafting techniques.
Copilot security
Ensuring access control management is essential when integrating Copilot to ensure only authorised users can leverage its capabilities.
Lenovo
ThinkPad T T14 Windows 11 Pro Laptop
Lenovo
ThinkBook 14s Yoga Windows 11 Pro Laptop
Lenovo
V15 G4 AMD Ryzen 15.6 Inch Laptop
Find out more about Microsoft Copilot at this Windows 11 webinar, taking place on Thursday, 18th April, from 10am to 10.30am.
Fill in the form below and someone will get back to you shortly
Don't miss out on any issue
Take a browse back through our previous Great Insights editions to stay in the know on what everyone is talking about.