Secure UX Enables UC Benefits
September 28, 2017

Gabriel Lowy
TechTonics

Share this

Many of my posts advocate a strategic, unified approach to the convergence of network, application, and infrastructure performance monitoring (NAIPM), user experience (UX), and security monitoring technologies, including the concept of the secure UX enterprise and how to get CEO and CFO buy-in on the path to digital transformation. Secure UX enables companies to achieve return on investment (ROI) and risk management objectives, and is directly correlated with financial and stock market performance.

Most senior executives recognize that UC are integral applications on the digital transformation path.

This post takes a more tactical approach by focusing on unified communications and collaboration (UC). Most senior executives recognize that UC are integral applications on the digital transformation path. As a result, many companies are in the process of replacing legacy voice and video infrastructure and disparate messaging and collaboration tools with next-generation UC systems, including cloud-based unified communication as a service (UCaaS).

These apps are key enablers for engaging employees to deliver enhanced customer experiences. With UC, companies can accelerate time-to-revenue, improve productivity and reduce capex and opex – the three pillars of return on investment (ROI) that drive corporate strategy.

UC Fundamentals

For those not familiar, UC is a suite of fully integrated communication tools that help employees stay connected and collaborate effectively. UC systems offer synchronized communication methods that are all accessible in one real-time solution, including:

Voice - Most UC offerings are voice-centric because the leading vendors have deep roots in telephony. But other services have become preferred means of communication.

Conferencing and collaboration - In addition to audio, video and Web conferencing, these components include collaboration features such as shared virtual workspaces, whiteboarding, file sharing and document sharing.

Presence technology - Presence servers gather presence information from various sources and provide unified presence information to end users or applications.

Instant messaging - Enterprise IM systems offer security and privacy that public IM services cannot.

Speech access and virtual assistants - Virtual assistants provide intelligent screening and allow end users to filter messages and access calendars, contacts, voice and video through voice command.

Mobility - Integrating the mobile users' voice and real-time communications services with core enterprise communications lets them do their jobs regardless of location.

Unified messaging - Unified messaging (UM) integrates voice, fax and email messages and message notification. Most UM products add a variety of advanced call and message management functions, including desktop call screening of inbound calls, find me/follow me, live reply or call return, and cross-media messaging.

According to IDC, 41 percent of organizations currently use UC, while another 22 percent plan to deploy UC in the next year. Despite being a mature market, investments in UC are expected to increase by 12.3 percent next year. While voice, instant messaging and presence are well-established services, incorporating team collaboration, artificial intelligence and machine learning into business processes and workflows apps is driving category growth.

UC systems can be deployed in-house, in the cloud or as hybrid services. In a UCaaS delivery model, communication and collaboration applications and services are purchased from a software vendor, in similar fashion to any other SaaS application.

Today, 70 percent of deployments are still on-premises in midsize and large enterprises. However, the UCaaS segment of the market is growing much faster.

That’s because UCaaS now provides high levels of availability and can scale to meet the needs of a global enterprise. Companies also view UCaaS as offering superior integration, better service assurance, and being more secure than their on-premises deployments. Some UCaaS providers offer encryption models that allow customers to hold their own encryption keys, meaning that the cloud provider has no means to access customer information.

UC is a Growth Opportunity for UX Vendors

Distributed and mobile users are collaborating on more projects and communicating with each other across multiple continents and time zones. This is driving more organizations to invest in new infrastructure to support UC apps. This includes integrating contact centers with employee and customer communications to improve engagement and UX.

UX is paramount in such latency-sensitive apps as UC. A unified UX platform helps companies to track UC app performance, including uptime and root cause analysis. It also drives uptake within the organization, enabling the company to realize ROI on their UC investments.

A secure UX platform enables UC benefits. It provides IT with visibility and intelligence across the entire application delivery chain – from on-premises to the cloud and across a variety of devices. In addition to advanced behavioral analytics against key performance indicators, the platform can leverage automated continuous monitoring and machine learning for early incident detection and response.

In the future, UC will likely integrate with IoT networks and devices, incorporating machine-to-machine communications. That scenario only increases the strategic value of a secure UX platform to the enterprise.

Gabriel Lowy is the founder of TechTonics Advisors, a research-first investor relations consultancy that helps technology companies maximize value for all stakeholders by bridging vision, strategy, product portfolio and markets with analysts and investors
Share this

The Latest

July 11, 2018

Optimization means improving the performance of your human and technology resources while keeping a watchful eye. To accomplish this, we must have clear, crisp visibility into the metrics relevant to the delivery of workspace applications to your end users and to the devices – the endpoints – they use to be productive ...

July 09, 2018

As tech headlines flash across my email, the CMDB, and its federated equivalent, the CMS, are almost never mentioned. And yet when I do research, dialog with IT, or support our consulting team, the CMDB/CMS many times still remains paramount ...

June 28, 2018

Given the size and complexity of today's IT networks it can be almost impossible to detect just when and where a security breach or network failure might occur. It's critical, therefore, that businesses have complete visibility over their IT networks, and any applications and services that run on those networks, in order to protect their customers' information, assure uninterrupted service delivery and, of course, comply with the GDPR ...

June 27, 2018

A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are more reasons to use these new NPM/APM analytics solutions ...

June 26, 2018

A new breed of solution has been born that simultaneously provides the precision of packet-based analytics with the speed of flow-based monitoring (at a reasonable cost). Here are 6 reasons to use these new NPM/APM analytics solutions ...

June 21, 2018

There’s no doubt that digital innovations are transforming industries, and business leaders are left with little or no choice – either embrace digital processes or suffer the consequences and get left behind ...

June 20, 2018

Looking ahead to the rest of 2018 and beyond, it seems like many of the trends that shaped 2017 are set to continue, with the key difference being in how they evolve and shift as they become mainstream. Five key factors defining the progression of the digital transformation movement are ...

June 19, 2018

Companies using cloud technologies to automate their legacy applications and IT operations processes are gaining a significant competitive advantage over those behind the curve, according to a new report from Capgemini and Sogeti, The automation advantage: Making legacy IT keep pace with the cloud ...

June 18, 2018

It's every system administrator's worse nightmare. An attempt to restore a database results in empty files, and there is no way to get the data back, ever. Here are five simple tips for keeping things running smoothly and minimizing risk ...

June 15, 2018

When it comes to their own companies, 50% of IT stakeholders think they are leaders and will disrupt, while 50% feel they are behind and will be disrupted by the competition in 2018, according to a new survey of IT stakeholders from Alfresco Software and Dimensional Research. The report, Digital Disruption: Disrupt or Be Disrupted, is a wake-up call for the C-suite ...