Secure UX Enables UC Benefits
September 28, 2017

Gabriel Lowy
TechTonics

Share this

Many of my posts advocate a strategic, unified approach to the convergence of network, application, and infrastructure performance monitoring (NAIPM), user experience (UX), and security monitoring technologies, including the concept of the secure UX enterprise and how to get CEO and CFO buy-in on the path to digital transformation. Secure UX enables companies to achieve return on investment (ROI) and risk management objectives, and is directly correlated with financial and stock market performance.

Most senior executives recognize that UC are integral applications on the digital transformation path.

This post takes a more tactical approach by focusing on unified communications and collaboration (UC). Most senior executives recognize that UC are integral applications on the digital transformation path. As a result, many companies are in the process of replacing legacy voice and video infrastructure and disparate messaging and collaboration tools with next-generation UC systems, including cloud-based unified communication as a service (UCaaS).

These apps are key enablers for engaging employees to deliver enhanced customer experiences. With UC, companies can accelerate time-to-revenue, improve productivity and reduce capex and opex – the three pillars of return on investment (ROI) that drive corporate strategy.

UC Fundamentals

For those not familiar, UC is a suite of fully integrated communication tools that help employees stay connected and collaborate effectively. UC systems offer synchronized communication methods that are all accessible in one real-time solution, including:

Voice - Most UC offerings are voice-centric because the leading vendors have deep roots in telephony. But other services have become preferred means of communication.

Conferencing and collaboration - In addition to audio, video and Web conferencing, these components include collaboration features such as shared virtual workspaces, whiteboarding, file sharing and document sharing.

Presence technology - Presence servers gather presence information from various sources and provide unified presence information to end users or applications.

Instant messaging - Enterprise IM systems offer security and privacy that public IM services cannot.

Speech access and virtual assistants - Virtual assistants provide intelligent screening and allow end users to filter messages and access calendars, contacts, voice and video through voice command.

Mobility - Integrating the mobile users' voice and real-time communications services with core enterprise communications lets them do their jobs regardless of location.

Unified messaging - Unified messaging (UM) integrates voice, fax and email messages and message notification. Most UM products add a variety of advanced call and message management functions, including desktop call screening of inbound calls, find me/follow me, live reply or call return, and cross-media messaging.

According to IDC, 41 percent of organizations currently use UC, while another 22 percent plan to deploy UC in the next year. Despite being a mature market, investments in UC are expected to increase by 12.3 percent next year. While voice, instant messaging and presence are well-established services, incorporating team collaboration, artificial intelligence and machine learning into business processes and workflows apps is driving category growth.

UC systems can be deployed in-house, in the cloud or as hybrid services. In a UCaaS delivery model, communication and collaboration applications and services are purchased from a software vendor, in similar fashion to any other SaaS application.

Today, 70 percent of deployments are still on-premises in midsize and large enterprises. However, the UCaaS segment of the market is growing much faster.

That’s because UCaaS now provides high levels of availability and can scale to meet the needs of a global enterprise. Companies also view UCaaS as offering superior integration, better service assurance, and being more secure than their on-premises deployments. Some UCaaS providers offer encryption models that allow customers to hold their own encryption keys, meaning that the cloud provider has no means to access customer information.

UC is a Growth Opportunity for UX Vendors

Distributed and mobile users are collaborating on more projects and communicating with each other across multiple continents and time zones. This is driving more organizations to invest in new infrastructure to support UC apps. This includes integrating contact centers with employee and customer communications to improve engagement and UX.

UX is paramount in such latency-sensitive apps as UC. A unified UX platform helps companies to track UC app performance, including uptime and root cause analysis. It also drives uptake within the organization, enabling the company to realize ROI on their UC investments.

A secure UX platform enables UC benefits. It provides IT with visibility and intelligence across the entire application delivery chain – from on-premises to the cloud and across a variety of devices. In addition to advanced behavioral analytics against key performance indicators, the platform can leverage automated continuous monitoring and machine learning for early incident detection and response.

In the future, UC will likely integrate with IoT networks and devices, incorporating machine-to-machine communications. That scenario only increases the strategic value of a secure UX platform to the enterprise.

Gabriel Lowy is the founder of TechTonics Advisors, a research-first investor relations consultancy that helps technology companies maximize value for all stakeholders by bridging vision, strategy, product portfolio and markets with analysts and investors
Share this

The Latest

August 22, 2019

Recent EMA research explored the state of ESM. One of the many conclusions is that ESM is mainstream. Fully 87% have some level of ESM deployment. Not surprisingly, there is a significant divide between mature and relatively new deployments in terms of benefits derived, use of AI and automation, adoption levels, and number of non-IT areas being served from established ITSM implementations ...

August 21, 2019

For the first time, a majority of companies are putting mission critical apps in the cloud, according to the latest report by Cloud Foundry Foundation ...

August 20, 2019

The cloud continues to transform IT in every industry. But in order to migrate to the cloud, embrace these new technologies and truly evolve their business, organizations need an underlying network that can support digital transformation ...

August 19, 2019

One common infrastructure challenge arises with virtual private networks (VPNs). VPNs have long been relied upon to deliver the network connectivity and security enterprises required at a price they could afford. Organizations still routinely turn to them to provide internal and trusted third-parties with "secure" remote access to isolated networks. However, with the rise in mobile, IoT, multi- and hybrid-cloud, as well as edge computing, traditional enterprise perimeters are extending and becoming blurred ...

August 15, 2019

The configuration management database (CMDB), along with its more federated companion, the configuration management system (CMS), has been bathed in a deluge of negative opinions from all fronts — industry experts, vendors, and IT professionals. But from what recent EMA research on analytics, ITSM performance and other areas is indicating, those negative views seem to be missing out on a real undercurrent of truth — that CMDB/CMS alignments, whatever their defects, strongly skew to success in terms of overall IT progressiveness and effectiveness ...

August 14, 2019

The on-demand economy has transformed the way we move around, eat, learn, travel and connect at a massive scale. However, with disruption and big aspirations comes big, complex challenges. To take these challenges head-on, on-demand economy companies are finding new ways to deliver their services and products to an audience with ever-increasing expectations, and that's what we'll look at in this blog ...

August 13, 2019

To thrive in today's highly competitive digital business landscape, organizations must harness their "digital DNA." In other words, they need to connect all of their systems and databases — including various business applications, devices, big data and any instances of IoT and hybrid cloud environments — so they're accessible and actionable. By integrating all existing components and new technologies, organizations can gain a comprehensive, trusted view of their business functions, thereby enabling more agile deployment processes and ensuring scalable growth and relevance over the long-term ...

August 12, 2019

Advancements in technology innovation are happening so quickly, the decision of where and when to transform can be a moving target for businesses. When done well, digital transformation improves the customer experience while optimizing operational efficiency. To get there, enterprises must encourage experimentation to overcome organizational obstacles. In other words ...

August 08, 2019

IoT adoption is growing rapidly, and respondents believe 30% of their company’s revenue two years from now will be due to IoT, according to the new IoT Signals report from Microsoft Corp ...

August 07, 2019

It's been all over the news the last few months. After two fatal crashes, Boeing was forced to ground its 737. The doomed model is now undergoing extensive testing to get it back into service and production. Large organizations often tell stakeholders that even though all software goes through extensive testing, this type of thing “just happens.” But that is exactly the problem. While the human component of application development and testing won't go away, it can be eased and supplemented by far more efficient and automated methods to proactively determine software health and identify flaws ...