Comprehensive software reviews to make better IT decisions
Five9 Outlines Voice Technologies Roadmap at CX Summit 2021
Five9’s CX Summit for 2021 hosted a wide variety of events and interactive sessions that explored best practices for using Five9 as well as an outline of Five9’s roadmap for the coming year. Of special focus was Five9’s projected investments in voice technologies for the contact center.
Of course, the Summit arrived on the back of Zoom’s announcement of intent to acquire Five9, building on the companies’ close strategic partnership. In the opening keynote, Five9 CEO Rowan Trollope spoke to the benefits of Five9 being acquired by Zoom: namely, the creation of a complete omnichannel engagement platform, combining Zoom’s highly popular voice and video solution with Five9’s best-in-class CCaaS features. The acquisition (if it goes ahead) would create an industry-shaking product, solidifying trends in the market that are seeing vendors bring together communication, collaboration, contact center, and customer experience solutions within a single platform. As the acquisition is yet to be finalized, a safe harbor surrounded any further conversation on Zoom’s takeover.
Beyond Zoom, the key message Trollope stressed for Five9’s future was the company’s investments in voice technologies. The emphasis on providing multichannel options for customers in the contact center marketspace, Trollope argued, has left voice behind – an industry mistake, given voice is still the predominant channel customers prefer to receive service on. To this end, Five9 highlighted three key investments:
- Intelligent virtual agents (IVAs)
- Conversational AI
- VoiceStream (officially released on September 15)
The future of voice platform digitization, therefore, ties closely with advances in AI-driven automation, particularly in the wake of the pandemic. Five9’s data showed that 71% of contact centers thought that intelligent self-service automation helped them remain agile, with 76% agreeing that automating customer support tasks would benefit their workforce.
VoiceStream, especially, brings voice and automation together for a variety of high-value use cases. VoiceStream uses RESTful APIs to integrate and stream agent/caller audio in real time to other applications. This enables real-time speech analytics (such as sentiment analysis), authentication via speech biometrics, and agent assistance. Launch partners for VoiceStream include Cogito, CallMiner, Voci, ValidSoft, and XSell.
The elephant in the room for Five9’s CX Summit was, of course, the Zoom acquisition. With intrigue even higher now that Five9’s shareholders are being encouraged to reject the acquisition by advisory firm ISS, the inability to delve deeper due to safe harbor rulings means that we await Five9’s eventual decision at the end of September. (It is worth noting that no further information was provided at the mid-September Zoomtopia conference, either.)
Otherwise, Five9 has an exciting year ahead with its focus on voice technologies and remains a popular CCaaS solution, according to SoftwareReviews’ data. Five9 is right to recognize that voice is not diminishing as customers’ preferred channel for service; given that, it is sensible to focus on optimizing this channel, rather than risk opportunity costs with equalizing resources across multiple channels. Affording options for omnichannel experiences is important to customer satisfaction, but enhancing voice as the most popular channel (through VoiceStream or otherwise) will provide value across a variety of use cases.
Source: SoftwareReviews' Five9 Product Scorecard. Accessed September 20, 2021.
As always, organizations should monitor which channels their target audiences find most popular; investing in a particular channel (e.g. a chatbot or video) without a requirements gathering investigation will result in low ROI if your target audience has little desire to interact through that channel. Building customer personas and segmenting by demographic will help define which channels are right for your organization. Explore Info-Tech’s Build a Strong Technology Foundation for Customer Experience Management to start creating a library of customer personas to influence your customer experience strategy.
Want to Know More?
This analysis examines Zscaler's cloud-based security platform, with a focus on its Zero Trust Exchange (ZTE), Zero Trust Network Access (ZTNA), and broader suite of security solutions. It explores Zscaler's approach to overcoming the limitations of traditional VPN architectures, using artificial intelligence (AI) for threat detection, and integrating various security functionalities within a unified platform. Drawing insights from analyst demo notes, vendor information, and independent research, this analysis aims to provide a comprehensive and unbiased assessment of Zscaler's value proposition for security professionals.
In today's cybersecurity landscape, managing machine identities and digital certificates across complex, hybrid multi-cloud environments is a growing challenge. As the volume of digital certificates used to secure machines, applications, workloads, services, and devices continues to grow exponentially, organizations often struggle with a lack of visibility and manual processes, resulting in critical service outages and security vulnerabilities. AppViewX CERT+ is a next-generation automated certificate lifecycle management (CLM) solution that simplifies PKI and certificate management. It combines the best of automation, security, and insights to meet enterprise machine identity and digital trust requirements. AppViewX CERT+ features are purpose-built to address both the operational and security challenges of certificate management to, in turn, help organizations prevent application outages and security breaches. By enabling enterprise-wide crypto-agility, AppViewX CERT+ enhances machine identity trust, eliminates security gaps, promotes compliance, and supports post-quantum cryptography readiness.
In the digital realm, trust is currency. Without robust identity verification, online interactions become a breeding ground for fraud and exploitation.
In the ever-evolving landscape of SaaS Security, one company has quietly forged its path, becoming a beacon of protection for large enterprises grappling with the growing complexity of SaaS applications. This is the story of Adaptive Shield, a rising star in the SaaS Security space, whose journey from a nimble startup to a recognized industry leader is as remarkable as the solutions it offers. Founded in 2019 by cybersecurity veterans Maor Bin and Jony Shlomoff, Adaptive Shield entered the scene with a bold vision: to address the growing blind spot in the SaaS ecosystem regarding enterprise security – including the dangers deriving from misconfigured security controls, lack of management regarding human and non-human identities, interconnected apps, and the detection of threats within these business-critical apps. Recognizing the exponential adoption of SaaS and the inherent risks it posed, the company set out to build a comprehensive shield, not just for individual applications, but for the entire interconnected SaaS ecosystem.
LoginRadius started as a simple social login provider but pivoted to create a comprehensive CIAM platform that now reaches over a billion consumers worldwide. My analyst demo with LoginRadius confirmed what they pride themselves on: delivering a user-friendly platform that simplifies CIAM implementation and management.
Qwiet AI is a San Jose, California-based company that develops an AI-powered application security platform. The company's flagship product, preZero, uses machine learning to automate and accelerate application security testing, enabling developers to identify and remediate vulnerabilities early in the software development lifecycle (SDLC). Qwiet AI was founded in 2016 by a team of experienced cybersecurity professionals with a shared vision of empowering developers to build secure software. The company's mission is to "Prevent the Unpreventable" by providing a comprehensive and AI-driven solution that helps organizations of all sizes secure their applications from the very beginning.
We should start by defining what a secret is. It’s really any piece of confidential information used to authenticate access to sensitive resources. This includes passwords, API keys, encryption keys, SSH keys, and other digital credentials. Many of the organizations I talk to have an application security program with some OWASP checks in the pipeline, some SAST, but rarely SCA or DAST testing. GitGuardian believes secrets detection and remediation is crucial for maintaining security and preventing unauthorized individuals from accessing sensitive information or disrupting critical systems. I agree and believe the value it can bring to an application security program is significant.
Q headlines a bevy of announcements at AWS re:Invent 2023 in Las Vegas that shed more light on the cloud service provider’s AI strategy and where its differentiation from other vendors lies.
This note outlines some tips and tricks that you should be aware of when embarking on the installation and configuration of a Kubernetes cluster. Such an endeavor should only be attempted if the need for an enterprise-grade container orchestration solution is required.