Comprehensive software reviews to make better IT decisions
When Video Conferencing Won’t Save Money
Video conferencing can no longer be treated as a standalone application or singular product. Traditionally this technology was difficult to implement, deploy, and manage with limited integration as most products used proprietary hardware and software.
As end user working styles and work locations change, and technologies continue to mature, we need to redefine what roll video conferencing will play. Video conferencing is now an additional consideration when a company is developing a strategy for collaboration capabilities.
Looking to Save on Travel Costs
A short time ago I had an analyst call with an Info-Tech client who was starting to investigate various video conference vendors. The member came to the call with a high-level list of some basic requirements that included:
- the need to accommodate meetings with high quality
- low/no capital investment
- process that can easily transcend multiple platforms/video conference technologies
This initiative started several months before our scheduled call, as a request from the senior leadership in the organization wanted to avoid traveling to New York City as frequently as they had been. The senior leadership team was looking to gain visibility into what investments may be necessary and some of the cost points for video conferencing.
I enquired as to the number of end users that may be able to leverage these capabilities moving forward. The member paused for a moment and stated that they felt maybe only a small subset of users (approximately 100-150) would be able to take advantage of video conferencing.
The company had an existing contract with West Communications that allowed them to maintain a few Cisco WebEx accounts for a handful of employees to start a proof of concept. We continued to identify different internal teams using various pieces of technologies to collaborate.
After some prodding, we identified that the Human Resources team was leveraging point-to-point video capabilities with Skype for Business to complete “talking head” interviews. A previous merger and acquisition engagement included bring an older subset of Polycom equipment into the organization. This infrastructure had limited functionality and can only provide dedicated point-to-point communications between a specific set of conference rooms due to proprietary endpoint hardware and network requirements.
The final major discovery was that every location potentially could have a different provider of telephony, from legacy on-premises to a variety of cloud-based providers with various styles of endpoints and applications. This type of situation can occur when an organization grows rapidly. Often companies are forced to acquire technology with a “just in time” approach to enable the business to move forward. Merger and acquisitions can often be the catalyst to cause the technology sprawl that we see in this company.
What Are Some Lessons Learned?
First, travel is not always necessary. While there is ample evidence that in-person meetings have some clear advantages over remote collaboration, this doesn’t rule out the need for completing a cost-benefit exercise.
Second, the real world is a messy place, and often requires jerry-rigged solutions to problems. That being said, standardization will improve communications practices. The client in question manages a hodgepodge of different infrastructures—and that’s a burden on the organization. Streamlining the acquisition process, and maturing the collaboration practice could go a long way towards relieving some of these headaches.
Having standards, and making good faith efforts to implement them, is a good first step—and something that I’m sure has become top of mind with the team moving forward as they continue to develop an approach.
- Ask yourself the question, “Do I really need to be onsite?” Current collaboration technologies have reduced the need to travel for many types of engagements.
- Is this travel expense a requirement? Include a statement in the travel profile to verify that being physically onsite is needed.
- Standardize and simplify the number of solutions deployed.
- Complete a requirements gathering exercise to determine the time, effort, and spend required to provide the expected return on investment to add these capabilities.
Senior leadership is looking to reduce travel costs by bringing video capabilities to the end user. These capabilities come standard in many collaboration products and can provide an end user with a more viable alternative than having to physically travel.
Want to Know More?
Q headlines a bevy of announcements at AWS re:Invent 2023 in Las Vegas that shed more light on the cloud service provider’s AI strategy and where its differentiation from other vendors lies.
This note outlines some tips and tricks that you should be aware of when embarking on the installation and configuration of a Kubernetes cluster. Such an endeavor should only be attempted if the need for an enterprise-grade container orchestration solution is required.
It’s simply not enough today to pit your traditional application security toolkit against today’s advanced threats, especially those attacks that target APIs or mobile platforms. Bolstering your CI/CD pipeline by introducing more advanced and accurate SAST, SCA, IAST, and DAST will most certainly improve your security posture, but the journey does not end there. There are attacks and use cases that need careful consideration for how you approach security. Appdome believes it has those unknown challenges addressed and can significantly improve your application security program with very little effort from your development and security team, a welcome change from solutions that required a good bit of work to introduce problem-free into your code base four years ago.
This post provides a review of Zoom’s 2023 conference, Zoomtopia 2023. Core aspects covered include what major product releases and upgrades Zoom announced at Zoomtopia 2023, and what these announcements mean for Zoom’s market positioning in 2024.
Contact center as a service (CCaaS) enterprise providers are steamrollering ahead with embedding generative AI functionality in their platforms – whether organizations are prepared for it or not. In this post, I explore a positive outlook for how generative AI can be used to enhance organizations' customer experience capabilities while generating ROI. This includes: 1. Listing the major use cases for generative AI in the contact center. 2. Discussing how we might calculate ROI from utilizing generative AI in the contact center. 3. Considering what organizations can do to prepare for CCaaS vendors’ release of generative AI functionality.
In June 2023, I decided to remove the password on my primary email account as well as the one used to log-in to all of my devices. Did I wait too long? Am I too optimistic this will work without issue? Are there kinks that still need to be worked out? I recently attended Identiverse 2023 and got a FIDO2 hardware token intending at some point in the future to go passwordless. Why wait though? I was pumped up with all the passkey and passwordless sessions I attended and was eager to try this out and share my experience.
If you’re in the market for a password manager or are interested in secrets management, Bitwarden has a powerful platform for you. This unified platform is delivered via a thoughtful and intuitive UI, which Bitwarden Password Manager users will recognize. Bitwarden ranks as top of the Leader Quadrant in SoftwareReviews under the Password Management category, and the company believes its optimized, wide-range passwordless solution set will address most organizations’ needs.
Next-generation firewalls were smarter than previous firewalls, able to deeply analyze traffic and integrate with complementary security solutions. Today our needs are more complex, however, with a 742% increase in software supply chain attacks over the past three years. Sonatype Nexus Firewall has been paying attention and claims its firewall product is smarter about these attacks.
Have you ever thought of what else you could do to take your security operations center (SOC) to the next level and focus on prevention? Look no further – external attack surface management (EASM) was a popular managed service and topic of discussion at Rivest–Shamir–Adleman (RSA) Conference 2023, named after a popular public-key cryptosystem.