Feeds

World finally using unified communications

Aggressive projects more successful

SANS - Survey on application security programs

It seems that Unified Communications (UC) has at last started to move beyond the ‘what is it’ stage and hit the mainstream world of real users with real implementations and real experiences.

As we found in our poll (full report available here) at the end of last year with Reg readers, which looked at advanced business communications in the workplace, when we talked about the different components of UC, such as Unified Directory (UD) or Unified Messaging (UM), many have already either implemented these or have them on the agenda to some degree, with only a very small proportion actually having rejected them completely.

This is actually a pretty positive picture, and one that gives companies more confidence when thinking about taking the UC plunge. Implementing UC is a significant initiative, however, and awareness of potential challenges is a critical part of the planning process. If we look at the challenges that Reg readers have either experienced or anticipate, as shown in the chart below, we can learn a lot.

Chart-2-UC

The initial suggestion from this picture, as indicated by the red and orange portion of the bars, is that many businesses see UC implementations as weighed down with quite serious challenges, particularly around integration, security, cost management and a fear of vendor lock in. But on a positive note, a not insignificant proportion of Reg readers say that, in fact these challenges are easily manageable, as indicated by the green portion of the bars. So what can we glean from this?

By analysing this further, we have found that the challenges are lessened to some degree for those users who have taken a more aggressive UC adoption approach, embracing a wider set of components – unified directory, unified messaging and presence for example. Equally those implementing on a wider basis across their company also see benefits. Together these suggest that taking a more all encompassing and joined up approach from the outset, while not necessarily making the UC journey hassle free, can make it a little easier. If we think about this, this is intuitive. We would expect a properly designed and packaged UC solution to lead to fewer integration challenges than with a piecemeal/DIY approach.

It is also notable that those businesses that have embraced UC more aggressively have made certain of more involvement of stakeholders from across the business in driving and supporting initiatives around UC. This makes absolute sense, as the success of strategic implementations of this nature is closely linked to the level of support across the entire business. And of course, implementations which pull in a broader range of stakeholders are much more likely to be properly specified.

Evidence of this more all-inclusive approach is illustrated in the chart below.

From this, we can suggest that businesses which involve a broader reach of stakeholders while introducing UC will be able to better manage the challenges that exist around implementation. Beyond this, however, we would anticipate that a successful, stress-reduced installation is based on a very close relationship between the business and the solutions provider, which takes into account not just the UC inventory, but will play close attention to the business needs, and the impact that UC will have across the business. Working out just what these might be is generally better from those with battle scars and prior experience.

This doesn’t mean that companies should fall in with the vendor hype, and allow themselves to be led down a path that is ultimately not right for them. Typical feedback from Reg readers around what facilitated a UC implementation focusses around involvement of key technical leads during planning and implementation with clear migration plans and slow, well planned integration steps. Opting for open standards as far as possible and closely defining service level agreements (SLAs) that take into account company key performance indicators (KPIs) are also likely to reap rewards. Ensuring that the systems are easy to use, configure and manage is also considered a priority, and should surprise no one.

Ultimately, however, embarking on a UC implementation is not a trivial matter. While this article highlights some of the things we have seen as being important for businesses embarking on UC,we would be really interested in what Reg readers believe works, and of course, what they believe doesn’t. Please let us have your thoughts and experiences in the comments section below. ®

Freeform Dynamics Ltd

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.