Featured
Reports

Unlock UC Usage Constraints: Meet Communication Compliance Requirements Without Sacrificing Employee Experience
February 2023 // Over the last five years, we have seen a significant shift in how we work. Cloud-based unified […]

Solve Hybrid Work Compliance Challenges with Theta Lake and RingCentral
January 2023 // For most companies, the COVID-19 pandemic is in the rearview mirror. Business leaders are now focused on […]

Buyer’s Guide to Managed Mobility Solutions
October 2022 // The COVID-19 pandemic has reshaped almost every aspect of our lives, including the way we work. Things […]
Check out
OUR NEWEST VIDEOS
March 29 ZKast with Guy Diedrich of Cisco
6.5K views 23 hours ago
240 0
March 27 ZKast with Bob O'Donnell of TECHnalysis as we discuss final thoughts from NVIDA GTC
8.8K views March 27, 2023 9:46 pm
123 0
ZKTour of AWS NextLevel Demo Hall at MWC23
8.1K views March 24, 2023 1:55 pm
132 0
Recent
ZK Research Blog
News

The company announced Carbon Emission Insights, a widget to help enterprises optimize their sustainability practices

- Customers will have the ability to monitor the scope two emissions, defined as the indirect emissions that result from purchased electricity or heat from another organization, across all the collaboration devices an organization company has deployed.
- Customers will be able to see historical data and trending information which shows administrators' progress toward meeting sustainability goals. Companies can use this data to measure any changes made to improve sustainability.
- There is a new feature called Office Hours which provides IT administrators and facilities professionals with recommendations on how to optimize equipment around office hours. For example, when Office Hours is turned on, devices will automatically be shut down during certain hours. Office Hours will also turn off digital signage when there are no people around. During a pre-brief, Cisco shared a case study where 40 Webex Board Pros were turned off for 12 hours a day, and this equaled an annual savings of 16 MWh. Based on regional power costs, this results in savings of 9,512 euros in Germany, 10,030 euros in Italy, and 10,116 euros in France.

The combination of Uniphore and Red Box provides full-stack conversational AI for contact centers and more.

Hybrid Work Creates New Compliance Challenges
Hybrid work coupled with an explosion in the use of cloud-based collaboration tools has exacerbated the challenges of compliance. Office workers sit behind corporate-grade security infrastructure that captures all conversations coming in and out of offices. This allows compliance teams to inspect the data to ensure regulatory requirements are being met. Move workers, contact center agents, and executives to their homes and that increases the risk of violations occurring. As an example, a customer service representative could say something that wasn’t true to placate a customer, or a salesperson could become hostile with a prospect. Traditional on-site tools have no way of monitoring these conversations occurring over the cloud. Like all enterprise applications, spend is shifting to those solutions that support both on-premises and cloud applications, which Uniphore and Red Box claim to do. In reality, the problem that has become visible with hybrid work was already rapidly developing into one with in-office workers. When all conversations were done over the phone, compliance teams had one channel to monitor. Today, the number of channels has exploded and now includes screen sharing, file transfers, video, and more. However, Red Box can securely capture the information across every conversation and all channels. When combined with Uniphore’s artificial intelligence and automation capabilities, businesses can keep eyes and ears on every interaction. This visibility allows companies to not just monitor for quality assurance (QA) but to use the data for unique applications, such as optimizing knowledge libraries, developing new products, and delivering unique customer experiences.Conversational AI and Screen Capture Has Value Beyond Compliance
While compliance is the low hanging fruit, Red Box can be used for more. Conversations contain rich data that often goes untapped. Forward thinking companies know that conversations are a valuable asset, and the insights gained from understanding them can transform every aspect of a business including customer loyalty. The combination of Red Box and Uniphore offers customers the following benefits:- Complete data sovereignty and centralized data access: The control over data is particularly important in industries such as financial services and healthcare, but it is growing in importance in other verticals such as retail, telecom, entertainment, and others.
- AI-delivered insights: The ability to find key insights in the massive amounts of data in real time using AI and automation is growing.
- Faster time to value from self-service tools, agent assistance, and analytics: Businesses have experimented with bots and virtual agents in the past, but without AI, the customer experience can be frustrating.
Red Box Adds to Uniphore’s Platform
This latest purchase adds nicely to Uniphore’s approach to conversational AI, where it is creating one platform that can deliver rich capabilities across voice, video, and data. At a pre-briefing, I had a chance to talk to both companies. Uniphore’s CEO, Umesh Sachdev, explained how the companies fit together. “We can deliver all our AI and RPA (robotic process automation) pieces from a single architecture, but we had no control over where the customer’s voice and video data reside,” said Sachdev. “We would go to a customer and ask them to give us the data only to find out they had no access to their own data, as the legacy vendor had it locked up in their platform and were almost holding customers hostage. Now with Red Box, we are a full-stack data-to-AI provider for contact centers and beyond.” It’s important to note that while Uniphore will integrate Red Box into its own X platform, it was designed to be used in any environment. “We architected our solution to be a non-invasive overlay solution,” said Richard Stevenson, CEO of Red Box. “This allows us to work around that lockout problem mentioned earlier.” For Uniphore, this will be its fourth acquisition, with the other three having gone well. I expect to see Uniphore continue to add to its capabilities via buying complementary companies to augment its in-house research and development teams to give them an advantage in the conversational AI platform wars.
The cloud communications industry is maturing and it’s important that the vendors change how they sell and how they deal with the partner community.

- Presidents Club membership: gives partners the opportunity to meet RingCentral C-level executives at a destination location.
- Executive Sponsorship: partners now have a vice president or higher as their primary point of contact at RingCentral.
- Discounted Certified Delivery Partner (CDP) certification, which allows partners to conduct their own professional services for customers, including customer onboarding and implementation.
- Dedicated Channel Marketing Support: gives partners the opportunity to directly work with members of RingCentral’s channel marketing team to build comprehensive plans; develop assets; and assist with campaigns and events.

The use of cloud software principals can transform network operations.

Legacy Networks Hold Back Innovation
For businesses, this creates a challenge as a legacy network can’t support the needs of a business with a modern, cloud-centric approach to applications. In application development, DevOps has embraced the concept of continuous innovation (CI), but if the network takes days or even months to program, verify, and deploy, it holds the company back. Today’s network must be designed to support distributed multi-vendor, multiservice applications that run globally. Businesses are moving at faster speeds and digitally transforming, so the role of the network is changing. The commonly used software principle of CI must now come to the network to make it programmable and agile.Homogenize Network Design
Network design patterns are seeing tremendous homogenization. While legacy networks have had a massive disparity in architecture, most organizations today are approaching their network design with a common repeatable pattern. A repeatable design pattern enables automation to execute networking at scale, so organizations can plan for future business apps. The operational driver is taking software best practices and principles and applying them to day-to-day operations.Apply DevOps Practices to Networking
There is a lot of business value in making the network programmable, using application programming interfaces (APIs), and treating the network like software. Taking what an application developer (DevOps) does in their world and applying it to networking is a transformative concept that Arista has poured into a new solution called Continuous Integration (CI) Pipeline.Implement Network and Workflow Automation
Launched in November, CI Pipeline is a comprehensive network automation solution built on Arista’s EOS Network Data Lake (NetDL). It is designed to help organizations adopt a modern network operating model through continuous design, integration, and testing. In essence, CI Pipeline is a workflow that starts at the API level and builds on top of it for high-level automation. Instead of admins manually executing tests, CI Pipeline automates the entire workflow for them. It also incorporates the change control process, which is a lot like what a software developer does when making changes.Introduce a Continuous Design Framework
In conjunction with the CI Pipeline, Arista introduced Validated Designs (AVD) to provide organizations with a continuous design framework. AVDs are design guides for network best practices that can be turned into code. When used as part of the CI Pipeline, AVDs improve network reliability.Utilize Network Design Templates
Instead of copying and pasting everything in the Arista design guide, there is a template organizations can use to fill in the variables and AVDs generate all of the configurations automatically. They can also generate documentation and tests, making things easier for network engineers.Consider Multiple Deployment Models
Arista is offering one primary AVD with multiple deployment models. The framework is completely open source and multi-domain, which means it can be used to automate the data center, campus, or wide area network (WAN). It tackles the full life cycle of network provisioning from configuration generation to pre- and post-deployment validation.Upskill for Different Traffic Types and the Cloud
It’s important for organizations to start building networks that are designed for very different traffic flow patterns. Meanwhile, IT pros and network engineers should be thinking about refreshing their skill set as organizations move to software and the cloud.

Zscaler Inc. today announced “Zscaler Resilience,” which as the name suggests is a set of capabilities that improve the resiliency of its services with the aim of delivering nonstop operations.
Businesses have become heavily reliant on cloud services, and when they are unavailable, it can cause significant disruption in operations. One of the challenges in creating cloud resiliency is that there are so many factors, including network connectivity, security and data center operations. Some highly technical organizations may be able to do this on their own, but most companies do not have the skills. Zscaler Resilience is designed to deliver the necessary components as part of its service, simplifying business continuity.
Zscaler Resilience accounts for both infrastructure and operational processes and is comprised of the following components:
- Disaster recovery. This protects the customer against a Zscaler cloud outage. In the event of a major event that prevents access to private applications behind the Zscaler cloud, the customer traffic can be redirected to a Zscaler Private Edge residing in the customer’s local data center or in a public cloud where the most updated secure policies are. This ensures that business operations are not disrupted. As an option, direct internet access can be limited to only the business apps considered critical. I like this option as it makes companies review their apps and understand which ones are crucial and which should be best effort.
- Dynamic performance-based selection. This capability protects against one of the most difficult problems for information technology organizations, and that’s the brownout. When things are down, they’re down and troubleshooting and remediation is straightforward. With brownouts, things are still connected but not working quite right. This can mislead engineers as connectivity is confirmed but things aren’t working. Zscaler automates brownout remediation by continuously probing the gateways for HTTP latency and dynamically establishing tunnels that choose the optimal path for traffic.
- Customer-controlled data center exclusion. This feature, also known as “soft power,” is like brownout mitigation but puts more control in customers’ hands by allowing them to set a temporary exclusion period for one of the data centers experiencing problems. This prevents traffic from bouncing back and forth if connectivity is intermittently dropping.
Additionally, the company is introducing a service called Zscaler Resilience Audit, which is a custom service that helps customers with their business continuity plans. Audit looks at all aspects of the customer environment, identifies areas for improvement and then helps with the deployment and configuration of Resilience.
In a previous life, I was involved with business continuity initiatives, and the biggest mistake organizations make is a lack of planning and preparedness. It’s difficult to understand all the possible scenarios one might face, particularly today when there are technical, geopolitical and human factors to consider. Then there are different kinds of outages that range from brownouts to blackouts and catastrophic failures. Leveraging a service like Audit can help companies understand what gaps they may have.
From a price perspective, Zscaler is building these capabilities into the Business Edition subscription tier and higher (Transformation and Unlimited). On a pre-brief, Zscaler told me the idea wasn’t to make money off the service but rather to ensure that the service is always available. Zscaler will also be proactively reaching out to its customers to ensure they are taking advantage of Resilience.
In my opinion, not charging the customer for these features is the right thing to do as it shouldn’t cost the customer extra to ensure they can access services they are paying for. To be clear, not all issues that affect services are in the domain of Zscaler. There can be telco issues, DNS problems, security events or other factors. But Zscaler is putting its money where its mouth is and taking ownership of anything that could cause a customer to experience and outage. This is a model all cloud providers should follow.

The company also announced a “kickstarter” program for Teams customers to bring Poly | HP solutions into their enterprise.

- Poly CCX350 phone – Poly’s first Microsoft Teams-certified desk phone with a physical dial pad. This type of phone is ideal for a shared endpoint in high-traffic areas as well as retail, manufacturing, and other environments. The phone comes outfitted with Poly’s Acoustic Fence and NoiseBlockAI enabling businesses to put the phones in areas that may have been typically too noisy. Stadiums, airports and hotel lobbies are excellent examples.
- Poly Voyager Free 60 Series wireless earbuds – These are professional-grade wireless earbuds that are built for work but can also be used for everyday life. Key features include active noise canceling (ANC) and WindSmart technology, enabling people to wear them while out walking. There are two versions – a standard model with a charging case or the Voyager Free 60+ UC with a smart charge OLED case. The earbuds are available in a version certified for Microsoft Teams and non-certified for other platforms.


Organizations are investing more in privacy because they view it as a critical business priority, but there’s a major disconnect between consumer expectations and how organizations are actually handling data.
That’s according to Cisco Systems Inc.’s newest 2023 Data Privacy Benchmark Study, which also revealed that customers believe companies can do more, especially when using artificial intelligence with their personal data.
This contrast poses an interesting challenge for corporate chief information security officers, as many have them have told me that consumer privacy has become a top initiative because of the intense media pressure every time a breach occurs. The Cisco report clearly shows that despite the increased focus and budget, businesses can’t seem to close the gap with customer expectations.
The study, released Jan. 24, is Cisco’s sixth annual global study gauging perspectives on data privacy strategies. Cisco anonymously surveyed more than 4,700 security professionals from 26 geographies in 2022. The survey respondents come from various industries and company sizes. The study also includes results from Cisco’s 2022 Consumer Privacy Survey that was also conducted in 2022, surveying 2,600 adults in 12 geographies.
For most organizations (95%), privacy is a business imperative and an integral part of their organizations’ culture. Ninety-four percent of the respondents said customers would not buy from their company if data was not properly protected, while 81% agreed that the way an organization treats data reveals a lot about how it respects customer privacy.
Given the growing importance of privacy, it’s no surprise that organizations continue to invest in it. Despite a difficult economic climate, spending on privacy averaged $2.7 million in 2022, compared with $1.2 million just three years ago. The most significant growth between 2021 and 2022 took place at smaller organizations. For those with 50 to 249 employees, spending increased more than 17%, to $2 million. For those with 500 to 999 employees, spending rose more than 13%, to $2.6 million. Spending at larger organizations remained mostly unchanged after significant increases from 2019 to 2020.
Organizations view privacy as an attractive financial investment. In fact, the average organization reported getting 1.8 times return on their privacy investments. Thirty-six percent of organizations said they are getting returns at least twice their spending, up from 32% last year. The key benefits from privacy cited by the respondents include reducing sales delays, mitigating losses from data breaches, enabling innovation, achieving operational efficiency, building trust with customers, and making their company more attractive.
Yet when it comes to building trust, many organizations are not on the same page with consumers. According to findings from Cisco’s 2022 consumer survey, 60% of consumers worry about how organizations are using AI, while 65% said they’ve already lost trust in organizations over their AI practices. Consumers also said the best way to make them more comfortable would be to provide an opt-out option for AI.
I find the consumer demand for AI fascinating because just a few years ago, the sentiment was very much anti-AI, since no one wanted machines continually looking at their data. Sure, it might protect them, but the fear is it may be used for sales and marketing purposes. It seems consumers now recognize the value AI can bring to privacy. The challenge for businesses is that AI brings an expectation of perfection and even the best AI tools aren’t capable of that.
Although 96% of organizations believe they have an ethical obligation to treat data properly, their priorities are not consistent with those named by consumers. According to this year’s benchmark study, 30% of organizations named compliance as the most important priority for building customer trust, followed by transparency (26%). However, in the consumer survey, 39% of the respondents cited providing easily accessible and clear information about how their data is being used as the top priority.
The findings from both surveys reveal that compliance is not enough to build trust. Organizations must treat privacy as a critical business priority and ensure that everyone across the organization plays a role in protecting data. In fact, 95% of the respondents in the benchmark study said all employees need to know how to safeguard data privacy.
Privacy legislation plays an important role in ensuring that governments hold organizations accountable for how they manage personal data. Such laws now exist in 157 countries, an increase from 145 just last year. Even though complying with privacy laws can be costly and time-consuming, 79% of organizations believe they have had a positive impact.
Most organizations (90%) feel that a global provider operating at scale can better protect their data than a local provider. This is surprising, considering that many governments and organizations have data localization requirements in place that force data to be kept within a country or region. While conducting its research, Cisco found that localization isn’t optimal when taking into account costs, security and other tradeoffs. According to the study, 89% of organizations agree that data localization adds significant cost to their operations.
In conclusion, Cisco makes several recommendations based on the survey findings. First, it recommends that organization continue to invest in privacy and involve security and information technology professionals, who deal directly with personal data processing and protection.
Organizations should also be more transparent with their customers about how their personal data is used. For example, when using AI, companies should provide management options to customers.
Lastly, data localization is not always the answer since global providers are better equipped at tackling today’s complex privacy requirements.

Three recent customer cases show what value integrated UCaaS and CCaaS bring to an organization

Example #1: the Kansas City Royals' Digital Transformation Initiative
The Major League Baseball team was looking for ways to transform employee and fan experiences. The team migrated its IT services from on-prem to the cloud over the last couple of years, and it reduced the number of on-site business systems and storage pools from over 20 to one of each. As part of its digital transformation initiative, the Kansas City Royals deployed 8x8’s XCaaS Platform to provide its workforce with a single phone number and integrated chat, video, and messaging capabilities, to be available anywhere on any device. This is important for sports teams, as representatives can be anywhere in the stadium at any time but may need to interface with fans or other employees. Furthermore, the team deployed 8x8’s Contact Center solution, offering fans omnichannel customer service. The combined XCaaS solution has helped the Kansas City Royals improve the fan experience. For example, the platform’s speech analytics feature interprets unstructured data from customer conversations and allows contact center agents to improve interactions with customers. On top of that, the team now has a simplified infrastructure that doesn’t require so much operational upkeep by the IT team.Example #2: Fred Loya Insurance
Fred Loya Insurance is one of the largest Latino-owned companies in the country, with 726 agencies in 11 states. The company struggled with its legacy phone system, especially the costly changes it required to stay in compliance with new privacy laws. 8x8 offered Fred Loya Insurance a proof-of-concept implementation of XCaaS for three months, and the company saw immediate improvements. By moving to 8x8’s platform, costs went down significantly. The centralized administration provided by the platform helped Fred Loya Insurance reduce its five phone admins to three, while meeting the necessary privacy standards. Last year, 8x8 released a bespoke version of XCaaS called Frontdesk, specifically designed for receptionists. The experience is specifically designed for high call volume roles. Additionally, the company was able to implement changes much faster than in the past. For example, after getting a request from management to change how the contact center was handling calls, the company made the change within 30 minutes on a live system without interrupting any calls. The XCaaS Platform has enabled more than 3,500 employees and contact center agents in 700 offices to operate remotely. Meanwhile, the company also improved its customer experience by recognizing problems during calls using customer sentiment insights provided by the platform.Example #3: Princess Alexandra Hospital NHS Trust
The Princess Alexandra Hospital NHS Trust provides general acute, outpatient, and diagnostic services to approximately 500,000 residents in Essex, U.K. Similar to the previous example, the healthcare system had a legacy phone infrastructure that was failing on a regular basis and impacting both patients and staff. The Trust deployed 8x8’s X Series platform, which has since evolved into XCaaS. Softphones were given to employees, so they could work from anywhere using mobile phones, laptops, and the 8x8 app. As for patients, they no longer wait at the switchboard to be connected and can easily reach employees or request call-backs. When the Trust opens its state-of-the-art digital hospital in 2025, the plan is to keep using 8x8 plus Microsoft Teams, artificial intelligence (AI), and leading-edge tech. The staff will be able to move into the new building and migrate with 8x8 right away. * These three varied examples show actual customers that have deployed an integrated platform to change the way they do business. This is one of the best ways to highlight the value of a product as most customers want to know what other companies like them are doing. The e-book 8x8 put together is a good start but I encourage them to continue to release case studies and would like to see something similar from other vendors.
An explosion of Internet of Things connectivity mandates that security teams rethink threat protection.

- When it comes to OT devices, the risk of a breach is much greater than just being taken offline. It could have major business consequences. In an industrial environment, for instance, it could mean the loss of life, limb, and equipment. With OT, there needs to be a separation between the control network and the management network.
- The key is to provide access to systems that connect to the internet without actually connecting them to the network. That’s where zero trust becomes relevant. By applying the principles of zero trust to IoT and OT, whether it’s a user or a device, the identity is validated before the user/device is permitted to connect to the network.
- The majority of breaches in OT environments result from establishing an information highway by connecting two networks together. Zero trust is about connecting an entity to another entity without connecting the networks, which contains the lateral threat movement. Companies can choose to add privileged remote access for partners and third parties to avoid exposing the network to threats.
- Take the factory floor as an example. Everything doesn’t have to be connected to the internet. There needs to be a separation of management and control, where the whole factory can operate without an internet connection. It’s not about restricting day-to-day operations, but rather separating physical security and cybersecurity.
- Segmentation is widely deployed in corporate networks to minimize the attack surface. In IoT and OT environments like a factory floor, the same rules don’t apply. Segmentation should be approached on macro level, rather than the micro level. A coarse-grained approach would work well on the factory floor, but not in the financial sector or consumer packaged goods. Understanding those nuances is crucial.
- For one customer, Zscaler is supplying a solution that allows third parties to access enclaves in its oil rigs through an isolated mechanism, without setting up VPNs and firewalls. It’s all done over satellite links. Zscaler runs a distributed cloud with more than 150 data centers. Now, when the oil rigs move around, they can still connect to the closest data center.
- Zscaler recently partnered with Siemens to create an all-in-one solution for securing OT environments. The solution, offered directly from Siemens, combines Zscaler’s Zero Trust Exchange cloud security platform and Siemens’ devices. Customers with OT infrastructures can now securely manage factories and monitor quality assurance from any location.
- For those who are thinking about securing their OT environments, Zscaler recommends first starting with the goals. The most common goals for OT are plant and people safety, as well as increasing production. It’s important to come in with a business-oriented mindset versus a generic IT playbook for patching systems.

The move will further consolidate the legacy unified communications market.


New DigiCert solution simplifies the path to digital trust.

Endpoints Drive Need for Digital Trust
With the rise of connected devices and cloud deployments, the network perimeter has expanded. For IT operations, this means greater complexity and risk. For identity and access management (IAM) administrators, the authentication needs are increasing. For software development and IT operations (DevOps), security operations (SecOps), and operational technology (OT) teams, the attack surface is expanding. That’s where Trust Lifecycle Manager comes in. It brings together certificate lifecycle management and PKI services. It also tightly integrates with public trust issuance. On the certificate management front, the solution provides:- Discovery (centralized repository of all public and private certificates)
- Management and notifications (prevents expired certificates)
- Automation (one-touch provisioning and renewal)
- Integration (governance across CAs, or specific vendor Certificate Authority)
Multiple Deployment Options For Trust Lifecycle Manager
On the PKI services front, Trust Lifecycle Manager oversees identity and authentication of users, servers, devices, and other IT resources. DigiCert offers three deployment options. The first one is PKI as a service, where DigiCert manages customers’ public or private PKI. The second one is on-prem for those who have more complex environments. The third one is in the customer cloud. Approximately 50 percent of customers are deploying PKI as a service, 30 percent in the cloud, and the remainder on-prem. “We’re seeing a pivot in the industry, where instead of looking at siloed areas, organizations are starting to look across them and see how trust can be managed and measured throughout the organization,” said Brian Trzupek, senior vice president of product at DigiCert. “All the previous announcements and the infrastructure work we’ve done is leading up to DigiCert being able to execute on this launch.”Digital Trust Is Challenging To Deploy With Point Products
When thinking about the building blocks of digital trust, standards that help create trust in the ecosystem are at the core. Creating digital trust is a complicated process involving several key steps that can be visualized as a pyramid, explained Trzupek. At the base of the pyramid is defining trust through industry and technology standards. “This is where our leadership in the standards bodies that we participate in is so crucial. We’re the voice of the customer in those bodies. We’re taking their concerns, requests, and challenges into consideration,” said Trzupek. Moving up the pyramid is establishing trust through compliance and operations. DigiCert operates global data centers in six regions with service-level agreements (SLAs) for high availability. “This gives us extraordinarily high availability as a company. We operate data centers under a compliance regime that’s managed by 25 annual audits to ensure that we can deliver trust in those regions,” said Trzupek. Toward the top of the pyramid is managing trust for public and private PKI in the enterprise, which includes certificate lifecycle management. At the very top of the pyramid is extending trust even further into connected trust ecosystems—essentially everything beyond the perimeter like devices, software, identity, and content. Although certificate lifecycle management solutions have been on the market for a while, what differentiates DigiCert from competitors is its PKI service provider roots and ability to offer a full-stack solution that combines private and public trust with CA-agnostic certificate lifecycle management. DigiCert’s PKI Services draw from its rich history in PKI management, simplifying the complexity involved in managing identity and access with pre-built and customizable templates, deep integration and automated provisioning.DigiCert Is Shifting From Product To Platform
Additionally, DigiCert has more than 100 integrations with third-party vendors, offered out of the box with Trust Lifecycle Manager. DigiCert is opening up application programming interfaces (APIs) to third-party vendors, so they can do this work on their own. According to Trzupek, this gives DigiCert the scale to help more customers. DigiCert is actively adding support for management of other CAs beginning with Microsoft CA in Q1 and extending to other public and private CAs in subsequent quarters. With these expansions, DigiCert customers will be able to manage any certificate from any CA. Customers can already work with multiple CAs when building their certificate inventory with Trust Lifecycle Manager’s discovery features. “This opens up a whole new market for us. Previously, we had to sell to customers who are only using DigiCert CA services,” said Trzupek. “We’ve created an entire integration API and surface layer through this product, which third parties can extend and add functionality to it as they see fit. That’s a game changer.”
The most successful organizations use an integrated communications platform, according to experts from 8x8, Oracle, and Frost & Sullivan.

Hybrid Work: The Path Forward
In the webinar, the experts explored the evolution of work over the past two years. Research conducted internally by 8×8 found that about three quarters of organizations are adopting a hybrid work model – 82 percent of companies in the U.S. and 76 percent in the UK. The findings are staggering, noted Amrit Chaudhuri, chief marketing officer at 8×8. That’s because work is no longer a physical place. It can be anywhere. People are now working digitally across boundaries and across teams. “A lot of work now takes place in the digital universe, rather than a physical space. We use technology to communicate and collaborate,” said Chaudhuri. “The multi-device and work-from-anywhere practice only increases the challenge to get a 360 degree view for employees and customers, which creates a new set of requirements for IT leaders. All of us have to evolve to meet our customers where they are.”A Heavy Load on IT
There’s a massive burden on IT today to manage multiple disparate solutions to support hybrid work. The strategic approach should be for IT decision makers to adopt solutions that empower enterprises with modern communication experiences but aren’t siloed to just the CX or the employee experience (EX), explained Chaudhuri. At the Enterprise Connect 2021 conference, 8×8 introduced a new offering that brings together unified communications-as-a-service (UCaaS) and contact center as a service (CCaaS) in a single, cloud-native platform. 8×8’s experience-communications-as-a-service (XCaaS) platform has been in the works for a long time in order to bring EX to the same level of importance as CX. Much like customers, employees are becoming more demanding. 8×8 data shows that four in 10 employees are willing to quit if their employer isn’t flexible about remote work.CX and EX Improvement Drives Cloud Communications
Every year, Frost & Sullivan surveys thousands of IT decision makers across the world. At the height of COVID-19 in December 2020, the research firm asked IT decision makers what is driving their investments in communications, collaboration, and contact center tools. The majority said the key drivers were to boost the CX and EX. Both have become equally important. In addition to improving the CX, IT decision makers said they were looking to invest in tools that enhance information management, teamwork, and remote worker productivity. Frost & Sullivan also asked the survey respondents what their top goals are over the next two years:- 43 percent said dealing with pandemic-related challenges.
- 32 percent said improving the CX and customer satisfaction.
- 28 percent said improving operational efficiencies.
- 24 percent said automating business processes.
Digital Tools Impact Worker Productivity
The survey findings show that employees need to be given the right tools to be successful, which plays a key role in employee retention. With hybrid work becoming the norm, organizations need to be flexible with the tools they provide. Therefore, they must adopt strategies to create a supportive digital workplace that drives productivity across the board. “Productive employees are happier employees and happier employees lead to happier customers. They really do go hand-in-hand,” said Chad McAfee, vice president of cloud engineering at Oracle. “When you think about embracing cloud solutions, it plays a big role around providing scalability, agility, and operational efficiencies in a hybrid world.” Ultimately, moving to the cloud is the way forward. The cloud provides organizations with the ability to scale up and down as their needs change. However, not all cloud solutions can deliver on the privacy, compliance, and security that customers and employees expect. When selecting a cloud provider, the leading criteria for IT decision makers are security, reliability, and price. Year after year, these are the top three requirements for organizations, according to Frost & Sullivan. In a hybrid workplace, security presents many new challenges related to managing devices and users across multiple remote locations.Integrated Communications Improve Security
With an integrated communications platform approach, organizations get consistency in managing security policies. Such a platform treats security as a first class citizen and doesn’t come at the expense of functionality. The Oracle Cloud Infrastructure (OCI), for example, was originally developed with enterprise-class workloads at the forefront and evolved into a cloud infrastructure platform for communications providers. OCI’s architecture assumes zero trust, where a user’s identity must be validated before they’re allowed to get on the network. By transitioning away from point solutions to an integrated platform, organizations gain a common security framework, improved usability and manageability, and vendor accountability. Chaudhuri believes there are many other benefits for organizations, including:- Company-wide collaboration.
- Unified administration for IT to provision, configure, and manage from a single pane.
- Single integration framework to accelerate workflows and meet customer needs.
- Cross-platform insights and analytics to help make better decisions.
- Guaranteed service-level agreements (SLAs) for more reliable services.