CompTIA: Cloud Services Gaining Traction For Unified Communications

CompTIA: Cloud Services Gaining Traction For Unified Communications

CompTIA: Cloud Services Gaining Traction for Unified Communications

The proliferation of cloud solutions has motivated many companies to integrate cloud-based unified communications into their technology suites; in addition to rapid update capabilities, cloud solutions for unified communications offer simplified scalability options while reducing overall information technology redundancies.

comptia

According to a new study from CompTIA entitled “Trends in Workflow Automation and Communications,” real-time cloud-computing video and voice systems are gaining considerable traction among organizations in the United States. Although experts attribute the change to such factors as cost and vast improvements in cloud services, they also note that companies appreciate the availability of such solutions for mobile devices. CompTIA points out that the anywhere, anytime capabilities offered by mobile devices makes them invaluable for managing all functions of business, including unified communications.

The study queried 500 firms about their overall communications objectives and strategies. More than 60 percent of participants listed cost reduction as their major priority, but nearly the same number of firms also seek improved staff productivity and enhanced customer engagement as critical goals. Approximately 50 percent of firms hope to achieve better collaborative capabilities and superior business metrics. While cloud-based solutions offer all of these benefits, they only deliver these advantages if employees can be convinced to utilize them.

Among the 500 firms surveyed by CompTIA, here are the top priorities:

• Reduce costs (61 percent of companies)
• Improvement engagement with customers (59 percent)
• Improve employee productivity (57 percent)
• Improve collaboration ability (49 percent)
• Improve business metrics (48 percent)

Seth Robinson, the director of technology analysis at CompTIA, recommends that cloud providers consider offering education to entire workforces rather than just technology and implementation team members.

Descriptions of capabilities and features should be tailored to specific job roles and specific devices, whether it’s a laptop, smartphone or tablet,” he said, adding that employees often revert to more familiar means of communication because they feel uncomfortable with newer, less familiar options.

Without utilization of unified communications tools available via the cloud, companies that make investments in such solutions fail to realize the full potential of this technology. By focusing on education, cloud vendors and providers gain a valuable opportunity to win over a much larger number of a company’s employees. This type of buy-in could lead the way for the adoption of additional cloud and infrastructure services.

By Mary Elizabeth

About Mary Elizabeth

A communications professional with more than 20 years of experience in advertising, branding, finance, and technology, Mary Elizabeth Johnson strives to identify disruptive and innovative trends in these fields. In addition to her reporting for CloudTweaks.com, Mary Elizabeth serves as a consultant for organizations in the real estate, banking, technology, and manufacturing industries.

View All Articles

Sorry, comments are closed for this post.

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…