Tackling the Hidden Costs of Collaboration Software

Craig Molloy, Lifesize

Hidden Costs of Collaboration Software

With a distributed workforce being increasingly common in today’s workplace, companies are relying more and more heavily on efficient collaboration tools and techniques. So it’s surprising to discover that over half the IT decision makers (56%) working today have no idea how much they are spending on subscriptions and licenses for collaboration and conferencing.

The survey, commissioned by Lifesize, a global innovator in video conferencing, found that companies generally employ 4.4 tools across 3 providers in a haphazard attempt to meet the demands, without realizing the increased costs, inefficiencies and service quality costs their approach delivers.

In other findings from the survey:

  • 70% of respondents rated collaboration as essential to what they do;
  • 68% feel that more focus on conferencing and collaboration is needed;
  • 92% are using multiple collaboration tools, with messaging being most popular, followed by screen share, voice and then video.

Amongst the many issues with the technology are problems with bandwidth limitations, security restrictions on file sharing, poor video quality and compatibility issues. “Managing multiple collaboration solutions from multiple vendors is complicated and chaotic and results in paying a premium for feature overlap, inconsistent experiences, slow adoption and reduced productivity,” said Craig Molloy, Lifesize CEO.

Lifesize’s investment in video collaboration technology has seen them deliver best-in-class, cloud-based video conferencing that improves quality while bringing down the total cost of ownership dramatically – a winning combination which has seen the company go from strength to strength.

By Jeremy Daniel

Gary Bernstein

Mapping Crime Though Big Data – Leading Sources

Online Crime Maps Online crime maps is a set of tools used by law enforcement agencies to map and make an analysis of crimes and incidents in order to find possible patterns in them. Online ...
Mark Barrenechea

Security is Job 1: Machines vs. Machines

Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee access. As much as 38% of attacks come from internal ...
Torsten

Five Ways to Secure Access to Web Workloads

Secure Access to Cloud Workloads Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. That’s a major reason why worldwide spending on public cloud services and infrastructure ...
Martin Mendelsohn

Who Should Protect Our Data?

Who Should Protect Our Data in The Cloud? You would think that cloud service providers are safe havens for your personal data – they all have a ‘security’ component embedded into their offerings and claim ...
Sangeeta Chhabra

What Accountants Should Know About The Cloud

Cloud Accounting Cloud technology has been at the top of the charts of new-age technologies for a long time now. Almost every industry in the world has started realizing its capabilities and integrating cloud strategies ...
Ramanan GV

Establishing a Unified Governance Model for the Digital Workforce

Increase visual control and reduce OPEX by 30% The Digital Service Providers (DSPs) are riding an automation wave. Painful manual tasks, which burdened staffs for ages, can now be easily handled by the software bots ...