Real-time Communications – Voice, Messaging, Video or Collaboration

Kevin Riley

The Communications Cloud

As more and more real-time communications – whether voice, messaging, video or collaboration – move to distributed software and cloud infrastructure, the management and security of real-time services becomes increasingly complex.

Enterprises are moving to a zero-trust security posture, which means that every application must be secured. Real-time communications can no longer be ignored. This is especially true for large enterprise environments in regulated industries where human conversations fall under the compliance umbrella (financial transactions, credit card numbers being provided to contact center agents, healthcare records that include recorded and transcribed evaluations, and so forth). An increasing amount of pressure is being put on IT teams to ensure all data that traverses networks, applications and clouds is monitored and secured.

The fragmentation and complexity of unified communications cannot be an excuse to drive a security posture that is on par with other IP applications running in the enterprise. Now that technology is in place to monitor, for example, email, Dropbox, Slack, Skype and other third-party collaboration networks, it’s not okay to shrug off confidential information leaking out or accidentally being shared by employees or contractors. For real-time communications, we have moved beyond denial of service as the primary threat vector and into the domains of theft of service and use of communications channels for extraction of digital assets.

Analytics and Machine Learning will play a critical role in enabling enterprises to keep up with this ever-increasing surface area of attacks and increasing level of threat sophistication. Harvesting data from the entire real-time communications infrastructure backed by behavioral analytics and machine learning allows for very sophisticated threat detection and mitigation. In a way, networked analytics and policy “homogenizes” your security borders into a unified perimeter compared to independent edge products acting autonomously.

Another advantage of using data and analytics services to monitor and manage real-time communications (RTC) is the ability to control quality even when there are multiple disparate Voice over Internet Protocol (VoIP) systems interworked together with many different protocols, call routing and load balancing approaches.

Whether a user is making an internal call from Skype for Business to an AVAYA hard phone or an outbound call via SIP trunk, understanding, controlling and automating VoIP networks often requires the use of many vendor-specific tools, which may serve a purpose in their own domains, but don’t always “play well with others.”

The challenge of managing RTC sessions has been exponentially amplified with the move to dynamic cloud architectures and the rise of API-based communications services like Twilio, web services like WebRTC and CRM integrations.

What’s a responsible IT Executive to do?

A unified, vendor-agnostic monitoring and security strategy that spans multiple protocols and provides interoperability and interworking is more important today than ever. Without global visibility, operationalizing complex VoIP and Over-the-Top (Internet-based) environments is becoming almost impossible without new tools that provide end-to-end visibility and control.

We Cannot Manage What We Cannot Measure

Events such as SIP registration floods, VoIP pivot attacks and failed load balancing cause disruption of service and keep IT managers awake at night. When an attack or network failure occurs on a voice system it can take days – if not weeks – to track down the issue unless software is in place that monitors all aspects of RTC, particularly as more and more functionality moves to the cloud.

While security may feel like the scariest issue, day-to-day operations can also be improved when enterprises and Service Providers have full visibility into basics like voice quality, IP network performance and service utilization. When one combines an over-arching analytics platform with the existing branch-office infrastructure, Enterprise service network administrators can efficiently determine if a call-quality issue is unique to a type of handset, branch location or gateway.

Global visibility into cloud services for RTC, if done well, goes even further. Given the increasing reliance on services like Microsoft Skype for Business (and now Teams) it is also necessary to monitor database-processing times on backend servers to ensure call processing is going smoothly.

This can be done by monitoring the time between the last packet of a request and the first packet of the corresponding response, associated with the payload for database transactions across backend servers. This generates database latency alerts with signaling metrics useful in more advanced “grooming” of RTC networks and services. Incorporating this type of capability into a big data analytics platform enables an enterprise to monitor service quality and troubleshoot when needed from the client to the cloud from a single platform which increases efficiency and reduces down time.

Aside from service assurance and troubleshooting, enterprises can respectfully mine their user data to deliver a more personalized user experience. Leveraging big data analytics and machine learning to track communications from end-to end in the network – and thus enable a detailed view of threats, quality and user behavior – is already being done to answer questions such as what are people and systems doing? How often are they doing these things? Where are the predictable patterns? How do we immediately identify an “out-of-trend” moment, which could lead to trouble?

Harvesting data around RTC creates meaningful insights that help enterprises measure so they can manage. Using predictive and behavioral analytics helps managers literally see into the future and avoid trouble before it happens.

Predicting intent throughout the network and all the way to end users – solid gold. Predicting sentiment, for example, as part of a contact center application? Priceless. Automating network operations security and applications in multiple clouds, and across clouds? This is the future.

By Kevin Riley

Al Castle E911

Businesses Need E911 for Remote Employees

E911 for Remote Employees Remote working is no longer a luxury or a distant possibility – it’s the norm for enterprises around the world. The ...
Torsten

Five Ways to Secure Access to Web Workloads

Secure Access to Cloud Workloads Organizations are increasingly moving their workloads to the cloud to achieve greater agility, flexibility, and cost savings. That’s a major ...
Atman Rathod

UX Design in the Age of DevOps: Transformation Through Collaboration

UX Design in the Age of DevOps DevOps is popular among modern IT strategists because it leaves no scope for lapses in the development process ...
Move bot migration

MoveBot – New Data Transfer Platform

Data Transfer Platform Branded post by Movebot As cloud computing and storage continue to provide enhanced ROI to organizations, businesses are storing their data on ...
Future Fintech

What’s the cloud forecast for 2020?

Tech Agnosticism In 2019, we saw how cloud computing transformed the way data is managed, the way applications are developed and deployed, and also the ...
Anita Raj

Will there be a normal to go back to after COVID-19?

The COVID-19 Aftermath Until November last year, not one of us would have expected life to take such a dramatic turn in as short as ...
Boring Bunch.png