8×8 Inc. has launched 8×8 Express, a business phone system designed specifically for smaller businesses that don’t yet have an IT staff.
8×8 Express does not require implementation services, and the vendor claimed online setup takes minutes. 8×8 Express gives users unlimited calling to the United States and Canada; HD video conferencing; business messaging, including text messaging and group chats; and intelligent call routing. All features are available on desktop and mobile for both iOS and Android.
Additionally, 8×8 Express includes the recently released 8×8 Meetings platform. This enables teams to collaborate with HD video conferencing with screen sharing. The Meetings platform is accessible through the same mobile and desktop apps that are used for calling and texting. Collaborators can join meetings from browsers without downloading software. 8×8 Meetings is in early access now for new 8×8 Express and X Series customers on X2 packages and above.
Other features of 8×8 Express include the following:
call forwarding, auto attendant and ring groups;
moving existing businesses’ numbers to 8×8;
HD voice and video;
compatibility with multiple Poly desk and conference phones;
integration with Office 365, Outlook Calendar and Google Calendar; and
self-administered management tool.
8×8 Express comes on the heels of a few other small-business phone system launches in recent months.
In May, Google launched CallJoy, a phone service for small businesses that gives them a local phone number and provides customer service options. A CallJoy agent can be customized to provide information to customers and block spam calls.
Earlier in July, LogMeIn Inc. launched Grasshopper Connect as a unified communications product designed for small businesses. Grasshopper Connect combines multiple forms of business communication into one inbox and enables small-business owners to create a dedicated business phone number through an existing phone.
8×8 Express is available now in the U.S. and Canada starting at $12 per person, per month.
Businesses in the Middle East and Africa are key targets for cyber attackers.
Data published by PwC in 2016 suggested that Middle East businesses were considerably more likely to suffer from cybercrime than the global average. Even though increased awareness and investment saw attacks in the United Arab Emirates (UAE) decline during the first half of 2018, cyber criminals still managed to steal close to Dh4 billion from victims in 2017, while the average amount of time consumers in the UAE lose dealing with online crime is rising steeply.
Businesses in South Africa are also falling victim to repeated ransomware attacks, with more than half of them hit by ransomware in 2017, according to a survey by Sophos. Further North, Kenya has been targeted by hackers in several major attacks over the past couple of years.
Hackers are increasingly taking advantage of “low-hanging fruit” as the cost of circumventing security measures goes up. Botnets continue to impact millions of computers globally, infecting them with old and new forms of malware, while ransomware continues to be a popular method used by cybercriminals to solicit and, in several cases, successfully obtain money from victims.
“We continue to see high profile cyberattacks land in the headlines around the world,” says David Weston, principal security group manager at Microsoft, who leads the Device Security and Offensive Security Research team, also known as the Red Team.
“Cryptocurrency mining, ransomware and other scareware are reaching new levels of sophistication.”
Microsoft’s own Red Team
Despite the continuous cybersecurity threats, only 33 percent of organisations have a cyber-incident response plan in place, and most companies are still not adequately prepared for or even understand the risks faced.
It’s for this reason, Microsoft is committed to helping businesses secure their environment and protect their customers. One way the company is working to achieve this, is through its Red Team, led by Weston, who is visiting the Middle-East this month.
“The Red Team operates like the world’s most sophisticated attackers: Gathering intelligence about their target, finding strings of vulnerabilities and then building the most refined exploits,” explains Weston. “Once their attack is complete, they work with their colleagues to identify and build disruptors to block the attack.”
The idea came about when Weston was at a hacking competition known as Pwn2Own, and noticed the pattern of many companies, including Microsoft, whereby they released software to the public and then hackers would attack. The so-called “white hats” would tell these companies about the vulnerabilities they found, but the “black hats” found and exploited these vulnerabilities themselves.
Weston says, “I knew we needed to be more aggressive in our approach, so I devised a plan: Disrupt this cycle by creating a team of internal hackers at Microsoft who would mimic the tactics and techniques of the most advanced hackers. Their goal would be to attack Windows 10 and its apps to make them better – to find and fix the toughest vulnerabilities before the bad guys.”
The Red Team’s advanced threat protections identify nearly a billion threats per day across end points. This helps Microsoft stay ahead of the game as hackers become increasingly more sophisticated.
The impact of AI and cloud on cybersecurity
Weston also highlights the impact of artificial intelligence (AI) on security.
“AI is filling critical gaps in cybersecurity,” he explains. “It will continue to advance cybersecurity; improve efficacy, detection and response; and bring us closer to being truly predictive and preventing attacks before they even occur.”
However, cybercriminals will continue to advance and adapt, just as the industry continues to advance and adapt. It’s for this reason businesses are being urged to move to the cloud, adopt modern platforms, and embrace comprehensive identity, security and management solutions.
“Most businesses aren’t as prepared as they could be. We can all do better, and that’s why we believe cloud is a security imperative to secure today’s modern workplace,” says Weston.
The Red Team is making inroads to ensure Microsoft software is as secure as possible for its customers. However, businesses in the Middle East and Africa that are embracing digital transformation to remain relevant in their markets should prioritise four key initiatives to ensure they are secure: implementing cyber resilience strategies; developing cybersecurity skills; protecting data privacy; and integrating cyber risk.
“At Microsoft, we recommend that everyone must be proactive in their cybersecurity efforts. Better protection equals better prevention, detection and remediation,” says Weston.
Slack will soon give businesses an additional level of security by letting them manage their encryption keys. The feature will appeal to a small number of large organizations for now, but it could help the startup expand its footprint in the enterprise market.
Slack already encrypts the messages and files that flow through its premium platform for large businesses, called Enterprise Grid. Now, the vendor plans to give customers control of the keys that unlock that encryption.
“Enterprise key management is another significant step that Slack needs to take to meet increasing security demands — and according to their promise, without hurting speed or usability, [which are] common side effects of EKM,” said Wayne Kurtzman, analyst at IDC.
Slack touted the forthcoming feature as providing “all the security of an on-premises solution, with all the benefits of a cloud tool.” But the vendor clarified that the keys will be created and stored in Amazon’s public cloud.
“In the future, we may expand this offering to support an on-prem or private cloud [hardware security module] key store,” said Ilan Frank, director of Slack’s enterprise products.
Cisco Webex Teams lets businesses manage encryption keys on premises or in the cloud. It also provides end-to-end encryption. In contrast, Slack only encrypts data in transit and at rest, which means the data may get decrypted at certain routing points in the cloud.
Slack has no plans to change its encryption model, Frank said, citing potential “usability drawbacks” related to search and advanced app and bot features.
Symphony also offers end-to-end encryption and enterprise key management. Its team collaboration app has found a niche among banks and other financial firms, which generally have strict compliance and regulatory standards.
“I think, from Slack’s case, it’s a good first step in allowing customers to control their own keys,” said Zeus Kerravala, founder and principal analyst at ZK Research in Westminster, Mass. But Slack should also ensure businesses can store those keys in their own data centers and eventually pursue end-to-end encryption, he said.
Slack’s enterprise key management feature will be particularly useful for external communications done through Slack, said Alan Lepofsky, a vice president and principal analyst at Constellation Research, based in Cupertino, Calif.
When partners communicate through a shared channel in Slack, the company that established the channel will have control over the encryption keys.
“I think this will be a very important use case, as it’s that external communication where you really want to ensure security and privacy,” Lepofsky said.
Slack expects to make enterprise key management available for purchase to Enterprise Grid customers sometime this winter.
Slack looks to appeal to more large enterprises
Slack launched Enterprise Grid last year in an attempt to expand beyond its traditional base of teams and small businesses. The platform lets large organizations unify and manage multiple Slack workspaces.
As more businesses begin to explore the benefits of moving on-premises data and applications to the cloud, they’re having to rethink their traditional approaches to data security. Not only are cybercriminals developing more sophisticated attacks, but the number of employees and users who can access, edit, and share data has increased the risk of breaches. In fact, Gartner indicates* that “through 2022, 95 percent of cloud security incidents failures will be the customer’s fault. CIOs can combat this by implementing and enforcing policies on cloud ownership, responsibility and risk acceptance. They should also be sure to follow a life cycle approach to cloud governance and put in place central management and monitoring planes to cover the inherent complexity of multicloud use.”
Instead of relying on a patchwork of third-party security solutions that don’t always speak to each other, potentially leaving systems vulnerable to attack, companies are now adopting a unified, end-to-end cloud security defense. This typically involves choosing a cloud provider that can integrate security controls right into existing corporate systems and processes. When these controls span the entire IT infrastructure, they make it easier to protect data and maintain user trust by offering increased compatibility, better performance, and more flexibility.
Protection that’s always compatible
A holistic, cloud-supported threat warning and detection system can be designed to work seamlessly across every asset of an IT environment. For instance, built-in security management solutions can give IT teams the ability to constantly monitor the entire system from a centralized location, rather than manually evaluating different machines. This allows them to sense threats early, provide identity monitoring, and more—all without any compatibility issues.
Container shipping company Mediterranean Shipping Company (MSC) has gone this route. As in many businesses, MSC’s IT environment is spread across a variety of locations, networks, and technologies, such as container ships, trucking networks, and offices. Its previous security strategy employed a mixture of third-party solutions that often ran into compatibility issues between different components, giving attackers a large surface area to probe. This made MSC vulnerable to threats such as fileless attacks, phishing, and ransomware. However, after transitioning to a unified cloud security solution, it has been able to guard against attacks using protection that integrates effortlessly into its existing environment.
Reliable performance, more efficiently
The more complex an IT environment gets, the more time employees spend testing, maintaining, and repairing third-party security solutions. A unified cloud security approach improves performance by not only providing a consistent, layered defense strategy, but by also automating it across the entire IT infrastructure. At MSC, software and security updates are now done automatically and deployed without delay across the cloud. Information about possible threats and breaches can quickly be shared across devices and identities, speeding up response and recovery times so that employees can focus on other issues.
Security with flexibility to grow
Scalability is another factor driving adoption. A cloud environment can easily scale to accommodate spikes in traffic, additional users, or data-intensive applications. A patchwork of third-party security solutions tends not to be so nimble. At MSC, security controls are integrated into multiple levels of the existing IT infrastructure—from the operating system to the application layer—and can be dynamically sized to meet new business needs. For example, continuous compliance controls can be established to monitor regulatory activities and detect vulnerabilities as they grow.
A unified security approach: becoming the standard
The best security solutions perform quietly in the background, protecting users without them noticing. Unified cloud security does this while also reducing the resources required to keep things running smoothly. “Once you have true defense in depth, there’s less chance of having to single out a user and impact their productivity because you have to reimage an infected machine,” said Aaron Shvarts, chief security officer at MSC Technology North America.
After moving its workloads to Azure and upgrading its previous third-party security solutions to the native protection of Windows Defender, MSC now has a defense strategy that suits the complexity of its business. Learn more about Azure security solutions and how Microsoft can help you implement unified security across your cloud.
As businesses introduce an ever-growing, complex IT ecosystem of on-premises and SaaS applications, APIs, blockchain and other technologies, how can they possibly tie them together?
For many DevOps teams, the answer is API-based integration to enable communication between applications and platforms. Integration projects, however, pose challenges in security, runtime and management.
In this Q&A, Oracle’s Vikas Anand explores industry trends that drive rapid adoption of API-based integrations. He also lays out the hybrid cloud connectivity integration challenges for DevOps teams and ways to bypass those issues.
Anand is vice president of product management for integration, process and API management cloud services at Oracle.
Which technologies and use cases drive use of API-based integration?
Vikas Anand: SaaS connectivity limitations are the No. 1 reason enterprises adopt and then expand API integration programs. When SaaS is not integrated, it quickly changes to silo as a service. Customers can only derive limited value if their SaaS system is not working well in a very heterogeneous enterprise IT environment.
APIs power new technologies that create better experiences for customers, such as chatbots and many mobile user experiences. APIs provide information from on-premises and cloud back-end systems, such as CRM [customer relationship management] or ERP.
Those new technologies have to be integrated into the existing IT environments and then extended to customers. For example, adoption is growing in API-driven B2B technologies, which provide a nimbler transaction option than traditional EDI [enterprise data integration] [Standard] X12-based transactions. Another example is growing use of smart contracts with blockchain to do transactions in a trusted way. API integration provides the pathways for these transactions.
What problems do DevOps teams encounter in API-based integration implementation and management?
Anand: The No. 1 challenge is how to secure their APIs. APIs are exposed on the edge, and they are available for everyone to use. A thought-through security model is important. My advice is to focus on using security standards, such as OAuth. Then, you’ll be on the same security level as partners and customers.
Another challenge is documentation of how you define, build and share APIs. Look at standards such as OpenAPI [that] support moving APIs across teams and across API developers.
A third challenge is optimizing API runtime, which relates to monitoring, testing and management. This calls for preproduction work in API interface testing and validating API functionality. In operations, ensure that APIs are not only secured and protected from anomalies, but also can be scaled up as more APIs are consumed by the partners in an ever-growing hybrid environment.
Consider that APIs run not just behind the customer firewall in a data center, but also across multiple clouds and devices. At runtime, you need your APIs to be close to the back-end applications to deliver the timely response, scale and experiences customers want.
Why isn’t integration built into SaaS offerings?
Anand: SaaS only allows you to configure and customize. If you need to extend the applications, API-based integration is a lightweight alternative to legacy, on-premises ESB [enterprise service bus] integration suites.
For example, say you have a CRM application with a coding system, and you might need to have an extension of the business logic to support new discounting rules. Unfortunately, it may not be possible to configure or change the SaaS environment. The vendor will not allow you to do it, because the SaaS product would then be upgrade-unfriendly. So, in such cases, DevOps can use business process automation in alignment with API-based application integration to deliver those extensions.
In hybrid compute environments, how does the business value of APIs and API-based integration play out?
Vikas Anandvice president of integration, Oracle
Anand: API integration supports multichannel experiences that improve customer engagement. An example is how integration helps businesses partner with other service providers to offer new capabilities. An example is an API model that makes Uber services available on a United Airlines application.
APIs also spur revenue growth. For instance, a business’s IP [intellectual property] that lies behind firewalls can be exposed as an API to create new revenue channels. Many new-age companies, such as Airbnb and Lyft, leverage the API model to deliver revenue. Traditional companies [in] manufacturing and other [industries] are really applying this to their domain.
API-first design provides modernized back-end interfaces that speed integrations. Doing back-end integrations? You can run the APIs within the data center to integrate SaaS and on-premises applications. A good API, a well-designed API can actually reduce the cost of integration by 50%.
Which best practices do you suggest for API-based integration project success?
Anand: Developers need to transform and route data and apply process automation capabilities. To do integration efficiently, enterprises have to automate data flow, business processes and whatever repeatable, error-prone tasks IT does. This calls for support from automation models, such as robotic process automation, to create single pane of glass for analytics.
Enterprise-level application integration projects used to take a year or two. Now that SaaS applications can be deployed in a matter of months, that won’t do. Fortunately, APIs themselves are now designed so that the integrations can be done more effectively, more efficiently and with better time to market than ever before. For API integration, there are automated, prebuilt connections that can be applied. Also, automated API integrated features are available in some iPaaS offerings now and coming to others soon.
Google has released a development platform that will make it easier for businesses to deploy virtual agents and other AI technologies in the contact center. The tech giant launched the product in partnership with several leading contact center vendors, including Cisco and Genesys.
The Google Contact Center AI platform includes three main features: virtual agents, AI-powered assistance for human agents and contact center analytics. Google first released a toolkit for building conversational AI bots in November and updated the platform this week, with additional tools for contact centers.
The virtual agents can help resolve common customer inquiries using Google’s natural language processing platform, which recognizes voice and textual inputs. Genesys, for example, demonstrated how the chatbot could help a customer return ill-fitting shoes before passing the phone call to a human agent, who could help the customer order a new pair.
Google’s agent assistance system scans a company’s knowledge bases, such as FAQs and internal documents, to help agents answer customer questions faster. The analytics tool reviews chats and call recordings to identify customer trends, assisting in the training of live agents and the development of virtual agents.
Vendors rush to adopt Google Contact Center AI
Numerous contact center vendors that directly compete with one another sent out strikingly similar press releases on Tuesday about their adoption of Google Contact Center AI. The Google platform is available through partners Cisco, Genesys, Mitel, Five9, RingCentral, Vonage, Twilio, Appian and Upwire.
“I don’t think I’ve ever heard of a launch like this, where almost every player — except Avaya — is announcing something with the same company,” said Jon Arnold, principal analyst of Toronto-based research and analysis firm J Arnold & Associates.
Avaya was noticeably absent from the list of partners. The company spent most of 2017 in bankruptcy court and was previously faulted by critics for failing to pivot to the cloud quickly enough. The company said at a conference earlier this year it was developing AI capabilities internally, said Irwin Lazar, an analyst at Nemertes Research, based in Mokena, Ill.
An Avaya spokesperson said its platforms integrated with a range of AI technologies from vendors, including Google, IBM, Amazon and Nuance. “Avaya does have a strong relationship with Google, and we continue to pursue opportunities for integration on top of what already exists today,” the spokesperson said.
Google made headlines last month with the release of Google Duplex, a conversational AI bot targeting the consumer market. The company demonstrated how the platform could pass as human during short phone conversations with a hair salon and restaurant. Google’s Contact Center AI was built on some of the same infrastructure, but it’s a separate platform, the company said.
“Google has been pretty quiet. They are not a contact center player. But as AI keeps moving along the curve, everyone is trying to figure out what to do with it. And Google is clearly one of the strongest players in AI, as is Amazon,” Arnold said.
Because it relies overwhelmingly on advertising revenue, Google doesn’t need its Contact Center AI to make a profit. Google will be able to use the data that flows through contact centers to improve its AI capabilities. That should help it compete against Amazon, which entered the contact center market last year with the release of Amazon Connect.
The contact center vendors now partnering with Google had already been racing to develop or acquire AI technologies on their own, and some highlighted how their own AI capabilities would complement Google’s offering. Genesys, for example, said its Blended AI platform — which combines chatbots, machine learning and analytics — would use predictive routing to transfer calls between Google-powered chatbots and live agents.
“My sense with AI is that it will be difficult for vendors to develop capabilities on their own, given that few can match the computing power required for advanced AI that vendors like Amazon, Google and Microsoft can bring to the table,” Lazar said.
A data breach at ComplyRight, a firm that provides HR and tax services to businesses, may have affected 662,000 people, according to a state agency. It has also prompted a lawsuit, which was filed in federal court by a person who was notified that their personal data was breached. The lawsuit seeks class-action status.
The ComplyRight data breach included names, addresses, phone numbers, email addresses and Social Security numbers, some of which came from tax and W-2 forms.
ComplyRight’s services include a range of HR products, such as recruitment, time and attendance, as well as an online app for storing essential employee data. This particular attack was directed at its tax-form-preparation website. Hackers go after customer and employee data. The Identity Theft Resource Center 2018 midyear report, for instance, lists every known breach so far this year. It said the compromised data is a shopping list of HR managed data.
Company: No more than 10% of customers affected
The breach occurred between April 20 and May 22, and the company notified affected parties by mail.
ComplyRight, in a posted statement, said “a portion (less than 10%)” of people who have their tax forms prepared on its web platform were affected by a cyberattack, but it did not say how many customers were affected by its breach. The company knows the data was accessed or viewed, but it was unable to determine if the data was downloaded, according to the firm’s statement.
But the state of Wisconsin, which publishes data breach reports, has shed some light on the scale of the impact. It reported the ComplyRight data breach affected 662,000 people — including 12,155 Wisconsin residents. A spokesman for Wisconsin Department of Agriculture, Trade and Consumer Protection said this figure was provided verbally to the state by an attorney for ComplyRight.
Rick Roddis, president of ComplyRight, based in Pompano Beach, Fla., said in an email that the firm won’t be commenting, for now, beyond what it has posted on the site.
Among the steps ComplyRight said it took was the hiring of a third-party security expert who conducted a forensic investigation. The firm is also offering credit-monitoring services to affected parties.
Security expert Nikolai Vargas, who looked at the firm’s statement, said ComplyRight “is doing the bare minimum in terms of transparency and informing their clients of the details of the security incident.”
“In cases of a data breach, it is important to disclose how long the exposure occurred and the scope of the exposure,” said Vargas, who is CTO of Switchfast, an IT consulting and managed service provider based in Chicago. ComplyRight stating that “less than 10%” of individuals were affected “doesn’t really explain how many people were impacted,” he added.
“Technical details are nice to have, but they’re not always necessary and may need to be withheld until protections are put in place,” Vargas said.
Susan Winstead, an Illinois resident, received the notification from ComplyRight on July 17, outlining what happened. She is the plaintiff in the lawsuit filed July 20 in the U.S. District Court for the Northern District of Illinois.
The lawsuit faults ComplyRight for allegedly not properly protecting its data and not immediately notifying affected individuals, and the suit seeks damages for the improper disclosure of personal information, including the time and effort to remediate the data beach.
Company faced difficult detective work
Another independent expert who looked at ComplyRight’s notice, Avani Desai, said the company “followed best practice for incident response.”
With a cyberattack, one of the most difficult processes initially is identifying that there was an actual attack and the true extent of it, said Desai, president of Schellman & Company, a security and privacy compliance assessor in Tampa, Fla. It’s important to ask the following questions early: Was there sensitive information that was involved? Which systems were exploited? The firm quickly hired a third-party forensic group, she noted.
“ComplyRight locked down the system prior to announcing the breach, which is important, because when organizations announce too quickly, we see copycat attacks hit the already vulnerable situation,” Desai said.
Mike Sanchez, chief information security officer of United Data Technologies, an IT technology and services firm in Doral, Fla., said the things the firm did right are “they disabled the platform and performed a forensic investigation to understand the cause of the breach, as well as the breadth of the malicious actor’s actions.”
But Sanchez said the firm’s statement, which he described as a “very high-level summary,” lacked many specifics, including the exact flaw that was used to gain access to the data.
The Identity Theft Resource Center reported that as of the first six months of this year, there were 668 breaches exposing nearly 22.5 million records.
Facebook pitches Workplace as a team collaboration app, but businesses have found the product more useful as an intranet that helps build community across large workforces with many remote and part-time employees.
In recent months, Facebook has stepped up efforts to position its business platform as a competitor to cloud-based collaboration apps like Slack and Microsoft Teams. Recently, for example, the social media company added to Workplace by Facebook third-party business software and made it easier to deploy instant messaging.
But the Workplace users interviewed for this story do not have the platform integrated with many business apps and have not seen widespread adoption of Workplace Chat, the messaging tool.
Instead, most of those Workplace users continue to rely on platforms like Microsoft Skype for Business for unified communications (UC), while using Workplace primarily for companywide announcements and for promoting collaboration across departments.
Facebook arranged interviews with Weight Watchers, Farmers Insurance and the World Wildlife Fund (WWF) for this story. Heineken USA and Rooftop Housing Group, a 200-person nonprofit based in Evesham, England, were contacted independently. More than 30,000 organizations use the Workplace by Facebook app.
Workplace by Facebook app a better intranet
Only 10% of Weight Watchers employees work at a desk in an office. The World Wildlife Fund has 80 offices around the world. Two-thirds of Heineken workers in the United States are based out of regional offices, which they visit once or twice a week.
These organizations turned to the Workplace by Facebook app because it was a mobile-centric platform that most employees would intuitively know how to use based on the popularity of consumer Facebook.
“For someone who only works two hours a week for the company, we wanted them to be able to intuitively get what the platform was, understand how to use it and take to engage in it,” said Stacie Sherer, senior vice president of corporate communications at Weight Watchers.
Similar to consumer Facebook, Workplace lets users like, comment and share posts. Since deploying Workplace, employees engage with company news more frequently and are more likely to post updates about their own team’s work, the users said.
“Whether you’re in the field, or whether you’re working in finance, or whether you’re working in an administrative role, it has allowed [staff] to feel more part of WWF and our work,” said Kate Cooke, head of network communications at the World Wildlife Fund. (The platform is free for nonprofits.)
The tool has increased collaboration among teams and departments that would have otherwise never interacted. Weight Watchers employees based in different parts of the country have discussed best practices for helping clients. Recently, the Armenian branch of WWF posted about a communications campaign that other offices ended up copying.
Business integrations aren’t central to how companies use Workplace
The users, however, do have Workplace integrated with cloud storage apps, such as Box and Google Drive, and web conferencing platforms, such as Zoom, which can be used to live stream meetings and events to Workplace. Those integrations had been available before the May announcement.
Microsoft, Cisco and Slack have marketed their team collaboration apps as hubs for getting work done. Those apps let users, for example, approve expense reports and message with colleagues from the same interface.
The Workplace by Facebook app offers similar functionality, but users are not adopting the app primarily for that reason.
“We really focused it on that engagement perspective to start and really using it as a communication channel,” said Jacqueline Leahy, director of internal corporate communications at Heineken USA. “We have not started to really use it in terms of managing projects.”
Workplace Chat adoption lags
None of the Workplace users rely on the app as their primary instant messaging platform. Most have other UC clients deployed, such as Microsoft Skype for Business, and don’t view Workplace as a replacement for those tools.
At Weight Watchers, for example, the technology and product teams use Slack, integrated with Confluence and Jira, while others in the organization communicate through WhatsApp or text messaging. Sherer said the company was looking into boosting adoption of Workplace Chat.
In fact, Workplace may be inadvertently contributing to a communication channel overload within some organizations. Rooftop Housing Group, for example, now has three or four different ways to instant message, including Workplace Chat, Microsoft Skype for Business and a Mitel softphone client.
“We now need to find organizational defaults,” said John Rockley, the nonprofit’s head of communications and marketing. “Otherwise, we’ve got too many separate channels.”
For businesses with on-premises Exchange mailboxes, Microsoft will facilitate the electronic discovery of Microsoft Teams chats — a feature that should appeal to large enterprises in the process of migrating to the cloud.
Upon request, Microsoft will create cloud-based mailboxes for the sole purpose of storing the Teams chat data of users with on-premises Exchange mailboxes. Those users must have their on-premises identities synced to the cloud in Office 365’s Azure Active Directory.
Organizations that take advantage of the tool will be able to search, preview and export Teams chat data stored in the cloud. That activity could be useful for Microsoft Teams e-discovery cases, compliance reviews or data service requests related to the General Data Protection Regulation.
However, businesses won’t be able to apply Office 365 retention policies to that chat data or place it on hold. In a blog post announcing Microsoft Teams e-discovery for hybrid setups, Microsoft said it would “provide more updates about our plan to address this gap soon.”
Microsoft Teams muddles path to cloud for large enterprises
Microsoft needs to continue to promote hybrid capabilities, such as its new Microsoft Teams e-discovery feature, to help on-premises customers feel comfortable with the transition to the cloud — a process that could take years.
“It’s messy to be in the middle, and I think Microsoft forgets that if you’ve got 100,000 people, you’re going to live in the middle for a long time,” said Kevin Kieller, a partner at consulting firm EnableUC in Oakville, Ont.
Many large enterprises with on-premises Skype for Business deployments had previously been gearing up to transition to the cloud version of that platform, Kieller said. Then, Microsoft introduced Teams last year, significantly complicating the cloud migration path for those businesses.
Microsoft has been steadily rolling out interoperability features between Skype for Business and Teams over the past several months, such as persistent chats and aggregated presence. But almost all of those features require businesses to have their employees registered through Skype for Business Online, the cloud version of the service.
“As far as I’ve seen, there isn’t really a good and easy way to migrate from Skype for Business on-prem to Teams,” said Zeus Kerravala, founder and principal analyst at ZK Research in Westminster, Mass. “It just seems like [Microsoft] didn’t think about it very well.”
The perception that Microsoft Teams lacks the full capabilities of Skype for Business has slowed adoption of the platform, particularly among large enterprises. But even as those features get added, Microsoft faces another hurdle: perception.
It could take months to get the message across that Teams is fully built-out, Kieller said. “Microsoft has a tough time, as everybody does, in terms of discoverability of the right information for somebody that’s contemplating this migration.”
Still, there is no end date in sight for support of Skype for Business on premises. However, while Microsoft plans to release a new on-premises server in 2019, the vendor is expected to keep some of its latest and most advanced collaboration tools as cloud-only offerings.
“It’s almost, by definition, going to be a hybrid mode,” Kieller said. “It’s just another way that I think Microsoft, even for on-prem customers … [is] effectively pushing them, moving them, cajoling them to move to the cloud.”
Businesses will soon be able to join meetings on Google’s web conferencing platform, Google Hangouts Meet, using Microsoft Skype for Business and video conferencing systems from Cisco and Polycom.
At the same time, Google is helping several competing video conferencing vendors better integrate with Google Calendar, so users will be able to schedule and join meetings on those platforms without downloads or plug-ins.
The announcements underscore Google’s commitment to competing with Microsoft Office 365 in the enterprise collaboration market. The consumer tech giant continues to invest in G Suite’s cloud-based applications for web conferencing and team messaging, while also embracing integrations with a wide range of vendors.
“Google has remained a market contender in video conferencing for several years,” said Roopam Jain, an analyst at Frost & Sullivan. “However, its direction in the past was not concerted, and it seemed to be waiting to squarely jump in with an enterprise-ready tool.”
Google is now partnering with startup Pexip to make Google Hangouts Meet interoperable with standards-based video hardware and Skype for Business, starting later this month. Pexip’s code works behind the scenes, so everyone can participate in the same meeting from different interfaces.
Google Hangouts Meet’s incompatibility with third-party communications applications has slowed adoption of the product since its release last year, particularly among businesses already invested in video conferencing products from legacy vendors, Jain said.
“This is a smart move by Google in a very competitive market, where businesses look for a stable and open collaboration platform that they can invest in,” Jain said. It could also convince more existing G Suite customers to start using Google Hangouts Meet, positioning Google “as a viable alternative to any other leading video conferencing solution in the market,” she said.
Google Calendar add-ons for video conferencing
Cisco Webex is working with Google to let customers schedule and join Webex meetings directly from Google Calendar. The vendors Arkadin, GoToMeeting, LogMeIn, Dialpad, RingCentral, Vidyo and Vonage are working on similar add-ons, Google said.
Google will make those add-ons available in the G Suite app store “in the coming months.” It plans to release details for developers so additional web conferencing vendors can sync with Google Calendar in the future.
Google is also expanding its interoperability with Microsoft Exchange, announcing it will make it possible for G Suite users to book rooms, equipment and other resources registered in Exchange.
In a 2018 Nemertes Research survey of more than 600 businesses, 10.5% of respondents cited Hangouts Chat as their primary tool for team collaboration. Google ranked fourth behind Microsoft Teams (32.9%), Cisco Spark (21.1%) and Slack (14.5%).
Google is continuing to improve its collaboration products, but it still needs to integrate them with Gmail better, said Irwin Lazar, an analyst at Nemertes Research, based in Mokena, Ill. For example, users should be able to launch a chat from a Gmail thread.
“They will grow as a threat, while at the same time also integrating with potential competitors,” Lazar said.