This trend is related to the previous one, as the vast majority of (generative) AI solutions for UCaaS and CCaaS are only available through the cloud.
4. Further transition to the cloud
According to Omdia's survey, 80% of respondents have a PBX, which by definition is on-premises telecommunications equipment (i.e., it's a company's "phone system"). These respondents intend to keep their on-premises PBX for a while, but they also indicated their intention to migrate some users to cloud services, according to Kelly.
Thus, the analyst concluded that although there are still many signs of life in the PBX market, vendors are encouraging their customers to implement UCaaS solutions for two main reasons:
In the long term, vendors will earn more revenue than they would by selling perpetual licenses for on-premises systems. Increasing annual recurring revenue (ARR) can help the company's stock valuation.
Innovation in the cloud is easier and allows the provider to singapore mobile database new features that can be immediately available to all users (or added to a higher price tier, etc.). One example of such innovation is the integration of generative AI features.
Hybrid/remote/mobile workers also benefit from having seamless access to their communications and collaboration tools no matter where they are. These tools are kept up to date and secure because the company’s IT staff can centrally manage cloud data and applications.
Additionally, it is easy to increase or decrease the number of licenses based on employee needs. Note that this can also help an organization reduce operational costs if it strictly monitors license usage.
In 2023, the combination of remote work, VoIP, and unified communications services has become a major target for hackers. Of course, we are talking about UCaaS services and applications.
There are a variety of common attacks on VoIP services that are used to compromise corporate communications, including volumetric attacks, DDoS attacks, small packet attacks, and more. Organizations need to be aware of these and other attacks and exercise due diligence to ensure that their UCaaS provider has protections in place to combat them. If the provider does not, the enterprise should take the necessary steps to strengthen its defenses and mitigate these threats.
Pay Attention to UCaaS Security Threats
-
- Posts: 702
- Joined: Mon Dec 23, 2024 3:15 am