Saturday, 1 June 2019

MUD is officially approved by IETF as an Internet Standard, and Cisco is launching MUD1.0 to protect your IoT devices

With over 8 billion “things” being connected today, IoT security has undoubtedly evolved from a mysterious buzzword to one of the biggest real threats to our network today. According to Gartner, over 51% of survey respondents believe that cybersecurity is the number one technology-related challenge for IoT deployment.

Overwhelmed by the countless number of IoT security comments and stories, let’s try to demystify this seemingly complex concept. To begin, let me ask you three simple questions: What types of IoT devices are connected to your network? What behaviors are appropriate for these IoT devices? Is there an industry standard to follow while connecting these IoT devices? If you don’t know the answers to these questions yet, that’s when we say the IoT security risks are probably right around the corner staring at you.

What is MUD?


To answer the above three questions, Cisco has been working on a solution known as Manufacturer Usage Description (MUD) to arm IoT security with you.

The key idea of MUD is to facilitate device visibility and segmentation by allowing your network administrators to effortlessly identify the type of IoT device and define the corresponding appropriate behaviors for that device. To do this accurately, we are introducing a participant to the conversation: the manufacturer. IoT manufacturers are able to disclose to us what their devices are, and what network policies they need for the devices to correctly function.  This whitelist statement is something that customers can use to deploy access policies in their own networks without any guesswork.

As shown in Figure 1, an IoT device first sends out a pre-embedded MUD-URL to the network devices (e.g. switch & AAA server), through which the MUD-URL will be received by the MUD controller (software). According to the specific MUD-URL, a matching MUD file will be provided from the MUD file server and translated into policy format through the MUD controller, to then enforce the access control list to the device.

Cisco Study Materials, Cisco Certifications, Cisco Learning, Cisco Guides

Clear benefits to both customers and device manufacturers brought by MUD


If you get the overall idea of MUD so far, you may see that IoT device manufacturers and customers are two key stakeholders in the MUD ecosystem. MUD offers distinct benefits for customers and manufactures:

Benefits to customers:

◈ Automate IoT device type identification thus reducing operational costs

◈ Simplify and scale IoT device access management by automating policy enforcement process

◈ Reduce threat surface of exploding number of IoT devices by regulating traffic and thus avoiding lateral infections

◈ Secure enterprise network through standard-based approach

Benefits to manufacturers:

◈ Improve customer satisfaction and adoption due to reduced operational costs and security risks

◈ Enhance device security through standard-based onboarding procedure

◈ Differentiate device offerings with embedded network-based device security feature

◈ Reduce product support costs to customers by following an easy-to-implement process

In addition to these benefits, we’ve received positive feedback from our partners:

“MUD technology is valuable for Innovative Lighting. MUD technology will enhance our commissioning process by identifying our devices on the network. Furthermore, MUD technology will provide the appropriate access control policy promoting a more secure system. We look forward to working more with Cisco and the MUD technology.”

-Harry Aller, CTO at Innovative Lighting

 “MUD was selected to protect Molex IoT solution against malicious parties. MUD is a relatively simple solution to implement at the device level, light on constrained IoT devices but takes advantage of strong network infrastructure including network switches and authorization server. Our goal to reduce exposure footprint and the overall solution allows us to provide a level of security to our customers that is scalable and flexible at the same time. The ability to whitelist specific devices in the field allows us to lock down the network but also to respond quickly to events that may take place post deployment.”

-Mo Alhroub, Manager of Software Engineering at Molex

MUD is approved as an Internet Standard and released as RFC8520 by IETF


I am delighted to announce that MUD has been officially approved as an Internet Standard by the Internet Engineering Task Force (IETF) and is now released as RFC 8520. Meanwhile, MUD is also part of the NIST Mitigating IoT-Based DDoS project, and an optional component of the Open Connectivity Foundation’s framework now.

MUD 1.0 is ready


Besides the IETF approval, I am also thrilled to announce that we are launching MUD1.0, the first phase of the entire MUD solution. While MUD itself is an open standard, Cisco is pioneering our unique version by leveraging Cisco switch and ISE (Identity Service Engine, a AAA server) as the network devices shown in Figure 1.

In this Cisco MUD1.0 release, we focus on providing device visibility by enabling the IoT device identification inside the enterprise network. As shown in Figure 2, the IoT device sends out the MUD-URL to the switch and then passes it to ISE. The administrators will see the device specific information on ISE UI including the device model, manufacturer, etc. Specifically, MUD1.0 supports profiling IoT devices, creating profiling policies dynamically, and automating the entire process of creating policies and Endpoint Identity Groups. Furthermore, administrators can leverage these profiling policies to create Authorization Policies and Profiles manually for securely on-boarding IoT devices.

Cisco Study Materials, Cisco Certifications, Cisco Learning, Cisco Guides

To make the sophisticated story simple, through MUD1.0, you would know exactly what devices are coming to your network the minute they are connected. Even more, you can define policies for these IoT devices. Isn’t that amazing?!

With MUD1.0 released, future releases will more fully automate the policy control part. On top of MUD1.0 when ISE receives the MUD-URL to extract the visibility information, the MUD-URL will be passed to the MUD controller (software) which will then go out to the MUD server to get the MUD file and translate the content into policy (as shown in Figure 1). The network devices will then enforce the appropriate policy onto the devices. The whole process will be fully automated. Want more flexibility as well? No worries, we’ve got you covered! Before the automation process, you get the choice to edit the recommended policy as needed.

Friday, 31 May 2019

Data Evangelism: Oxymoron, Fluff, or Business Driver?

At first pass, data evangelism may sound more like an oxymoron than a corporate function. Most of us (and our dictionaries) associate evangelism with faith, while data & analytics is core to the scientific method. Evangelism is predominantly qualitative while data & analytics is the definition of quantitative.

In practice, data evangelism has become synonymous with spreading the good word of data.  Need to inspire your team to balance their gut-based approach to problem solving with data-driven insights? Call in a Data Evangelist.

However, if we delve beneath the surface, data + evangelism reveals a richer value proposition. Evangelism teaches us to practice what we preach. Lead by example. Be the change we want to see in the world. Data & analytics teaches us to measure what matters. Hypothesize, test, minimize our biases, refine, and always let our data be our guide.

-----------------------------------------------------------------------------------------------------------------------
If we marry the tenets of data + evangelism, the result is:  Practicing the data & analytical methods we preach. Leading others to leverage data as an asset via a data-driven approach. Challenge ourselves as data evangelists to be at the forefront of data-driven models and insights, especially in the most qualitative domains.
----------------------------------------------------------------------------------------------------------------------

Data Evangelism Needs a Model


In data science, once you understand the data and its significance to the business, the next step is to create, stress test and refine a model which presents a simplified version of the business problem or opportunity you’re seeking to address. This model is a first attempt to explain the workforce’s relationship to data and provide actionable insights into creating (or maintaining) a data-driven enterprise.

Cisco Certifications, Cisco Guides, Cisco Learning, Cisco Tutorials and Materials

The Axes:


◈ Data IQ — The level to which a person is capable of leveraging data & analytics relative on his or her role and goal. For example, a food coordinator who is data literate and comfortable using a simple forecasting model will have a high Data IQ. If, however, s/he wants to lead an engineering team responsible for a machine learning-based technology, a Master’s or PhD in AI will be the new standard for a high Data IQ.

◈ Data Enablement — The level to which a person is enabled (or unable) to leverage data & analytics relative to his or her role and goal. For example, a people manager in HR may be fully Data Enabled via: data literacy, foundational data science for leaders, a dashboard which provides him/her the relevant people analytics and insights about their team, access to data & analytical talent on a project-by-project basis, and a steady stream of curated content including training, best practice sharing, and success stories. However, someone managing a data science team would need all of that and much more, including tools and platforms which allow for reusable asset (i.e. models and code) sharing, to be Data Enabled.

The Quadrants:


◈ Enthusiasts — Low Data IQ; Data Enabled: Well connected to their data & analytics community, fluent in its success stories but unsure how to begin leveraging data. Example: A marketing new hire with a degree in literature who marvels at chatbots.

◈ Data Illiterate — Low Data IQ; Data Unable: Lack of understanding regarding the value of leveraging data & analytics as well as how to do so. Example: An experienced technical writer who leans into his/her qualitative strengths.

◈ Siloed High Performers — High Data IQ; Data Unable: Limited by their isolation. Typically start from scratch instead of having a library of assets at their fingertips and peers with whom to collaborate. Example: a data scientist working on a non-data science team without access to mentorship, peers, enterprise tools, platforms and data products/services.

◈ Data-Driven — High Data IQ; Data Enabled: Individuals have the platforms, infrastructure, tools, services, and knowledge to leverage data & analytics in their role. Connections into the larger community provide them with a constant stream of ideas, best practices, and opportunities to collaborate as well as share their work. This is the target state.

-----------------------------------------------------------------------------------------------------------------------
Data-driven workforces, whose employees have High Data IQs and are Data Enabled, power the most digitally disruptive companies in the world.

Should we start looking to data evangelism as a business driver?
-----------------------------------------------------------------------------------------------------------------------

Data-Driven by an Evangelism Engine


Cisco Certifications, Cisco Guides, Cisco Learning, Cisco Tutorials and Materials
How does this play out? Let’s say a Customer Success Executive leverages data that is 22% more accurate than previously possible to enable 96% adoption of the collaboration tools his/her customer purchased. The customer wins by realizing a high ROI; Because the customer wins, the Customer Success Executive wins. Evangelism’s “win” is in enabling the person or team behind the 22% increase in data accuracy and the Customer Success Executive to leverage said data to achieve (and know s/he achieved) 96% adoption.

Our Approach

Our efforts to influence Data IQs take the form of a multi-pronged (and evolving) strategy of recruiting, learning & development, and continuous education.

We approach Data Enablement more broadly. Success in this domain doesn’t just take a village, but rather the support of the entire Data & Analytics business unit in addition to strong cross-functional partnerships. Data Enablement encompasses building, buying, supporting and/or co-creating the data products and services needed to enable each role- as well as those products’ and services’ adoption.

While far from an exhaustive list, Data Enablement includes global virtual and live events, Kaggle-style data science competitions, collaboration platforms for technical and non-technical best (and worst) practice sharing, an enterprise data science platform with reusable asset libraries, and democratized trustworthy datasets… and as data & analytics (and data evangelism) matures, who knows?

Thursday, 30 May 2019

Cisco Demonstrates 20W+ Power Dissipation of QSFP-DD at OFC 2019

At OFC 2019 in San Diego, CA, Cisco demonstrated the thermal management capability of the QSFP-DD pluggable module form factor for 400G applications. The demonstration showed that QSFP-DD can dissipate the heat generated by a transceiver that draws more than 20 watts of power. This will be required for extended reach applications that use advanced optical modulation schemes such as coherent transmission. Host platforms with QSFP-DD ports can therefore support pluggable coherent modules needed for DCI (Data Center Interconnect) and WDM (Wavelength Division Multiplexed) networks.

This is a key point because data centers are often deployed in regions where they may be several tens of kilometers apart. To link them together, data center operators would typically use transponders, which connect to a switch or router and transport the data streams to another data center over relatively long distances with a coherent optical link. However, if coherent modules such as 400G-ZR and 400G-ZR+ modules could be plugged directly in to a switch or router, it would eliminate the need for the additional connection and space for a transponder.

With advances in optical integration and CMOS DSP technology, Cisco expects pluggable coherent modules that support the OIF 400G-ZR specification to begin entering the market in the next 12 to 18 months. These new transceivers may draw 15-20W. By demonstrating 20W capability, we show that Cisco 400G QSFP-DD based platforms will be coherent-ready when those modules are available.

Cisco Certifications, Cisco Guides, Cisco Learning, Cisco Tutorials and Materials
Figure 1: QSFP-DD >20W Demo at OFC 2019 with Nexus 3432D-S Ethernet Switch and Thermal Modules

The demo included the recently announced Cisco Nexus 3432D-S ethernet switch. This Nexus 3k switch is a 1RU fixed-port switch with 32 QSFP-DD ports providing data centers with industry-leading performance-per-watt power efficiency at low latency, offering leading analytics.

This switch provides an extreme case environment from a power dissipation perspective, which makes it ideal for demonstration purposes. It was loaded with 8 thermal modules dissipating a total of 174W clustered together in adjacent ports.

The thermal modules were provided by MultiLane and were specifically designed for this demo. These are not functional transceivers, but rather QSFP-DD mechanical housings with heat sources inside. Each module has a series of heaters distribute across its top and bottom, positioned to emulate the thermal profile of real modules with the temperature measurement point over the hot spot of the module, as typically specified.

Cisco Certifications, Cisco Guides, Cisco Learning, Cisco Tutorials and Materials
Figure 2: QSFP-DD Module with External Heatsink inserted in to Cage

To accommodate more than 20W, the modules were modified with an additional heatsink on the portion of the module that extends beyond the front panel. This additional material resides within the current envelope of the Type 2 MSA module dimensions of QSFP-DD (see Figure 2).

The chart below shows a plot of the eight modules in the demo and how the hottest module might be expected to perform over the operating temperature range of the Nexus 3432 switch. The demonstration showed that the 8 modules in adjacent ports were dissipating more than 21W each.

Cisco Certifications, Cisco Guides, Cisco Learning, Cisco Tutorials and Materials

At the show floor booth’s ambient temperature of 21C, the case temperatures of the modules ranged from 33C to 44C. This is shown by the colored dots at the 21C vertical axis, and corresponds to a rise in case temperature ranging from 12C to 23C  and averaging 18.6C. This means that if the switch were operating in its maximum operating temperature environment of 40C, the case temperature of the hottest module would rise to 63C (rightmost end of the green line). That provides plenty of margin for the typical commercial maximum case temperature of 70C.

In summary, this demonstration shows that the QSFP-DD form factor is easily capable of managing high power dissipation required for coherent transmission in platforms that will be shipping later this year. From copper to coherent, along with backward compatibility with prior generation of QSFP modules, QSFP-DD provides customers maximum flexibility to address the migration to the next step in networking.

Tuesday, 28 May 2019

Demystifying Artificial Intelligence’s Role in Contact Centers

AI is shaping the future of customer experiences and the contact center.

Artificial Intelligence, Cisco Study Materials, Cisco Guides, Cisco Learning, Cisco Certifications

Artificial Intelligence (AI) is creating a lot of excitement and there are good reasons for this. According to Forbes, 50% of IT professionals believe artificial intelligence and machine learning are playing a role in cloud computing adoption, growing to 67% by 2020. This week I will be speaking at UC Expo about the role that artificial intelligence is playing in advancing contact center productivity and efficiency, and in particular how this is benefiting the agent and customer experience.

With all the news around AI, it’s easy to get lost in the hype versus reality. I’d like to demystify some of this and share my view of the five most common myths I’m hearing about as I travel the world talking to colleagues, partners, and customers.

Five myths:

◈ AI is new
◈ AI = chatbots
◈ AI can replace all your people
◈ AI is all about automation
◈ AI will reduce call volume

1. AI is new


The concept of Artificial Intelligence (AI) has actually been around for a long time. In 1950, the English mathematician and computer scientist, Alan Turing documented his ideas for testing a thinking machine. Turing’s test theory suggested that if a machine was able to communicate in full conversation via a teleprinter without any detectable differences from a human, the machine could be deemed “thinking.”

Contact centers have been using AI in some form or another for decades. We just didn’t call it AI. Even with basic automatic call distribution (ACD) technology it was possible to filter and route calls to the right agent at the right time using an algorithm to determine the best agent. AI at its core is a series of fast predictions, and contact centers have been using predictive algorithms since the early 1990s. AI continues to show up in new places and make a major impact in revolutionizing contact centers and customer service.

2. AI = chat bots


Chat bots have become mainstream in contact centers and are just one of the ways in which AI is used to optimize agent workload and enhance customer self-service. Bots are being used for everything from qualifying customer requests, to booking hotels, and providing shopping assistance. Bots helps answer questions and direct your customers to the appropriate person with the best skills and experience. Our Customer Virtual Assistant provides a highly effective way of offloading simple, mundane, and repetitive requests from your agents, allowing them to spend higher quality time helping customers on more complex requests. This results in providing faster self-service to customers, while improving agent optimization, productivity and costs. While chat bots utilize AI, there are many other forms that AI takes in contact center operations beyond chat bots – including routing schemes, forecasting, deeply inspecting customer interactions – and more. Cisco’s Customer Journey Analyzer, for example is a cloud based solution that allows companies to gather data from multiple sources to draw correlations between operational and business data to improve customer experience.

3. AI can replace all your people


This is probably the most misunderstood belief about AI and one that grabs the attention of senior executives when they’re looking for ways to cut costs. AI promises benefits far beyond just cost savings, and has the potential to help and improve how your employees work, rather than replace them. AI will certainly change workloads, staffing and processes that may lead to reduced staffing, but a primary advantage is that it augments agents to make them more scalable and efficient. Take the example of a chat bot. When the bot detects that the interaction needs to be escalated to a human agent, it brings along with it the history of the conversation to enable a seamless transition from self-service chat to assisted chat. The agent can then very quickly and effortlessly take over the interaction with everything they need displayed right in front of them. In this regards, AI is an enabler for better live agent assistance, not a replacement of it.

4. AI is all about automation


Business process automation is a key benefit of AI in the contact center because it increases agent efficiencies and workflows, however it is better to think of it in terms of agent augmentation as much as automation. Many people still want to engage with a human, so as you take advantage of automation in your contact center, make sure your customers can still reach a person when one is needed. According to a study by PwC, only 3% of U.S. consumers want their experiences to be completely automated. In addition, automation of customer processes inevitably leads to exceptions that cannot be addressed by AI, and need human assistance. These exceptions are often make-or-break moments in a customer relationship.

The automated process should learn from the data that you have spread across a multitude of systems, and from human interactions so that those experiences are improved resulting in better service to your customers. Understanding and analyzing that data can tell you so much about how your customers are experiencing your brand, so that actions can be taken to make their journey better. A great example of this is our new Cisco Answers intelligent agent which is powered by Google Contact Center AI. Cisco Answers listens to customers conversations in real-time, and proactively presents intelligent suggestions, documents, and other key forms of enterprise knowledge to the agent desktop, while the agent is interacting with a customer. This empowers agents with the needed context and information they need to deliver faster, more personalized and proactive care.

5. AI will reduce call volume


This is another misconception – AI may reduce call volumes via automation – but it’s likely that the calls that do make it to live agent assistance (the exceptions) will be longer and more complex in nature. This could mean that the same amount of staff are handling less, but longer calls. AI enables more accurate decisions and routing so that many customer interactions can be handled without a human agent. It has the ability to classify information and make predictions faster and at higher volumes than humans can accomplish on their own. As an example, in an omni-channel contact center, customers can be routed much more quickly and efficiently to the right resource that can add the most value to the experience based on the channel (e.g. email, phone, chat) the customer is using. According to PwC, 46% of all consumers will abandon a brand if the employees are not knowledgeable. This will require contact centers to redefine how they do agent staffing and how they measure call volume and call success.

So where do we go from here?


While AI for contact centers isn’t necessarily “new”, advancements in algorithms and the ability to apply them in real-time to massive amounts of data being created from contact center operations is. This combination opens up exciting new possibilities for companies to break free of constraints to address issues that have been challenging contact centers for decades. These include contextual routing real-time work to agent attributes, more precisely forecasting agent schedules, and higher degrees of customer personalization. As more and more data accumulates, processor speeds increase unabated, and algorithms march forward, AI will have a larger and larger role in making contact centers more efficient and effective.

Sunday, 26 May 2019

Cybersecurity Roles and Responsibilities: Private Sector Perspective

I had the pleasure of briefing members of the U.S. Senate’s Homeland Security and Government Affairs Committee to provide Cisco’s perspective on the roles for the private sector and government in protecting the nation’s digital infrastructure. I focused my remarks on a much-publicized recent cybersecurity attack since it’s a great example of how the public and private sectors can and should work together.

Cybersecurity, Security, Cisco Study Materials, Cisco Learning, Cisco Tutorials and Materials

The important lessons we can draw from this recent attack are that:

1. Government and industry  both have distinct, but important, roles to play in preparing for and responding to cyber-attacks;

2. Effective communication between our roles is essential; and

3. We all need to maintain vigilance because the attackers never sleep and their sophistication is only limited by software and imagination.

Last month, Cisco’s Talos threat intelligence team made headlines globally publishing a report on a state-sponsored attack dubbed “Sea Turtle.” This attack, which was impossible to detect, enabled the theft of login credentials and other sensitive data. It was so successful, like many other attacks, because we continue to rely on passwords, which users frequently reuse.

The response to the Sea Turtle attack demonstrated the power of the public-private partnership so central to cybersecurity in our country. First, it was a positive development that the private sector was able to quickly detect both attacks and raise awareness. Second, the US government set a positive example by issuing a Binding Operational Directive to federal agencies, and providing concrete, usable advice to the general public about the importance of MFA.

Today, MFA can frustrate attempts by hackers to reuse stolen passwords. Longer term, we need to pivot away from a reliance on these passwords and build a more “zero trust” environment that will continuously authenticate users and devices. Fortunately, MFA is again part of this longer-term approach.

This attack and many others exploits trust in ways that we should all view as highly troubling, but can be prevented through wider use of technologies, such as multifactor authentication. I’m a student of history and I know how powerful the public/private partnerships can be to drive innovation. It’s how the Internet was created and it’s certainly how it can be protected. Effective communication between the private and public sector can also drive actionable information to the public in time for harms to be mitigated while we develop longer term solutions, together, to the problem of ongoing cyber threats.

Saturday, 25 May 2019

Five Game-Changers for Mid-Market Businesses That Boldly Move to Cloud Calling

ISG report claims that moving to cloud operations saves companies an average of 38%1

As a mid-market business leader, one of the most important decisions you make is your approach to digital transformation. A critical part of any digital transformation strategy is the use of cloud technology; particularly cloud communications and collaboration. New cloud delivery of advanced, cognitive collaboration technologies offers the freedom to provide a first-class service experience to customers anywhere on the planet, with rapid, low risk deployment, low up-front costs, and a tightly integrated cloud application workflow model. This can mean the difference between being the agent of change in your industry and watching the market pass you by.

The State of the Cloud Calling Market


Globally, the mid-market cloud PBX segment is just starting to pick up momentum, with analysts projecting a 24% global segment CAGR of 24% through 2022, to build on a low current market penetration level estimated at 12%. See Figure 1.

Figure 1 – Cloud Calling Market Penetration and Growth Rates by Segment

Cisco Study Materials, Cisco Certifications, Cisco Tutorials and Materials

New cloud options, like Cisco Webex Calling, are adding the scalability, reliability and security, along with a more sophisticated collaboration feature set that mid-market business requires. The cloud is better able to economically address the multi-site, contact center and mobile connectivity shortcomings of the on-premises options available to mid-market organizations. Equally important is the ability to support a cloud migration strategy that offers seamless operation throughout the time a business requires use of a mixed cloud/on-premises model. Because most mid-market businesses are not ready to go all-in on the cloud in one step, support for a common dial plan, administration and directory model through this transition period is an essential check point to starting a successful cloud migration.

The Performance Gap Between Leaders and Laggards


The urgency for business to take action now comes down to the performance gap between digital transformation leaders and laggards. Digital transformation can dramatically lower costs, enhance agility and enables mid-market organizations to implement technologies and tools that were once only available to large enterprises. Well executed, these strategies are game changers for the mid-market organization. A Harvard Business School study2 published by Professors Marco Iansiti and Karim Lakhani demonstrated the gap between the top 25% “Digital Leaders” and the bottom 25% “Digital Laggards.” Figure 2 shows a gross margin difference of 18% between the leaders and laggards, and concludes, “Digital Transformation has become the new normal.”

Figure 2 – The digital divide between digital leaders and laggards

Cisco Study Materials, Cisco Certifications, Cisco Tutorials and Materials

Five reasons to implement digital collaboration transformation strategies (Figure 3)


1. Gain large enterprise capabilities without the cost and complexity– Historically, mid-market organizations have been at a disadvantage to larger organizations, due to the high capital cost of implementing sophisticated, complex and expensive IT applications, technologies and infrastructures. Cloud calling, collaboration and contact centers change all these by making advanced tools affordable to the mid-market for the first time.

2. Enhance business agility and reduce operational cost and complexity– Cloud calling, and collaboration allows organizations to seamlessly scale users and sites up or down quickly and predictably, with one global solution that can be centrally managed. Precious capital investments are preserved for more strategic business initiatives while operating budgets become more transparent and predictable, without the headaches of managing surprise PBX upgrades and maintenance. And both management and workforce productivity are vastly improved through the use of always-current and accessible cloud collaboration services.

3. Increase workforce mobility, productivity and satisfaction – A key issue for today’s multi-site enterprise and mobile workforce is the complexity and expense in deploying, managing, keeping up-to-date and networking multiple on-premises systems that typically range from new to decades old. Millennial and Gen Z employees expect advanced collaboration tools in the workplace – the same tools that they use in their private lives – and these have a dramatic impact in both recruitment and retention. They expect a seamless, global and feature rich collaboration experience across any device, network or channel –calling, messaging, team collaboration, video, etc.

4. Strengthen customer journeys and relationships– Most mid-market enterprises must deliver an omni-channel – voice, chat, video, IVR, natural language, bot – customer support experience in their contact centers, inbound/outbound sales and service operations. For many businesses, these solutions are mission critical to their customer relationships and business success. Prior to the cloud, sophisticated contact center solutions that went beyond basic routing and reporting were very expensive and difficult to manage and keep current. The cloud makes the most advanced contact center technologies accessible for businesses of all sizes without the capital investment and operational complexity.

5. Improve business performance and competitiveness– As the Harvard Business School study demonstrates, organization’s financial performance and business outcomes are vastly improved through strategic digital transformation. Successful transformation projects focus on cost reductions, process improvements, adding organizational agility to respond rapidly to changing environments, and one-to-one, team and customer collaboration.

Up until now, the mid-market segment has been slower to implement cloud collaboration transformation strategies, due to the complexity of their transformation journeys and the lack of maturity in cloud solutions. That limit no longer exists. Webex Calling now allows mid-market customers to replace their PBXs and deploy cloud calling and collaboration with confidence, with a proven enterprise platform that is already serving 29 million business users worldwide. Are you ready to take the next step?

Talk to Cisco.

Figure 3 – Five reasons mid-market organizations must implement cognitive collaboration transformations

Cisco Study Materials, Cisco Certifications, Cisco Tutorials and Materials

Thursday, 23 May 2019

What Your Collaboration Strategy Is Missing

Cisco Certifications, Cisco Study Materials, Cisco Guides, Cisco Tutorials and Materials

Why your new collaboration technology isn’t catching on as you expected


When organizations want to update their collaboration technologies, IT departments spend weeks, sometimes months, focusing on the right products that will help their company meet their goals. They rigorously check requirements, ensure all the right specs are in place, and carefully configure the new technology before making it available to end users. Everything goes as planned. Yet three months in, management is wondering why no one is using the new technology. Sound familiar?

Most new collaboration investments fail to reach their full potential not because of the technology itself but rather because of how it’s introduced to its end users. People often don’t like change, even if it’s for their own benefit. So, when a new technology is introduced, people tend to stick with what they know and what they are comfortable with. They also might not want to learn new things and can be hard to convince. Or they might not feel compelled to use the new technology if they don’t see their colleagues using it as well.

All these reactions are normal. But the good news is, there are several things you can do to help your teams in the process:

◈ First, make sure to involve executives early in using the new technology. Set up some time with them to have them interact with the technology. And lastly, walk them through some best practices so they feel more comfortable using and promoting it.

◈ Second, focus on raising awareness throughout the organization via marketing and communication. Good ideas include:

     ◈ Posters in hallways (clearly visible to support organizational change)
     ◈ Internal forums to help answer questions
     ◈ How-to videos that help users get acquainted or that helps solve basic issues
     ◈ Quick reference guides and recorded trainings that help answer “What’s in it for me?
     ◈ Language specific material so people can learn best in their native language

◈ Finally, set up some hands-on training options before the rollout and some support desks afterwards to ensure users that they can have any questions they have answered.

Cisco Certifications, Cisco Study Materials, Cisco Guides, Cisco Tutorials and Materials
Infographics and engaging posters that match your company’s colors and brand guidelines, such as the images above, are two good ways raise awareness throughout your organization.

Learning to how facilitate a change management approach for your organization is no easy task. However, it is a crucial element to establishing buy-in and usage for your new collaboration technology. The question is, are you willing to champion these kinds of actions for your organization?

Help is here if you need it


If you’re unsure about committing yourself to the extra work, there are other ways you can ensure your organization adapts properly to a new technology change. Cisco offers many different options that could potentially aid you in finding the perfect fit – from basic insights to expert advice and assistance.

One of the most common, initial customer introductions is from Cisco’s Customer Success (CS) team. Here, Customer Success managers help guide you to understand your technology further, based on agreed upon capabilities, licenses, features, services, and bundles. They also help monitor your adoption progress and better measure the impact to your organization.

Another available option is Cisco’s User Solution Empowerment (USE) Adoption services. USE is another, yet less familiar, alternative that can help your employees adopt collaboration technologies with greater speed and effectiveness through a change management approach. With access to customized processes, materials, and techniques from Prosci Certified Change Management Professionals, you can directly influence and improve:

◈ User behavior
◈ Product and technology use
◈ Organizational adoption
◈ Business processes and workflows

Cisco Certifications, Cisco Study Materials, Cisco Guides, Cisco Tutorials and Materials
Simply introducing a collaboration technology to someone and getting their feedback on how you can help raise awareness is a great way to lower anxiety among those who are unsure about a new technology change.

One of the main differences between CS and USE is that CS is usually complimentary to new customers whereas USE is an add-on service that requires an additional investment. To help articulate the difference easier, let’s look at a quick example of a USE engagement.

A major retail banking customer was experiencing lower-than-expected usage in its Webex Meetings solution. Consequently, it invested in USE Adoption services to better train, educate, and encourage end users to collaborate easily through the technology.

The USE team ended up creating a global training strategy that included:

◈ A detailed marketing & communications plan to create awareness through: 
   
     ◈ Executive sponsorship and communication
     ◈ Digital signage on the company website
     ◈ Company-branded posters throughout hallways and elevators

◈ 25 instructor-led sessions tailored specifically at helping event managers, help desk trainers, and administrative professionals best use Webex Meetings

◈ Multiple training recordings for all users, so users can access learning material at any time

◈ Custom educational reference guides created in four languages (English, Portuguese, Spanish, and French), so users could maximize their learning by understanding best practices in their native language

Through this material, the company was able to reach thousands of employees over seven months. By providing the necessary resources to help them use the technology more, over 1800 users were trained during that span. Additionally, the company saw a 12-times increase in the number of registered Webex Meetings and active hosts conducting meetings.

What to do next?


As shown above, one of the most fundamental elements of successful adoption is a good change management approach. A proper one includes influential factors such as executive sponsorship, live training, user segmentation, and awareness throughout the organization. Each has its own specific purpose in influencing change, whether it be awareness, social proof, or even physical usage.

Cisco Certifications, Cisco Study Materials, Cisco Guides, Cisco Tutorials and Materials
Think of ways you can approach executives to get their buy-in. Coffee breaks, for instance, might be an effective method for those who are busy and constantly on-the-go.

If you’re considering improving your adoption rate on your own, consider how you can broaden your approach beyond simple recordings and PDFs. Who has access to influence upper management? Who’s a good teacher and can volunteer to lead hour-long classes? Who can start a forum on the topic to answer questions and spark conversations? Who’s good at marketing?  Think through creative ways you can get your teams involved because without them, users can feel “left on their own” and even frustrated with the new technology. Or they might not understand how important it is to use.