Voice, video, email, file sharing, collaboration – organizations need a solid strategy to assure more manageable, cost-effective, and secure enterprise communications. Credit: Retrorocket / Getty Images Communications capabilities are essential to the success of organizations everywhere. Voice, email, text messaging, multimedia messaging, file sharing, streaming video, conferencing, collaboration, and more – you can’t do business without them. But as traffic volumes and the number of communications services in use continue to grow, so do the IT and operational challenges. Communications services have historically been provisioned by, and are of course still widely available from, broadband landline and wireless carriers who seek value-added revenue to offset the commodity nature of their “big dumb pipe” core businesses. But there are also numerous third-party solution suppliers, private implementations, and unified communications (UC) product and service capabilities. In addition, an increasing number of cloud-based services – many of which are often aimed squarely at consumer end-users rather than organizations – are seeing significant organizational application, and unfortunately often via backdoor or shadow-IT routes. This robust array of alternatives has created an organizational communications-services landscape that is both large and complex, with challenges related to cost, reliability, interoperability, compliance, management visibility, and security that absolutely must be addressed. How to build a strategic framework for communications What’s the difference between overall organizational success and results that otherwise fall short? Often the differentiating element is the strategic application of multi-modal, high-availability communications capabilities. But with so many staff members now working remotely or otherwise mobile, and with BYOD (bring your own device) a more-than-significant element in the provisioning of both communications devices and services, it’s critical to understand demand, options, and solutions strategies that can produce the best results in any given case. There are two key elements at work here, as follows: Modalities – Contemporary communications requirements extend well beyond simple voice (primarily telephone), email, and texting to data sharing, collaboration, and increasingly a wide variety of cloud-based services. It’s important to assure that all interaction models – one-to-one (calls and messages), one-to-many (for example, presentations and streaming video), and many-to-many (conferencing and collaboration) – are available and properly supported. Temporal elements – It’s also important to support communications that are temporally uncoupled, meaning that the receiver need not be present during a given transmission (think voicemail, email, and texting). In this case, however, the critical elements are where and how messages are stored and archived and, always, security requirements. These essentials lead to a number of key considerations that every organization must consider, as follows: Policy – An organization-wide, written communications policy is vital, and it should include a definition of permissible communications traffic (for example, entities that can legitimately receive organizational communications; an Acceptable Use policy might also serve here), facilities, monitoring and enforcement mechanisms, support capabilities, required record-keeping (usually of transactions alone, but sometimes of content as well) along with retention mechanisms and durations, with all of these often influenced or even dictated by specific regulatory and compliance requirements. Functional requirements and service set – This includes a definition of required capabilities and specific implementations, whether integrated or consisting of distinct individual services like email and messaging. IT organizations should take the lead in both definition and operations here. Security and integrity – There are few concerns within IT that are greater than the security and integrity of both data and IT infrastructure, including networks, servers, cloud services, and beyond. Many users, however, are not even vaguely aware that email and texting are not at all secure without additional steps being taken, and experience shows that uneducated users will regardless commonly favor expediency over security. While local security policies enumerate specific requirements, building a culture of security is a necessary prerequisite to establishing and maintaining successful communications capabilities. Cost control – As end-users, especially those traveling internationally, could indeed run up big bills on carrier networks if left to their own devices, it’s vital to have communications costs addressed in one’s BYOD policy, as well as having agreements with service providers in place and utilized at the organizational, and not (just) the BYOD level. Management visibility – This is, unfortunately, where our model gets tricky. While it’s easy to obtain sufficient visibility into services purchased or otherwise operated directly by the organization, and similarly easy to limit exposure to costs incurred via BYOD, the major challenge is in detecting and mitigating unauthorized communications, the single largest challenge to productive and secure communications. Unfortunately, the wide variety of communications capabilities available to literally anyone on the Web means that policy and related reinforcement is at present the only option in mitigating this challenge. Enterprise communications options, issues, and considerations Building an appropriate communications solution set, as we noted above, can be very complex. There are two key sets of strategic alternatives here, as follows: Carrier vs. over-the-top (OTT) services – Especially due to the broad adoption of both mobile handsets and BYOD, carrier voice and messaging (SMS/EMS/MMS) services are the default and essentially primary communications vehicles for many if not most users, with carrier gateways enabling at least partial interworking across otherwise distinct networks. Messages here, however, are again beyond the control of organizations, and thus numerous reliability and security challenges are always present. Such can, of course, also be true for the growing array of Web-based OTT solutions available for voice, data sharing, messaging, and even collaboration, including such popular services as Whatsapp, Signal, Facetime, Slack, and many more. It’s important, then, that organizations limit the number of products and/or services permitted for internal communications. At the same time, a consideration of the value of bringing OTT communications services under in-house management must be on the table. Organizational vs. consumer solutions – On the other hand, given the vast array of cost-effective (many even being free) end-user/consumer-centric services, many organizations, especially those not subject to industry-specific regulation, may choose to essentially outsource communications to an (approved-by-IT, of course) select group of services. As always, a careful evaluation of security requirements should be undertaken before this route is selected. Three additional considerations enter into the above decisions, as follows: Supported device universe – Just as is the case with enterprise mobility management, it may be desirable to limit the combinations of mobile devices/operating system versions and revisions supported by IT for internal communications in the interest of bounding operating and support costs. On the other hand, the use of third-party products and services can move this challenge onto the supplier’s plate. End-user preferences – Expect pushback from a portion of the user base no matter what solution set is selected, due to having to learn to use yet another new product or service. Baby Duck Syndrome will always be with us, and internal programs for education, training, and, yes, marketing, will similarly always be essential to success. Regardless, the ease-of-use (and ease-of-support) of any communications solutions is always a vital concern. Integration of/transition from legacy solutions – The degree to which existing solutions should still be supported is an important consideration as well. Migrating to an internal VoIP solution, for example, still requires bridges to the public switched telephone network (PSTN) even as many PSTN services are superseded by more contemporary and beneficial technologies and end-user-visible capabilities inherent in VoIP-based communications. Making enterprise communications manageable As we noted above, having an organization-wide communications policy in concert with both organizational objectives and IT capabilities is a first step, just as is the case with BYOD and security. Solutions must similarly be in concert with this policy, and with no exceptions. Once the communications policy is in place, a solution set can be assembled and aligned with the general framework we introduced above. In general, the process here will follow that which is typically applied to all IT services, including a requirements analysis, service set definition, long and short lists of candidate products and services (and, increasingly rarely, new internal development), and experiential analysis and evaluation via alpha and beta tests. The rollout of the solution must be accompanied by consciousness-raising, education, support, and monitoring for management visibility with respect to both the policy and the solution. Once again, IT must reinforce the importance of using only approved channels and facilities and avoiding difficult-to-impossible-to-monitor out-of-band solutions, including social media. In the big picture, we expect the role played by carriers in communications solutions to decline over time, in favor of Web- and cloud-based OTT solutions. This is a very-long-wave transition to be sure, and essentially remakes communications services as facilities that run over the commodity carrier pipe rather than as value-add from the carriers directly. It is very likely that some carriers will offer their own competitive OTT communications services, but we believe that this will be rare due to the business-plan disruption that results from such a shift. But disruption here is going to occur regardless – we can even foresee the day when purchasers of new wireless handsets will buy only a broadband plan, without voice or messaging services that are today bundled with the device without exception. Decoupling services from the big dumb pipe will also help facilitate the end of cross-carrier, cross-device, and cross-OS conflicts that are still an unfortunate element in communications services today. The future, then, is a world of three-stop shopping: devices, broadband wireless connectivity (both wireless WAN and Wi-Fi), and value-added communications solutions implementing a very broad array of possible alternatives and levels of integration. We should also note that the most important direction here is in the direction of highly-integrated mobile unified communications (MUC) services, which hold the potential to indeed unify all required communications capabilities under a single product/service and management umbrella. For the time being, though, the framework we’ve outlined can help enterprises prepare for the upcoming ultimate merger of IT, networking, and telecoms, and help facilitate the transition to a much more manageable, cost-effective, and productive future for organizational communications overall. Related content how-to Compressing files using the zip command on Linux The zip command lets you compress files to preserve them or back them up, and you can require a password to extract the contents of a zip file. By Sandra Henry-Stocker May 13, 2024 4 mins Linux news High-bandwidth memory nearly sold out until 2026 While it might be tempting to blame Nvidia for the shortage of HBM, it’s not alone in driving high-performance computing and demand for the memory HPC requires. By Andy Patrizio May 13, 2024 3 mins CPUs and Processors High-Performance Computing Data Center opinion NSA, FBI warn of email spoofing threat Email spoofing is acknowledged by experts as a very credible threat. By Sandra Henry-Stocker May 13, 2024 3 mins Linux how-to Download our SASE and SSE enterprise buyer’s guide From the editors of Network World, this enterprise buyer’s guide helps network and security IT staff understand what Secure Access Service Edge (SASE) and Secure Service Edge) SSE can do for their organizations and how to choose the right solut By Neal Weinberg May 13, 2024 1 min SASE Remote Access Security Network Security PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe