Cloud unified communications adoption still faces barriers
Upgrade costs and security concerns were once the main barriers to cloud unified communications. But while vendors addressed those concerns, new barriers to adoption have emerged.
Cloud-based unified communications, or UCaaS, offers companies large and small unprecedented functionality with almost zero hardware investment. So why isn't every company racing to convert to the cloud? Technical and cultural issues and even company politics could be barriers to adoption -- or at least slowing it. Let's explore a few possible reasons.
Cloud, but which cloud?
For many prospective customers, the decision to move to cloud unified communications is easy, but immediately gets complicated by the question "which cloud?" When we say cloud, we typically mean a public cloud, but other options exist. A company can build a private cloud instead. This option provides better control over security -- a common early concern about cloud UC -- but will cost more since the resources are not shared. Organizations can also choose from several hybrid options where UC deployments can use both private and public cloud, or combine some on-premises equipment with cloud-based gear.
While some vendors like Avaya can provide cloud UC in any of these combinations, others may only support one approach. In such cases, deciding which architecture and implementation to choose can slow down a move to cloud unified communications.
Cost and loss of ownership
One of the early benefits companies saw in UCaaS was the ability to replace costly and often complex gear with gear-free, per-user pricing. That is both good and bad.
In the past, telephony and UC gear had a long life span, and after the initial Capex, UC infrastructure had relatively small Opex consisting of software maintenance and in-house tech support for configuration and upgrades. With cloud, the Capex and on-premises support requirements go away, but the usage payments never do. Vendors are all for the monthly subscription model, but customers can do little when locked into a vendor contract and costs keep creeping up. Some organizations may be reluctant to go all the way into cloud unified communications and lose ownership and control of their deployment.
Company politics
Existing UC deployments consisting of telephony, messaging and video can be expensive and require a lot of in-house tech attention. The IT manager who owns the technology in a UC deployment might not be happy to see the related Capex budget disappear, along with the staff responsible for in-house UC getting assigned elsewhere in the company. Many managers are happy to expand their kingdoms but less enamoured of shrinking them. So be aware of politics and consider how to make the shift a win-win.
Feature integration
Feature integration and presenting a simple and seamless platform is important to organizations, according to a report from UCaaS provider Fuze, based on surveys of IT leaders and knowledge workers. The UCaaS market has seen a flurry of consolidation as vendors have made acquisitions and formed partnerships in order to be able to provide the full range of UC functions. In the beginning, it's likely these acquired or partnered functions are not integrated as intuitively as users would like them to be. You should identify what UC functions your employees will be using initially and make sure your prospective vendor has made this subset of functions usable and intuitive.
Forced change
Some users resent the idea of forced change, according to the Fuze report. It's important to remember that a lot of users might be comfortable with existing-but-lacking communications and collaboration systems. In fact, moving to a new cloud unified communications system could initially make some users less productive simply due to the change and the associated learning curve. For those in the vanguard of cloud UC, it's important to reach out to existing users and build a path forward that they can embrace and support.
source techtarget
Industry: Unified Communications & Cloud
Latest Jobs
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project
-
- Active Directory | RBA engineer | UK Remote | SC Clearable
- United Kingdom
- N/A
-
Technical Active Directory (AD) and RBA specialist needed to play a key part in complex, enterprise scale Active Directory and access transformation programmes. You will work alongside senior team, helping reshape access models, modernise legacy directory structures and strengthen security posture across secure environments. This is hands on delivery within high impact projects where your work directly improves access control, compliance and operational resilience. Active UK Security Clearance required. This is a remote role with client travel. Implementation of Role Based Access Control across large AD estates Restructuring complex permission models, security groups and delegated access Supporting domain controller upgrades and core directory improvements Applying security hardening standards and remediating audit findings Enhancing authentication, policy and access governance frameworks Troubleshooting and resolving technical AD challenges within live environments Producing robust technical documentation and identifying project risks You must have the following technical experience Enterprise Active Directory administration Role Based Access and permission remediation OU design and governance Group Policy management Security group delegation models DNS and DHCP services Kerberos authentication / NTLM PowerShell scripting and automation Azure AD | Entra ID Hybrid identity environments Identity Governance PAM
-
- Identity and Access Management Consultant (Saviynt & Microsoft Entra) | UK
- United Kingdom
- N/A
-
Role summary Technical IAM consultant delivering identity governance and cloud identity solutions to enterprise clients. What you will do Implement / Configure / Deploy Saviynt IGA / Microsoft Entra solutions: Lead technical workshops, gather requirements and translate into solution designs. Troubleshoot complex issues, support testing and deployments. Produce technical artefacts and configuration guides. Key skills Hands-on Saviynt IGA experience (workflow, connectors, access governance). Strong practical knowledge of Microsoft Entra ID / Azure AD identity and access controls. Understanding of identity protocols (SAML, OAuth, OpenID Connect) and hybrid identity. Experience with APIs / REST for integrations and automation. What we are looking for Proven delivery experience in IAM / IGA projects, preferably in consulting. Confident communicator with client-facing delivery exposure.
-
- Cyber Security Technical Presales Consultant | UK | Managed Services SOC / Pentesting etc
- England
- N/A
-
Experienced Technical Pre Sales Cybersecurity Consultant to support organisations across the UK. This role focuses on delivering advisory, high level solution design, and security uplift services that improve security outcomes, address operational challenges, and enable informed technology decisions within complex and regulated environments. The position blends technical pre sales expertise with a consultative approach, working closely with technical, operational, and commercial stakeholders to shape effective and scalable cybersecurity solutions such as Managed Services SOC / Pentesting etc The individual must be able to achieve UK Security Clearance. Key Responsibilities Provide technical pre sales support across cybersecurity solutions and services for organisations operating across multiple industry sectors Engage stakeholders to understand security challenges, risks, compliance requirements, and operational pain points Deliver advisory guidance and recommendations to strengthen security posture and organisational resilience Translate customer requirements into clear, outcome focused technical and commercial solution designs Act as a trusted technical advisor throughout the sales and early delivery lifecycle Produce clear technical documentation, recommendations, and customer facing materials suitable for regulated environments Collaborate closely with sales, delivery, and technical teams to align solutions with customer needs Experience and Skills Proven experience in technical pre sales or cybersecurity consultancy Experience working across multiple industries, ideally within regulated or complex environments Broad knowledge of cybersecurity technologies, managed services, and risk based approaches Strong communication skills with the ability to engage both technical and non technical stakeholders Confident operating in a client facing, consultative role UK based role with remote working Occasional travel for customer engagement as required