Gartner defines the Contact Center Infrastructure market as equipment, software and services that enable organizations to manage multichannel self-service and assisted service customer interactions holistically from a customer experience and an employee engagement perspective. CCI solutions are dedicated to supporting a single customer enterprise or tenant on each instance of the system, even if that customer or tenant supports multiple contact center operations on that dedicated instance. CCI solutions can be deployed on the customer’s premises or can be hosted and managed in a third-party data center or private cloud.
The market for SA platforms in customer service and support is an application that analyzes speech content in customer interactions in real time and postcontact. Vendors providing these services offer the following solutions: -Transcription and metadata for traits of the interaction, including sentiment analysis -Interface for designing workflows and visualizing data -Storage and flexible deployment options -Ability to customize speech models, encrypt and redact sensitive data, and integrate with the enterprise ecosystem. Informed application of SA technology capabilities will help customer service and support leaders monitor and evaluate customer interactions to improve customer and employee experience. SA platforms can either be stand-alone analytics platforms with integration capabilities or can be included natively as part of broader customer engagement suites.
Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. Without effective authentication, the security of and trust in that person’s digital interactions are deeply undermined. User authentication is foundational to and protects the value of other functions within an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD), audit (individual accountability), and identity analytics.