Intelligent Alarming and Monitoring. Whitepaper

Similar documents
Speech Analytics: Discovering the ROI. Whitepaper

Helping Your Online Community Succeed

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

Your Business Needs Managed Services. Find out when your business will truly benefit from a technology provider.

Impact 360: Your single-source workforce optimization solution

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

The Customer Engagement Company. Delivering solutions that forge deeper, more meaningful and valuable customer relationships

Unified Employee Desktop. Best Practice Guide

The Customer Engagement Company. Delivering solutions that forge deeper, more meaningful and valuable customer relationships

Knowledge Management in the Contact Center. Best Practice Guide

ESSENTIAL ELEMENTS OF CONVERSATIONAL AI. How human-emulated conversations improve user engagement and solve business challenges

Transforming the Contact Center into an Enterprise Change Agent. [ Four ways speech analytics drives actionable insights ]

Customer Engagement Optimization. A guide to solutions from Verint

Simplify Customer Service with a 360-Degree View of the Customer

Verint Speech Analytics for Financial Trading. Use Cases for Analytics on the Trading Floor

Nine Tips for Increasing Survey Success and Better Understanding Your Customers

Best Practices for Technology Renewal in Banking Institutions

Transform Customer Experience in Two Steps Using Case Management

Customer Engagement Optimisation. A guide to solutions from Verint

Gamification. Best Practices Guide

Four Keys to Successful Contextual Knowledge Management

Education Services Verint Customer Course Catalog. August 2015

[ Bridging Generational Gaps in Customer Care with Knowledge Management ]

Don t Rip and Replace Wrap and Renew! For IT Operations

Windpark Manager. Brochure. A Comprehensive, Integrated Solution for Technical Operations Management of Wind Parks

Avoiding Knowledge Management Pitfalls. Ten Common Mistakes and How to Avoid Them

Speech Analytics Transcription Accuracy

Uncover the Benefits of an Online Community. Ask the Experts

Digital First Engagement Management. For Government and Public Sector

[ know me ] A Strategic Approach to Customer Engagement Optimization

CENTRE (Common Enterprise Resource)

HQX HQX. HQXchange Is Your Single Comprehensive EDI Platform

10 Signs That Your Business is Ready for Managed IT Services. Find out when your business will truly benefit from a Managed Service Provider

Industrial IoT: From Concept to Business Reality. Improving O&G Operations with IoT. Progressing through the 5 Stages of IoT

Itron Analytics. Maximize the Full Value of Your Smart Grid. Image

[ know me ] A Strategic Approach to Customer Engagement Optimization

Myth Busted: Affordable, Easy to manage Virtualization with High-Availability is a Reality

SYSTIMAX Solutions. imvision. Infrastructure Management. Made Easy.

8 Tips to Help You Improve

A Digital First Engagement Management Framework. For Government and Public Sector

HSO.COM. HSO Managed Services. 24/7 business availability that works the way you do. Whitepaper HSO Managed Services

IoT in Oil & Gas: Don t Get Left Behind

PREMIER SERVICES FOR ASTRO 25 SYSTEMS BROCHURE NORTH AMERICA REGION

18 Questions You Should Ask Your Computer Consultant Before Hiring Them To Support Your Network

IS YOUR PHONE SYSTEM HOLDING YOU BACK?

Managed IT Services. Eliminating technology pains in small businesses

2012 Honeywell Users Group EMEA. Sustain.Ability. John Schofield, Honeywell Improved Reliability, Safety and Compliance with Management of Change

Using Speech Analytics to Capture the Voice of the Customer A CLARABRIDGE WHITEPAPER

Why Agile Business Suite Should Be Your Development Environment

Third-Party Enterprise Software Support: Key Risks and Questions to Ask

Key Factors When Choosing a Shopper Counting Solution An Executive Brief

A technical discussion of performance and availability December IBM Tivoli Monitoring solutions for performance and availability

Automated Service Intelligence (ASI)

Service management solutions White paper. Six steps toward assuring service availability and performance.

Effectively Managing Communications with Customers During a Service Outage

Eliminating Blind Spots in Commercial Trucking with IoT

MONITOR BUSINESS-CRITICAL SAAS APPLICATIONS

Managed IT Services. Eliminating technology pains for small businesses

BMC MainView: Holistic Systems Management Made Possible

The New Generation of Workforce Management

The Worry-Free IT Investment

Managed IT Services. Eliminating technology pains in small businesses

The Changing Role of the Operator

Managed IT Services. Eliminating technology pains for small businesses

Web Chat, Co-Browse and Video Chat. Best Practice Guide

CONTACT US: Call: For Sales: For Support: Outside the US? Call:

How managed cloud hosting services help an organization reduce TCO?

ROI: Storage Performance Analytics

Automating Your Critical Care Units

More than one-to-one replacement siemens.com/buildingtechnologies

Managed IT Services. Eliminating technology pains in small businesses

FOR CSPs, IoT-ENABLEMENT SERVICES CAN ACCELERATE REVENUE GROWTH

Managed IT Services. Eliminating technology pains for small businesses

The Optanix Platform. Service Predictability. Delivered. Optanix Platform Overview. Overview. 95% 91% proactive incidents first-time fix rate

Managed IT Services. Eliminating technology pains in small businesses

Powerful ways to protect your brand - as regulations intensify

Managed IT Services. Eliminating technology pains in small businesses

5 Steps for Making Your Support Organization More Customer-Centric

Secure information access is critical & more complex than ever

Powerful ways to protect your brand - as regulators get tougher

Powerful ways to protect your brand - as regulators get tougher

Service Level Agreement

Managed IT Services. Eliminating technology pains for small businesses

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

PNC8.2. Transforming today, taking care of tomorrow

What is Cloud, and Why Should I Care?

Managed IT Services. Eliminating technology pains for small businesses

Managed IT Services. Eliminating technology pains for small businesses

Quantifying the Value of Software Asset Management

Managed IT Services. Eliminating technology pains in small businesses

Mainframe Development Study: The Benefits of Agile Mainframe Development Tools

GE s Control System Lifecycle Management Offerings

Oil & Gas Industry. Smart Remote Automation. An Extension of PlantWeb Digital Architecture. PlantWeb

Platinum Enterprise Services

Tivoli software for the midsize business. Increase efficiency and productivity manage IT with fewer resources.

Services. Dell ProSupport TM. Improve productivity and optimize resources with efficient, flexible, and reliable support

THE CURRENT STATE OF CUSTOMER CARE HOW CONSUMER PREFERENCES FOR CHANNELS AND TECHNOLOGY ARE EVOLVING

Complete Document Solutions. CDS Works For You.

ATM MODERNIZATION FOUR REASONS TO MODERNIZE YOUR AGING ATM INSTALL BASE. An NCR white paper

Transcription:

Intelligent Alarming and Monitoring Whitepaper

Table of Contents Preventing Catastrophe: Intelligent Alarming as a Lifeline for Contact Center Software... 1 Compounding Complexity... 1 The Value of Monitoring Software... 2 Intelligent Alarming as a Solution and as a Service... 2 Alarm Filtering... 3 Post-Implementation Calibration... 3 Ongoing Development... 3 Summary... 3 Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Verint Systems Inc. is strictly prohibited. By providing this document, Verint Systems Inc. is not making any representations regarding the correctness or completeness of its contents and reserves the right to alter this document at any time without notice. Features listed in this document are subject to change. Contact your Verint representative for current product features and specifications. All marks referenced herein with the or TM symbol are registered trademarks or trademarks of Verint Systems Inc. or its subsidiaries. All rights reserved. All other marks are trademarks of their respective owners. 2017 Verint Systems Inc. All rights reserved worldwide.

Preventing Catastrophe: Intelligent Alarming as a Lifeline for Contact Center Software Application Uptime is more than a buzz phrase; it can represent the vital difference between success and failure, between a satisfied and unsatisfied customer, and between compliance and non-compliance. In a complex, interconnected system, downtime has a cascading effect. One service failing in a single application can negatively impact systems throughout the ecosystem. In a call recording environment, a single obscure error could indicate systemic issues that lead to loss of calls, productivity, revenue, and more. The growing importance of application uptime has led many businesses to employ intelligent alarming as a solution and a service. Call monitoring infrastructure can represent a significant cost center for any business, even those whose business is call monitoring. Onsite equipment, maintenance, and staffing represent a substantial investment just to ensure application uptime. In environments where monitoring applications are tied into workforce management and payroll, such as in a Verint implementation with the latest release, resource requirements around monitoring are even higher. Unfortunately, even basic deployments of call monitoring software come with a myriad of failure points, some more obscure than others. This has led to an increasing need for intelligent alarming, both as a solution and a service. Compounding Complexity Consider application services. A single server running call recording software may have more than a dozen different services (depending on the configuration and installation) running at the same time. Each service contributes to the overall function of the call recording software in a different way. One service, such as the Recorder Agent Service may have a specific role that applies in specific circumstances (screen recording, in this case). The Recorder Agent Service is not the only service that relates to screen recording; the Screen Capture Service is also part of the web of services that makes screen recording work. If the Recorder Agent Service stops does it mean vital information has been lost? What if it doesn t exist on a system at all? The interaction between these services is not always linear; it doesn t equal a 1 or a 0 as much as it equals maybe a 1 or possibly a 0. Hyper-alarming is when software requires high amounts of bandwidth to review frequent, nonprioritized, alarms. It may result in alarm fatigue, which in turn leads to slow or no responses when critical systems fail. To add additional complexity, server hardware can have an impact on call monitoring. A server running out of disk space is the most obvious example; when room to store data runs out, calls can be irretrievably lost. While it is important to recognize the obvious problems, the subtle ones represent a greater threat. Frequent, reoccurring events taken in the right context may predict hardware failure. They may also be symptomatic of a software-level issue that is having a business impact without anyone knowing. Understanding the relationship between software and hardware is just one aspect of the application uptime puzzle. Hidden failures are another. Services can appear started but fail (hang), adapters may seem to Page 1

communicate while losing an entire stream, and call tagging information may be lost while calls continue recording, all without raising the flags administrators need to become aware of. The Value of Monitoring Software Monitoring software, at its most basic level, is designed to draw attention to specific events. Most out of the box monitoring software uses industry-standard thresholds to determine the criticality and impact of a given event. For example: it is common to monitor memory utilization. When memory availability decreases below a certain threshold, the software raises one flag. If it decreases below that threshold for an extended period, it may raise an additional, or different, flag. In many instances, the software can provide some historic information about the event or even suggest ways to resolve the problem. In best case scenarios, monitoring can provide predictive information that prevents problems from ever manifesting. Depending on the design and implementation, monitoring software can function like an additional pair of hands. The ability to send instant notifications via email, SMS, or a phone call when an alarm occurs provides technicians with the confidence they need to focus their Simple issues, such as when a service stops, can be managed by the software itself, alleviating the need for another resource to become involved. attention elsewhere. Simple issues, such as when a service stops, can be managed by the software itself, alleviating the need for another resource to become involved. This is particularly useful in businesses where uptime is required around the clock or if there are staffing constraints. Unfortunately, monitoring software is not without its limitations. To reach greater market saturation, the software is, by necessity, built to be somewhat generic. This means that a given software package is unlikely to provide predictive, actionable intelligence about a specific environment without a degree of customization. The more specific the business environment, the greater the customization required to make the monitoring engine effective. Poorly executed, monitoring software can lead to additional work and frustration, not less. To customize a monitoring package, engineers need two key things: first, they need an understanding of the business and its infrastructure; second, they need an in-depth understanding of the software environment to be monitored. Due to advances in technology, a certain degree of business logic is built into most modern monitoring engines. Common elements, such as the ability to monitor hardware configurations, are nearly universal. That leaves the greater challenge: understanding the software environment. As mentioned earlier, complex software interactions greatly increase the difficulty of implementing a static monitoring solution. This is where intelligent alarming can add substantial value to a business. Intelligent Alarming as a Solution and as a Service In best case scenarios, monitoring can provide predictive information that prevents problems from ever manifesting. Intelligent alarming refers to the process of customizing a Robust monitoring isn t about 1s and monitoring engine as it applies to a specific suite of 0s; it s about thresholds and values software. In a Verint environment, this means tuning the that change depending on variables. engine to include the variables that contribute to making Generic implementation works on the software work. Specifically, this tuning includes generic systems. The call recording understanding the business environment and adjusting world is nowhere near generic. alarms to fit those needs. A discovery must be performed, so the engineers implementing the solution can do so accurately and quickly. Once the discovery is complete, monitoring can be implemented in a way that Page 2

specifically and categorically relates to the business need. Finally, an alarming report must be provided to the business so they can understand what to expect and how to respond to alarms when they happen. Call recording environments are never static. Simply implementing a well-configured monitoring solution does not guarantee it will continue to function optimally, particularly as the business landscape evolves. This is where intelligent alarming as a service can add substantial value. Once a monitoring solution is implemented, the service steps in to provide filtered alarms, post-implementation calibration, and ongoing development. Alarm Filtering Alarm filtering amounts to having additional staff dedicated to ensuring application uptime. Dozens, if not hundreds, of alarms can trigger daily in a base Verint implementation. Adding additional modules and functions only increases the noise. Intelligent alarming reduces the volume down to a more manageable level, but it isn t fool proof. Monitoring engines are only as capable as the logic they are programmed with. In businesses with multiple production servers in play, alarm filtering is an invaluable component of intelligent alarming as a service. Alarm filtering puts a subject matter expert (SME) between the initial alarms and the technician who will act on that alarm. Being an expert on the Verint software, the SME can identify if the alarm is actionable, categorize the priority (and therefore identify which notification channels are appropriate), and provide insight into the meaning behind the alarm. Combined with historic analysis and reporting, alarm filtering can provide predictive insight into business challenges and prevent downtime. Post-Implementation Calibration Post-implementation calibration is the process by which engineers review alarms for validity and adjust the monitoring engine to better suit business needs. Out-of-the-box monitoring of a Speech Transcription server is set to alarm when transcription falls below a certain number, or when transcription errors reach a specified threshold. After implementation, when changes to the customer environment take place, such as adding additional call centers, these numbers must be reassessed. In the case of a call recording environment, understanding the interactions of software, hardware, and thresholds can be incredibly complex; throttling a memory threshold too high may, for example, allow recording modules to go outside of operational ranges. Intelligent alarming services look for these types of events and provide businesses with the information they need to avoid becoming non-compliant or losing valuable data. Ongoing Development One step beyond ongoing calibration is development. A service seeks to continually improve and grow. Intelligent alarming as a service includes full-time development resources. These resources are devoted to customizing the monitoring engine, releasing continuous updates, and improving calibration tools. As best practices are defined, developers apply them across the solution, uplifting and enhancing stability to all constituents of the service. This is of incredible value in the Verint environment, as patches and version updates can dramatically change the way the system works. Large updates, such as version changes, propagate outward and impact both hardware and software. With dedicated resources who understand the impact of these updates, the opportunities for system failures can be significantly reduced. Preventative measures ultimately save businesses more than troubleshooting after the fact, particularly if litigation is involved. Summary Monitoring is a key element to any business infrastructure, however, it must be implemented appropriately. In most cases, out-of-the-box monitoring software can cover a variety of universal business needs without much customization. As business demands for maximum uptime and system availability grows and environments become increasingly complex, with hardware and software interacting in specialized ways, Page 3

standard monitoring solutions simply do not suffice. Highly customized, business critical software, such as Verint Workforce Optimization application suite, require equally customized monitoring solutions. Intelligent alarming is the best, most cost-effective way to meet this need. Implementing intelligent alarming as a solution and service provides highly customized, software-specific solutions for the Verint environment. The service provides alarm filtering, post-implementation calibration, and ongoing development; each of which functions like adding multiple additional Verint subject matter experts to prevent future problems. Failure to implement proper alarming can result in loss of data and, at the worst, substantial fines. Page 4