As vendors go through consolidation of partners and revisit processes in an attempt to streamline their business, Swoop Datacom has a challenge for smallest to the largest vendors to undertake. Is your provisioning process zero touch? If it is zero touch, what does that actually mean?
I met with John Bennett, Co-Founder and CEO of Swoop Datacom, to find out just how many touches were in Swoop Datacomβs provisioning process.
The current provisioning processes
John began by summarising the typical process that vendors are following today.
βAt the moment, vendors are paying people to unbox their phones and pre-stage them. Thereβs lot of customers using this manual process and they donβt fully understand that zero touch provisioning means zero touchβ
John told me the current process with some providers is something like this:
- Unbox the phones
- Pre-stage the handset
- Have a little fiddle
- Give them a polish
- Feel like theyβve accomplished something
βWeβre not the single touch or two touch provisioning option, itβs genuine zero touchβ
Swoop Datacomβs platform means that all the systems do the work behind the scenes. All the right people get the right phones with the right config.
And this is different to what vendors are used to.
Changing single touch to zero touch
John told me what Swoop Datacomβs wants to change is the mindset that this is difficult.
βYou donβt need a partner in each country. There is one global process where you order your equipment and you have the same user experience, the same control and the same visibility. You can buy any of the 300 phones we support and make sure your processes are using the same methodologyβ.
This means your business productivity levels increase as you no longer have to invest time and resource.
How to disrupt service management and provisioning

I then put my vendor hat on and told John that it felt a little exciting and disruptive. But with those feelings come nerves. John settled my nerves quickly.
βItβs about vendors realising that we have the people that know what they are doing β with years of experience and understanding β of how we can put existing devices together using one simple method. Weβve done all the back office work and coded these applications together. And weβve proved it globally by rolling phones out everywhere. You donβt have to have ten different processes per handset or vendorβ.
I then touched on security concerns when introducing a new technology of process. With 99.999% SLA and 100% uptime, the stats should speak for themselves. John added:
βWeβve onboarded 15 different partners and theyβve all penetration tested for security processes many times. Everyone of them has signed off on it to make us live. None of them have ever come back with a security breach. Weβve tested the system to the point of breaking and gone to the nth degree to had network overlay security process that are more complex than some of our vendors are used to.
We sometimes go as far as advising vendors to what security processes they should be rolling out and adhering to. There have been occasions where weβve realised our intellectual property out to them as a guideβ
By futureproofing the security and support, Swoop Datacom ensures that vendors understand where Swoop Datacom is going but also where the industry is going.
John pointed out that this is particularly important in the self-service world.
βA lot of the time this is a self-service system. Itβs not always delivered as a wrap-around services so there wonβt always be someone that goes out and install the devices can maintain them. At the same time, we need to give vendors and users peace of mind that their handsets are backed up by the highest levels of security.
Everyone has different ideas around what security looks like. As a minimum, we enforce at least three strict policies that they have to follow:
- Certificates on the devices
- IP addresses
- MAC addresses
We can validate these through different processes that are backed off to other back offices and staging arenas. We wonβt talk to anything that doesnβt pass through our security processes. Thereβs no information that can leave our system if you havenβt passed through our processes.β
What does self-service and zero touch mean for provisioning jobs?
With my nerves truly settled around security in new, disruptive technologies, another alert rang in my head. Having worked in provisioning for six years, it suddenly sounded like my old role was being made redundant. A little like the introduction of artificial intelligence in the contact centre, John informed me this would make provisioning roles more productive and zero touch provisioning isnβt a threat.
βSomeone still needs to setup the configs and profiles. Weβve just made this seamless. If the information is given to our distribution partner at the point of sale, our system generates the user account and password, assigns the phones to the user and select the call control platform to make sure it has the correct firmware. In theory, itβs a slick processing systemβ.
I then asked John what happens if I have a problem with my phone or batch of phones and havenβt touched it through the provisioning process.
Again, John eased my mind. There are usually two explanations if a device is down at the point of testing or go live.
βItβs either dead on arrival which is a pandemic failure. This is an RMA request and it goes back through the supply chain process. The second issue it could be is if the device isnβt connected to the provisioning server. Our system gives you status updates and helps you start troubleshooting where the issue liesβ.
Johnβs constant satisfaction of my vendor oriented questions left me asking what more John can add. He left with a challenge to pose to vendors that arenβt using true zero touch provisioning today:
Come and see if it doesnβt do something that you need.
Β