
NiCE & AWS deepen AI partnership to power CX automation
The collaboration aims to accelerate the deployment and scaling of AI-powered customer service solutions by combining NiCE's customer service automation expertise and interaction data with AWS's cloud and AI technology. The effort is focused on enabling end-to-end automation across enterprises using NiCE's CXone Mpower solution and AWS services like Amazon Bedrock, Amazon Q, and Amazon SageMaker.
Expanded integration
NiCE and AWS are integrating generative AI services across the CXone Mpower platform to enable automation throughout enterprise workflows. The initiative covers several use cases, including automated AI agent creation, intelligent workflow orchestration and real-time AI-supported guidance for employees.
With the integration, Mpower Agents will allow businesses to deploy AI agents instantly and without coding or prompt engineering, tailored to each organisation's specific needs. Using Amazon Q index, these agents access the latest policy, product and case information for accurate responses. Training on rich customer experience data is enabled through Amazon SageMaker, ensuring continuous learning from best practices and high-performing interactions.
The platform also features CXone Mpower Orchestrator, which integrates with Amazon Q Business to connect enterprise systems, applications and data. This functionality enables more personalised, seamless customer journeys by breaking down operational silos, delivering real-time decisions using the AWS Nova family of large language models for various objectives such as speed, accuracy and business impact.
The CXone Mpower Copilot tool supports agents, supervisors and leaders with real-time AI-powered assistance, aiming to streamline tasks and support productivity. AWS's global infrastructure underpins this function, allowing deployments with low latency and high availability across different geographies.
Leadership comments NiCE brings decades of deep customer service expertise, rich data and a proven AI-based foundation. AWS brings enhanced scale, infrastructure and generative AI innovation. Together, we're delivering enterprise-wide automation, turning vision into action across the front, middle and back office. Mpower Agents are just one example: AI-powered agents that deploy instantly, adapt in real time and operate with precision at scale.
According to Barry Cooper, President of the CX Division at NiCE, the collaboration is designed to deliver broad automation and responsive AI agents that adjust and function efficiently at enterprise scale.
Mila D'Antonio, Principal Analyst at Omdia, described the collaboration as an example of complementary capabilities, stating: "This collaboration is a textbook case of complementary strengths coming together: NiCE has the domain depth, the data, and the AI maturity in CX; AWS has the tools, infrastructure, and generative AI firepower. The result is innovation like Mpower Agents that are enterprise-ready, context-aware, and built to scale, delivering automation with both intelligence and impact."
Customer reaction
Taylor Mobley, Chief Revenue Officer at Bamboo Insurance commented on the partnership's impact: "This collaboration between NiCE and AWS is raising the bar for what's possible with AI in the enterprise. By combining deep expertise with powerful technology, it will help us move faster, work smarter, deliver more value across the board, and ultimately provide a better, more personalised experience for our customers."
The director of customer experience at Vera Bradley, Susan Campbell, noted the partnership's ongoing evolution: "We're always excited to see the innovative things we can do with CXone Mpower... and we know CXone Mpower will evolve with us, so we can continue to improve the customer experience—even into the future. I feel like NiCE wants to make us a better version of ourselves. And there aren't a lot of other companies that really invest in thought leadership, especially around how AI will forever change the face of the contact center."
AWS perspective
Rohan Karmarkar, Managing Director, Partner Solution Architecture at AWS, said the partnership broadens the capabilities available to businesses: "At AWS, we're committed to providing the capabilities to help businesses with AI-powered transformations. By combining Amazon Bedrock, Amazon Q, and our Nova family of LLMs with NICE's CXone Mpower, we're enabling enterprises to deploy intelligent automation that's both powerful and purpose-built for real customer challenges. This collaboration with NICE demonstrates how AWS's generative AI capabilities can help accelerate innovation at scale across customer experience workflows."
The announcement follows a trend among enterprise technology providers to incorporate generative AI features in customer experience platforms, seeking to streamline operations, improve accuracy, and personalise customer engagement through scalable technologies.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
a day ago
- Techday NZ
When trusted tools go rogue: The return of the ‘Confused Deputy Problem'
A decades-old cybersecurity vulnerability is staging a dangerous comeback, and this time it involves modern tools and has far-reaching consequences. Known as the 'Confused Deputy Problem,' this flaw sees trusted software - such as administrative tools, privileged scripts, or even AI agents - being manipulated to misuse their powers on behalf of less-privileged applications operating autonomously or by users. And in today's rapidly evolving threat landscape, the consequences are more severe than ever. From compiler quirk to enterprise crisis The confused deputy problem isn't new. First described by computer scientist Norm Hardy in 1988, it referred to a case where a compiler (legitimately empowered to write to billing files) was tricked by less-privileged applications into overwriting those sensitive files. The applications themselves didn't have the necessary access, but the compiler acted on their behalf, unwittingly executing their intent. Fast forward to today, and this fundamental breakdown of privilege separation is now playing out in some of the most advanced enterprise systems, including those that rely on artificial intelligence, automation, and cloud-native infrastructure. In most modern enterprises, trusted systems or processes - like automation scripts, CI/CD pipelines, and privileged service accounts - are the deputies. These programs are entrusted with elevated access because they serve as conduits to essential business functions. However, if they lack mechanisms to evaluate the context of the commands and honour least privilege performing functions, they can be exploited just as easily as Hardy's compiler. The problem becomes even more alarming when applied to Agentic AI which are tools that act independently to complete tasks using delegated authority. If these AI agents are manipulated into making requests or executing operations they weren't intended to, they become confused deputies on a much larger scale. Real-world risks The confused deputy issue surfaces in multiple ways across enterprise IT today. These include: SuDo misuse: Scripts with superuser privileges can be hijacked by untrusted inputs, elevating user privilege without directly attacking the OS. Scripts with superuser privileges can be hijacked by untrusted inputs, elevating user privilege without directly attacking the OS. CI/CD exploits: Shared service accounts in development pipelines can be coerced into leaking secrets or deploying malicious artifacts, especially in the absence of role isolation and context validation. Shared service accounts in development pipelines can be coerced into leaking secrets or deploying malicious artifacts, especially in the absence of role isolation and context validation. Cloud token abuse: In AWS or Azure environments, services can inadvertently use their assumed roles to fulfill malicious requests initiated by compromised peers, turning secure microservices into agents of privilege escalation. Why the problem persists Despite increasing awareness and tooling, the confused deputy problem persists largely because enterprises have not fully embraced the principle of least privilege. That is, systems, applications, and users continue to have more access than they need. What's more, the explosion of machine identities, such as automated services, scripts, bots, and now AI agents, has made it far harder to track privilege boundaries. Machines now communicate with other machines more frequently than humans do, and without adequate oversight, these interactions become fertile ground for exploitation. Reimagining Privileged Access Management To confront this resurgent threat, businesses must rethink their approach to Privileged Access Management (PAM). It's no longer enough to store secrets or manage user credentials. Modern PAM must be dynamic, context-aware, and tightly integrated into every aspect of the IT ecosystem. Key strategies to consider include: Command validation and filtering: Systems should whitelist commands, sanitise inputs, and block privilege escalation via indirect parameters. Systems should whitelist commands, sanitise inputs, and block privilege escalation via indirect parameters. Context-aware decisions: Access should be evaluated based on behavioural context and not just identity. Why is a session being initiated? What other systems has the user accessed? What's the broader pattern? Access should be evaluated based on behavioural context and not just identity. Why is a session being initiated? What other systems has the user accessed? What's the broader pattern? Segregation of duties: Different roles and accounts should be used for automation, deployment, and debugging. A single account with broad entitlements poses a massive risk if compromised. Different roles and accounts should be used for automation, deployment, and debugging. A single account with broad entitlements poses a massive risk if compromised. Real-time monitoring and forensics: PAM solutions must include session recording, keystroke logging, and audit trails to detect both deliberate abuse and accidental misuse. AI's double-edged sword Agentic AI represents both the future and the frontier of the confused deputy problem. These systems are capable of incredible operational gains, but their autonomous nature makes them ripe for exploitation. A prompt, parameter, or request that seems benign on the surface can trigger actions that cause significant harm or data leakage, especially if the agent can't distinguish between valid commands and malicious manipulation. This isn't just a technical flaw but a governance challenge. Enterprises must ensure that, as they embrace AI and automation, they do so with controls that prioritise intent verification, privilege minimization, and oversight. A strategic imperative The confused deputy problem is no longer a relic of early computing. It's a central challenge for modern digital security. As organisations deploy more intelligent and powerful tools, they must recognise that privilege without perspective is an attack vector in its own right. To prevent trusted systems from becoming dangerous liabilities, enterprises need to enforce least privilege not just as a policy, but as a design principle embedded in every layer of infrastructure, automation, and AI deployment.


NZ Herald
2 days ago
- NZ Herald
Refund money for 3G-only phone now, Consumer NZ says; Auckland Council says it's not responsible for Amazon's deserted construction site
Another hassle with a recently purchased phone that's only capable of calls on the soon-to-be-shuttered 3G networks; the council updates on Amazon's Quiet Earth Auckland build; an AWS exec jumps to the opposition; and the Government names an AI advisory panel. Another customer has found themselves stuck with a '4G'


Techday NZ
25-06-2025
- Techday NZ
BeyondTrust & AWS partner to boost cloud identity security
BeyondTrust has entered into a multi-year strategic collaboration agreement with Amazon Web Services to align efforts on secure cloud adoption and identity security. The agreement sees BeyondTrust and AWS focusing on joint innovation, market expansion and long-term growth by coordinating go-to-market strategies and joint investments. The partnership is intended to help organisations accelerate secure adoption of the cloud, with a particular emphasis on identity security across hybrid environments. Shared objectives The collaboration allows BeyondTrust and AWS to provide customers with more integrated solutions, coordinated field engagement, and a wider global reach. Both companies aim to address the growing need for robust security measures as more businesses transition to cloud-based infrastructure. David Manks, Vice President of Strategic Alliances at BeyondTrust, said: "At BeyondTrust our mission is to deliver exceptional identity-first security within reach of any organisation. As sophisticated attacks increase, our collaboration with AWS delivers the end-to-end visibility and control customers need to stay ahead of these threats. Together, we're empowering organisations to secure both human and non-human identities with the scale and confidence only AWS and BeyondTrust can deliver." BeyondTrust's Pathfinder Platform will enable customers to deploy a set of six core identity security controls tailored for cloud environments. These controls comprise Just-in-Time Access and Least Privilege Enforcement, Secure Remote Access without legacy VPNs, Password Management for privileged accounts, Secrets Management for DevOps credentials in the cloud, Cloud Infrastructure Entitlement Management to address over-permissioned identities, and Identity Threat Detection & Response for real-time threat monitoring and containment. The controls are designed to enhance security posture while supporting operational efficiency. Customer perspectives David Lokke, Senior Systems Administrator at Premier Bankcard, commented on the impact of the integrated solutions, stating: "As part of our move to AWS, we needed a more seamless, secure way to manage access across our cloud environment. BeyondTrust Password Safe integrated easily with our existing BeyondTrust solutions, connecting through Privileged Remote Access directly on AWS. It simplified access management and improved the experience for our vendor partners." This integration is expected to be particularly beneficial for organisations that have distributed workforces or rely on external partners, as it provides a unified approach to identity security across various environments, thus reducing complexity and risk. Security alignment Carol Potts, General Manager, North America ISV Sales at AWS, addressed the shared commitment to security standards, saying: "Security is 'job zero' at AWS, and BeyondTrust is equally committed to upholding rigorous security, compliance, and scalability standards. We are excited to deepen our relationship with BeyondTrust as we continue to innovate for our joint customers and provide them with unparalleled threat protection today—and in the future." The collaboration highlights how both AWS and BeyondTrust intend to support customers as security becomes an ever more significant focus due to increasing cyber threats targeting identity infrastructure. The two companies aim to bring flexibility to organisations across industries, enabling a more secure transition and operation in cloud environments. BeyondTrust and AWS plan to continue coordinating their technological and business efforts to help customers manage identities more effectively, responding to the evolving landscape of cloud security risks. The agreement sets the stage for ongoing product development and customer-focused initiatives grounded in security best practice and operational efficiency. Follow us on: Share on: