In this blog article we will analyze modern Unified Communications market trends in detail, and discuss how they actually compare with the UC solution features and the technical characteristics.
Hosted, Managed, or Cloud? Or Something Else?
Whether you are looking for a ready-to-buy UC solution or thinking about building one, the question of hosted, managed, or cloud is usually the first question that arises when a new service is added.
Let’s first review what each category means.
Loren Cleveland is the owner of BTS Communications. With nearly 30 years in the industry, Loren started with BTS as a technician, then moved into marketing and sales before purchasing the company in 2011.
We sat down with him to ask him about his experiences as being both a Samsung partner and a Wildix partner. Here’s what he had to say:
Wildix and Samsung both have their pros and cons, but I’ve been very impressed with what Wildix has to offer. The option of being totally hardware free definitely has its advantages. For example, there was recently a lightning storm that did some damage to hardware for a few clients I have. I had to drive out and spend hours fixing it all. Had they had Wildix installed, this would have been avoided. Continue reading
VoIP communications are completely safe if implemented correctly. As with any other technologies, there are best practices which must be followed to achieve the best possible results.
You must address security concerns while developing or selecting your UC solution. While many vendors delegate security to separate entities, such as VPNs, this approach is not necessary nor recommended as a substitution to the security policies.
The system must protect itself from attacks that attempt to guess user and password combinations. This can be achieved by blocking repeated failed attempts. The IP address that is generating the attack must be added to a ban list for an ever-increasing period of time.
Losing customers costs money.
Primarily because earning new ones is a strain that is impossible to get used to.
And every day we wake up with the aim of finding new customers, despite the frustrations that we accumulate each night.
Care for our current customers, on the other hand, is so simple, that we often forget to even do it. The point I’m trying to make here is that, typically, once we have sold the product, it ends there. We send the technician for installation and we don’t worry about how our customer has experienced their product experience post-purchase. Continue reading
Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security.
Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login and password check, the system will always ask for a security code.
The security code is generated either in real-time (by the authentication system) and sent over SMS, email, or via applications such as Google Authenticator or Microsoft Authenticator.