How the Great POTS, ISDN and PSTN Switch-Off Will Affect Your PBX

A grave with copper in it representing the PSTN switch-off

Copper cable is out, which has major ramifications for many businesses that rely on analog or digital PBX phone systems. Unfortunately, small businesses often aren’t aware that their current PBX infrastructure is fundamentally incompatible with the upgrade to fiber caused by the great POTS and PSTN switch-off.

The POTS and PSTN Switch-Off Problem

Major telephone infrastructure providers such as Openreach in the UK, Verizon in the United States and TIM in Italy already use optical fiber technologies rather than analog copper cable as a core part of their networks. However, a lot of the old-style copper cable remains in the last mile. This creates a major bottleneck when it comes to providing ultra-fast services to the consumer: Copper cable is slow and obsolete — hence the POTS and PSTN switch-off.

However, copper cables are powered, and fiber-optic cables are not. This is partly where the problem lies with old-school PBX telephone systems.

PBX: An Infrastructure Problem

A PBX is a private branch exchange. This essentially allows users to share a number of external phone lines through the use of extensions. The PBX routes an incoming number to a main switchboard, where it can be answered, or if an extension number is inputted, it can route it to the right person directly.

On-premises PBX phone systems are usually built into the fabric of a building, with many buildings of the ‘80s, ‘90s and early 2000s having extensive cabling run throughout the walls to facilitate this. These systems were a useful solution for the time, and they went from requiring a manual operator to having automated systems.

But there are several major issues with these systems: They work with copper cabling, and they have a limited feature set. Sure, you can forward calls, queue and put people on hold. But it’s not easy to integrate other systems into the PBX, such as instant messaging or video calling. Even worse, simply moving to a digital ISDN telephone system won’t work; that’s being discontinued too.

Moving to IP: PBX Upgrades

It may be possible to get your current analog PBX to accept an IP input, and there’s a wide range of options to do so. However, as many technology enthusiasts know, as products reach end of life, the equipment to maintain them becomes much more expensive, and replacements are equally as pricey.

Those who remember the analog TV switch-offs of the 2000s and early 2010s may remember that they could get adaptors for their old analog TVs, but these are now notoriously unreliable. Worse, those TVs are unable to accept the full feature set available. The accepted solution now is to go digital.

The same applies to analog PBX telephone systems. Cable upgrades, repairs and overall maintenance costs will only get higher compared to a digital system. Even worse, a physical system means it’s harder to route a call to someone who’s not at their desk without another layer of switching.

Who Should Consider a PBX Signal Converter?

Businesses that have lots of phones and no real need for enhanced connectivity may wish to consider a converter. This might include:

  • Hotels with in-room phones
  • B&Bs
  • Motels
  • Businesses with only one phone attached to their PBX

The last use case typically refers to businesses where a PBX system was installed many years ago but they now primarily use mobile devices to conduct business. However, even then, they may wish to consider an upgrade, thinking about how a unified approach to communication may benefit their business. And the hospitality industry can definitely benefit from the wider range of services offered by a cloud-based PBX and its associated unified systems.

On-Premises PBX vs. Cloud PBX

The two main challengers to analog PBX telephone systems are on-premises IP PBX systems and cloud-based PBX telephone systems. These use the same essential internet technology but in different ways:

  • On-premises PBX: Major capital expenditure but that’s offset partly by lower operating costs. It typically requires a dedicated team of IT support staff to maintain.
  • Cloud-based PBX: Third-party solution, often with limited capital expenditure and slightly higher operating costs. Maintenance is done by the third party, and unified systems can easily be included along with potentially unlimited scalability.

Larger businesses that already have dedicated PBX systems often prefer the on-premises solution, although it can be difficult to quickly expand if they’re moving to new offices. Setup can be tricky as well. For agile large businesses that need flexibility, a cloud-based solution often works better than an in-house system, especially as their workforce becomes more distributed due to remote working.

Smaller businesses usually find that cloud-based PBX solutions are more in line with their budgets and their existing IT commitment, letting them leave most of the work to the third party.

When Are Copper Networks Shutting Down?

As with any technology rollout, there’s a range of dates across different countries. Plans also vary depending on how the incumbent or dominant telephone provider plans to switch over to fiber, and there are substantial commercial and logistical hurdles to doing so.

    • United States: On-going, with different companies operating at vastly different speeds
    • United Kingdom: Full PSTN switch-off by December 2025
    • Italy: 65% shutoff by 2023 but doubts remain about full copper switch-off
    • France: Switch-off by 2030 with local switch-offs occurring from 2021.
    • Spain: Full copper switch-off by 2025

Ultimately, as copper networks continue to be switched off across the globe, company PBX systems will need to be upgraded. And cloud solutions such as Wildix can be rapidly deployed across thousands of systems in a few easy steps.

What the Russian Invasion of Ukraine Means for Companies With Russian Exposure

As Russian tanks move onto Ukrainian soil, we have to ask what the impact will be on operations for companies within Russia and beyond. Companies like Microsoft, Google and RingCentral all have extensive operations within the country, and it’s clear that they’re going to have to rethink their strategy significantly, causing severe disruption.

Possible Actions Against Russia

Much of their strategy depends on what actions Western powers take against Russia. Ukraine’s foreign minister Dmytro Kuleba has called on the West to do the following:

    • Devastating sanctions on Russia, including through SWIFT
    • Fully isolate Russia by all means
    • Detach Russia from the internet
    • Weapons, equipment for Ukraine
    • Financial assistance
    • Humanitarian assistance

SWIFT

The most discussed of these is SWIFT, which stands for the Society for Worldwide Interbank Financial Telecommunication. It’s based in Belgium, but it helps coordinate international inter-bank transfers. Cutting Russia off from SWIFT would prevent companies and nations from being able to transfer money in or out of the country in a safe and convenient way.

While many companies keep some financial reserves within the country, these tend not to be high. As a result, paying staff within these countries is likely to prove difficult. This also includes paying for meal allowances, taxes and other benefits, as well as rentals, vehicles and similar costs of doing business.

While SWIFT isn’t the only tool in use to coordinate transfers, it’s the biggest, and its loss would be painful. Had it been done in 2014 in response to the invasion of Crimea, the Russian economy would likely have shrunk by around 5%, according to the then Russian finance minister, Alexei Kudrin.

Now, its effect would likely be a little less severe, but the impact would definitely be felt.

Complete Isolation

The current package of proposed sanctions is unknown, but the UK and the United States have both announced further measures, and a UN meeting has been triggered. Spain, France, Italy and Japan have also condemned Russia’s military actions.  It’s likely that any package will target:

    • High net worth individuals in Russia
    • Major banks
    • Trade of technological products
    • Trade of oil
    • Russian-based broadcasters

However, it’s unclear exactly how this phrasing will be worded and what precise products will be targeted. It’s certainly possible that businesses with significant development assets in Russia may be heavily affected, as they rely on a free flow of information, tech and money.

This, of course, is reflected by their share prices. RingCentral’s (RNG) has already slid around 25% over the past five days, and it’s unlikely to improve with this news. Zoom (ZM) has also slid — although that’s more due to disappointing Q4 results — and even Microsoft (MSFT) is reeling.

Businesses with interests in metal exploitation in Russia have been hit the hardest, though, with Polymetal International (POLY) losing a third of its value (it operates gold and silver mines in Russia and Kazakhstan) and EVRAZ (EVR) losing nearly a quarter (it has steel, mining and vanadium operations in Russia). That’s not to say that tech companies in Russia won’t be hit, but it looks like the market is waiting to see what announcements will come out of various government bodies.

Should Russia become completely isolated, it’ll have severe repercussions across the world. Businesses will find it hard to operate in Russia as they could face sanctions themselves, and it could spell the end of the Russian development industry. It’ll be hard for companies to move Russian developers to more stable countries, as well, as it’ll be hard to get visas.

In addition, the price of oil will likely spike, as Russia is responsible for 10% of the world’s supply, and Germany is particularly reliant on Russian gas.

Weapons, Finance and Humanitarian Support

While Russia’s military is significant, it’s clear that the Ukrainian military is strong, and it’ll be fighting on home territory. Packages that include direct or overt military support, however, are unlikely, as many countries are reluctant to directly engage in conflict.

However, finance and humanitarian packages are likely, as they tend to be less politically contentious. These usually support organizations within Ukraine and the Ukrainian government that deliver necessary services, skills and food.

The Aftermath

What will happen in the long term is anyone’s guess at the moment. Russia is holding its cards very close to its chest, although the numerous explosions throughout Ukraine suggest it’s thinking about taking a significant area of the country. However, it’s clear that the more Russia does, the more severe the consequences will be. And businesses that maintain their connections to the country will find it harder and harder to justify their stance, particularly as sanctions and other international efforts disrupt their regular operations.

 

Women in Tech: Cyna Milinazzo, President and CEO of Liberty Communications

Women in Tech: Cyna Milinazzo, President and CEO of Liberty Communications

Cyna Milinazzo is the owner of Liberty Communications – a telecom provider in Colorado and proud Wildix partner.

I had the privilege to sit down with her to discuss her background in telecom services, her experience as a woman in the industry, and why she chose to partner with Wildix:

Cyna Milinazzo in Her Own Words

My introduction to the telecom industry came in 1985 when I began my career working for my brother’s telecom business. After a few years of managing his office, I expanded my knowledge in the industry by moving on to work for a business that specialized in underground cabling. Unbeknownst to me at the time, the experience I gained from this transition set the stage for pivotal business decisions I would make in the future.

Eventually, I found my way back to working with my family as I partnered with my three brothers to run our own telecom company, which also came with all of the inherent ups and downs of running a family business. Even though I had the least ownership of this company out of all of us, I always treated it as my very own knowing that someday I would love to break out on my own in the telecom industry.

In 2006 when I asked my husband to quit his electrician job and join me in starting a new company, I was thrilled when he actually took me up on my idea!

We created Liberty Electric, specializing in low voltage structured cabling as a subcontractor for many small telecom companies in the Denver Metro area.

Starting a new business wasn’t easy – there is always tremendous risk with a startup, and Liberty Electric wasn’t even profitable for the first year.

It was a scary time financially as I continued working with my brothers while my independent cabling company grew.

I finally decided to take the leap in 2011 and left the family business to devote all my time to my own company.

In order to incorporate my expertise and provide our customers with comprehensive solutions, I expanded Liberty Electric by bringing in telecom services and updating the company name to Liberty Communications. My business has been flourishing ever since, and I’ve never looked back!

A year and a half ago when Wildix approached me, at first I didn’t see a need to add Wildix to our array of products. It has always been a challenge to gain more market share without losing the “boutique” approach we offer our customers, and I’ve always been committed to remaining focused on this integral aspect of our business model.

I had begun to notice a shift in the market at that time, though, and I was just starting to realize that I needed to be thinking about ways to differentiate Liberty Communications from others in our field.

Although we have been courted by many different vendors over the years, we’ve always been very selective about who we decide to take on.

After learning more about Wildix we were confident that you’re one of the good ones – I am so happy that Liberty Communications made the decision to add you as a vendor.

I envision Wildix as our vehicle for achieving a leading role in the Colorado market without losing what makes us special.

Being a woman in a traditionally male-dominated workforce has its challenges – finding the right network to move beyond plateaus can be tough. 

Twenty-some years ago it was quite a challenge for a woman to gain respect in male-dominated industries such as IT or construction; today, challenges still exist but are often more subtle.

When starting out in the telecom industry, I let myself be somewhat shielded behind my brothers as I navigated the system and learned invaluable lessons. I’ve been ignored by owners and contractors, excluded from construction meetings, and dismissed when trying to set sales calls.

After years of persistence, I’ve gained much more knowledge and distinction in the industry, and am now well known for my expertise and enthusiasm.

I’ve now been in the industry for so long, other telecom companies contact us for help when they need a hand – everyone in the area knows that Liberty Communications is there to help, without a second thought, and that we deliver quality products and reliable services.

I could have let challenging situations scare me off, but I embrace the fact that some say I’m sort of a “bull-dog” in male-dominated industries.

I even now also own a roofing company serving clients in the Denver Metro area as well. And I’m proud to have developed Liberty Communications as a company of go-getting, powerful women who support and inspire each other to be the best they can be every day.

On top of owning small businesses, I’m a wife, a mom, and a caregiver for my own mother. Finding my work-life balance can be difficult, as it is for many women, but at the end of the day I love to work, and this business is my passion.

I’m living the life I want and am lucky enough to not only have a supportive family circle behind me but to also be surrounded by hard-working, inspiring men and women every day at Liberty Communications.

Update

Since the original publication of this article, Cyna was chosen as one of the 2021 CRN Women of the Channel. With unprecedented circumstances causing massive overhauls in the industry, CRN focused on honoring women who lead their companies through times that were anything but normal.

“During the pandemic, Milinazzo’s role was not only to maintain growth goals but provide greater value and application of the company’s technologies. She sustained business in the channel and grew it 20% over the previous year.”

Are Your Desk Phones Listening In On You?

Yealink vulnerabilities show how that in UCC, security matters

Yealink vulnerabilities show how that in UCC, security matters

For better or for worse, data collection is something many of us have become accustomed to. From cookies on webpages to search terms being tracked, our activity over the internet is normally monitored to some degree, even to the point of general acceptance.

That said, as much as we’re used to that level of web tracking, we would be shocked to learn of similar tracking happening over business telephone systems. After all, it’s highly unusual for office phones to be actively gathering data on us, in particular because for most businesses, voice calls are where highly confidential knowledge is exchanged.

So, what happens if it becomes clear your phone system has the capability of actively listening in on you?

Worse, what if you can’t even know for sure who’s on the other end of the line?

Security Concerns from Yealink

These questions are especially relevant for business owners now in the wake of a troubling report regarding phones by the Chinese-based vendor Yealink, especially their T54W devices, which raised concerns about the privacy and security of the company’s hardware.

On September 28 of last year, US Senator Chris Van Hollen (D-Md) filed a letter to the US Department of Commerce referring to a report conducted by the consulting firm Chain Security. In that referenced report, Chain Security noted numerous security flaws in Yealink devices, along with numerous functionalities that appear to intentionally gather customer data.

More worrying still, Chain Security’s report concluded it is “highly likely” that Yealink is sharing customer information directly with the Chinese government, especially through its hardware.

This data gathering appears to occur primarily through how Yealink phones interface with company networks and PCs. Namely, Yealink devices make use of a device management platform (DMP) to connect to programs running on the PC. In most circumstances, this would be perfectly normal for the vast majority of VoIP hardware that connects to a PC-based system.

What’s far less normal, and even outright alarming, is the fact that the Yealink DMP is then capable of recording voice calls and even tracking web history on that connected PC — both without the end-user’s knowledge.

Potential Tracking Components

According to the Chain Security report, the Yealink DMP “collects and retains the WAN IP” of the end-user’s device, and can log any web traffic from devices connected to it. This is in addition to how the DMP collects call records conducted either on the phone or any devices connected to it.

All this is worth noting in particular because the Yealink DMP can be operated by a remote Yealink employee, who can use the platform to access any collected data, be that IP addresses, web traffic or entire call recordings.

More concerning still, using the Yealink DMP, remote Yealink employees can at will enable recording on an active call and retain the recording afterwards

This access doesn’t appear to be used by Yealink on an occasional basis, either. Chain Security also notes that during “normal operations” Yealink phones communicate with Chinese-controlled AliCloud servers, suggesting potential control and interception of the exact kind described above.

Metaphorically speaking, none of this may be an actual fire, but the monitoring activity combined with the server contact certainly make for a lot of smoke. (Things get even more suspicious as we consider Yealink’s direct and long-established ties to the Chinese government and their continued data sharing with them, Chain Security likewise reports.)

Broader Security Concerns

Beyond these problems, Yealink devices in question appear to have just plain obvious security flaws — ones which may compromise an entire company server.

Chain Security points out that Yealink phones are “pre-configured to accept credentials for connection and access to the device from 187 ‘trusted’ digital certificate authorities.” In other words, entirely unknown to the end-user, Yealink devices may be accessed by an incredible amount of additional entities, meaning if any such users are compromised they’ll have easy access to Yealink end-users’ networks.

But hackers may not even need to be a “trusted” authority anyway. Unknown entry to the device is further blown open by its inability to protect against brute force login attempts, meaning hackers are fully capable of accessing it simply by guessing username/password combinations.

As if these factors weren’t bad enough, the Yealink devices lack industry-standard digital signatures to authenticate valid changes to firmware. As a result, if external actors gain access to the phones, they can instantly overwrite current software on them so long as the new firmware is compatible with the hardware.

This easily means a hacker can install firmware that surveys not just what’s recorded on the Yealink phone (using the aforementioned data collection it performs), but even activity across the entire company network.

The Bottom Line on Yealink Devices

What this leaves us with is a phone that can record calls, IP address and web activity — all at any time and without the end-user’s knowledge — and communicate that data elsewhere.

While it’s easy or even proactive to assume the data will end up at Yealink or even the Chinese government, it’s just as possible that entirely unknown agents can exploit the vulnerabilities in these phones for their own ends. Either way, the result is far less than desirable for any business.

By all accounts, even in an age where data collection is to be expected, the security architecture in Yealink phones allows for far more surveillance than any business should feel comfortable with.

Bigger Takeaways

While this should certainly serve as a warning for anyone interested in Yealink phones in particular, we can also draw larger security takeaways here.

It should be first noted that using this example to cast doubt on all Chinese-produced hardware would be ridiculous; after all, an enormous number of devices are produced in China and have nowhere near these issues.

The actual bigger questions are those over security and trust in general. As this example shows, communications hardware has incredible potential to intrude upon your privacy, even to the point of acting as a covert surveillance device right on your desk.

To keep yourself secure, it’s vital that you be able to trust the manufacturer of VoIP devices. The vendor needs to be able to demonstrate not just effective security measures, but a willingness to give up their own control of devices outside applying necessary software updates.

When considering a new vendor, then, there are plenty of important questions to ask: for example, how much is your vendor telling you about the security parameters in their hardware? What role does the vendor play in managing the device after it’s sold? What ties does your vendor have to other entities that might want your business’s information?

Above all, if a vendor is holding onto things like permanent DMP access, it should instantly raise a red flag. Capabilities for remote control in this manner are all but certainly going to be either poor security design at best, or active attempts at datamining at worst.

To keep your business fully secure, it’s crucial to weigh these factors such as much as any other security points. If you can’t trust your vendor to protect your own privacy, after all, what good are they as a technology partner? And if they’re clearly sharing data with a government involved in information warfare, the situation only becomes more problematic.

When you weigh your options for hardware, then, don’t just consider security in broad terms. Just as vital is to consider how much trust you can put in the vendor to keep you safe — or, more important still, whether the vendor itself is a potential security threat.

To see how Wildix designs security in our UCC systems, check out our free white paper.

For more updates on security in the UCC industry, subscribe to receive our magazine for free!

E911 Regulations: What MSPs Need to Know

Explaining the US emergency service laws your phone systems must follow

Adhering to regulations is crucial for any business, and telephony providers are no different. PBX installations in particular, on top of adhering to customer expectations, must also follow legal standards in order to steer clear of fines, litigation and other significant penalties.

In the US, some of the most important telephony regulations are those around Enhanced 911, or E911. These are crucial to know about because they don’t simply regulate how you sell PBXs or how they may be used — instead, they specify exactly how dialing emergency numbers must work for a multi-line telephone system (MLTS).

If you plan at any point on selling an MLTS in the United States, these are the main points of E911 regulations you need to know.

What Are E911 regulations?

Like the name implies, E911 regulations require that any time 911 is dialed, the call itself communicates additional information to emergency dispatchers.

In short, E911 laws require that every 911 call must also convey:

    • A callback number for emergency services (either for the device placing the call or a central agent on the site of the MLTS)
    • The location of the device that called 911

These requirements were put in place by two federal US laws: Kari’s Law and Ray Baum’s Act.

Let’s dive into both of them now for more detail on the technical requirements behind E911.

The E911 Laws

1. Kari’s Law

Adopted by the Federal Communications Committee in 2019, Kari’s Law establishes two main requirements for 911 calls.

The first requires that emergency services are immediately contacted when “911” is dialed on an MLTS device, without having to dial for an external call. In other words, the dialer must not have to take an additional step before sending the emergency alert: simply entering “911” on the device must be enough to contact emergency dispatchers.

The second part of this law is more complex. This section specifies that any time a 911 call is dialed through an MLTS, a notification is simultaneously sent to a “central operator” who is on the same premises as the MLTS.

This “operator” can be most anything: a front desk, a security office, the IT department or similar. The agent just has to be a person who’s on premises and will actually see the alert.

Likewise, there’s room for you to decide what the notification is. To meet legal requirements, the alert can be an email, a text message, a screen alert or any other electronic message. It simply has to be sent right as the PBX issues a 911 call, and it must be prominent enough that the operator on the premises is unlikely to miss it.

So, what exactly should this notification say? Here, requirements become stricter.

Per Kari’s Law, this notification must convey, at a minimum, the following information:

    • The fact that a 911 call has been made
    • A valid callback number for emergency services
    • Details on the caller’s location, which the MLTS also sends to the public safety answering point (PSAP) as part of the 911 call

It’s worth noting that points 2 and 3 can, in some instances, be waived. According to the law, if it is “technically infeasible” to add this information to the notification, it isn’t required to provide it.

However, if you can’t provide that info, you will have to prove that it’s “infeasible” for the system to provide it, which of course will be a complicated process. All in all, it’s best to simply include that information from the start to make things move most smoothly.

2. Ray Baum’s Act

While not entirely about 911 calls, Ray Baum’s Act features a portion that applies to E911 considerations.

According to Section 506 of this act, all 911 calls must include a “dispatchable location” embedded in the call (regardless of what device they originate from).

“Dispatchable location” here means a specific street address, plus any additional information required to pinpoint the exact calling location, like apartment number or suite number. In short, the call must also carry data specifying exactly where emergency dispatchers should go.

This ties into point 3 from the second part of Kari’s Law mentioned above, and the good news is by covering this requirement from Ray Baum’s Act, your phone system will fulfill that part of Kari’s Law as well. It’s simply worth mentioning because by not having it, you run the risk of violating two regulations.

It’s also important to note that all devices, both fixed and unfixed, must be in compliance with Ray Baum’s Act by January 6th, 2022. So if by early 2022, your unfixed devices can’t report a dispatchable location to 911 operators, you will be considered in violation of this law.

So in brief …

Here’s a quick overview of what your phone system needs to meet E911 regulations:

  1. If you’ve installed an MLTS, each phone on the PBX must reach emergency services immediately just by dialing “911” (not requiring the dialer first push a key to make an outbound call).
  2. Any time 911 is dialed, the MLTS must also send a prominent notification to a central operator on site, and the notification must include:
    • The fact that a 911 call has been made
    • A callback number that emergency services can reach
    • Information on the 911 caller’s location
  3. Any system must also tell emergency services the street address (and, if necessary, apartment or room number) from which the call was made.

What happens if you’re not compliant?

If you install an MLTS without meeting the three requirements above (or a phone system that doesn’t fulfill point number 3), your business will become liable under federal law. (It should go without saying this isn’t a preferred state to be in.)

Specifically, businesses that don’t adhere to these laws face fines of up to $10,000, with a further fine of $500 each additional day that you are not in compliance.

For US telephony providers, staying in business all but requires fulfilling these federal regulations.

How do you ensure compliance?

Obviously, there are two ways to stay in compliance with these laws: either have a system that’s compliant from the beginning or alter a noncompliant PBX to become compliant.

If you’re taking that latter option, the good news is that creating compliance with Kari’s Law is fairly straightforward. As any technician can tell you, removing external dialing requirements from 911 calls is not a hard exception to add to a dialplan. Likewise, it’s not much of a hassle to make an MLTS send the required notification any time 911 is dialed from it.

However, the bad news is that guaranteeing compliance with Ray Baum’s Act is nearly impossible without support from your vendor.

If your devices don’t already have capabilities for location reporting (or else don’t communicate this), adding in locations threatens to become a taxing process. Obviously, it will mean you’ll need to input the information yourself — but depending on your PBX’s setup and your vendor’s degree of involvement, this may turn into hours of manually adding the locations for each device into your system.

Consider also that this process is only for fixed devices. For unfixed devices, manually inputting locations will be outright unachievable — since, of course, users might move the devices from where you said they were.

Ideally, if your devices can’t provide location details upfront, your vendor will give you some easier way of adding in this info or even help with the process. If not, you’ll be stuck singlehandedly putting additional work into a system you no doubt already went through a lot of hassle to simply sell.

The easier alternative, of course, is to just use a system that’s compliant with these regulations to begin with and is supported by its vendor when it comes to inputting additional information.

What’s a good compliant system?

For a PBX that’s capable of acting as an MLTS and more — all while being fully in line with Kari’s Law, Ray Baum’s Act and other E911 regulations — an excellent choice is Wildix.

For starters, every Wildix system is ready-made to easily comply with Kari’s Law. By default, Wildix PBXs do not require a prefix to dial an external line.

So long as “Prefix for external line” is empty, your Wildix PBX will comply with the first part of Kari’s Law.

So long as “Prefix for external line” is empty, your Wildix PBX will comply with the first part of Kari’s Law.

The Wildix system can also be set up to send the required emergency notification to any call group the end-user requests, as outlined in Wildix technical documentation.

So, what about the more difficult part, conveying a dispatchable location? Here too, the Wildix system features full compliance with little difficulty on the MSP’s part.

With the use of CLASSOUND, Wildix’s premier voice system for cloud-based international calls, specific geographic locations can be bound directly to fixed phones, not simply to the devices’ DIDs. For unfixed devices, Wildix Collaboration, Wildix’s main calling app, automatically tracks location through a built-in geolocation feature.

How E911 reporting is conveyed through the Wildix system

How E911 reporting is conveyed through the Wildix system

As important as it is to be in compliance with federal law, getting there shouldn’t have to be a painstaking process. With Wildix, MSPs have full legal compliance as the factory default on their systems and the full backing of their vendor in achieving compliance on any installation.

For more tips on managing your PBX, subscribe to receive our magazine for free!