How To Offer Your Services And Not Lose Customers

Losing customers costs money.

Primarily because earning new ones is a strain that is impossible to get used to.

And every day we wake up with the aim of finding new customers, despite the frustrations that we accumulate each night.

Care for our current customers, on the other hand, is so simple, that we often forget to even do it. The point I’m trying to make here is that, typically, once we have sold the product, it ends there. We send the technician for installation and we don’t worry about how our customer has experienced their product experience post-purchase. Continue reading “How To Offer Your Services And Not Lose Customers”

How Two-Factor Authentication and Single Sign-On improve Security?

Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security.

Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login and password check, the system will always ask for a security code.

The security code is generated either in real-time (by the authentication system) and sent over SMS, email, or via applications such as Google Authenticator or Microsoft Authenticator.

Continue reading “How Two-Factor Authentication and Single Sign-On improve Security?”

Partner Story from Austria: TOOL IT

“I learned about Wildix from the recommendation of a Swiss business partner, who said: ‘Look at what these people do!’” – Hannes Jauk, CEO

Tool IT was founded in 1996 in Café Sperl in Vienna, between an apple strudel and a coffee – and this is not by chance if you think of the cultural tradition of Viennese coffee houses, places for communicating and exchanging ideas. Tool IT’s “leitmotiv” is precisely that, of providing the most efficient tools for company communication. In the beginning, the company was a classic IT business with a wide portfolio of services, but 10 years ago, it chose to direct itself towards VoIP and Unified Communication. Continue reading “Partner Story from Austria: TOOL IT”

Secure Media Transmission

Besides signaling when projecting and deploying Unified Communications system, we might also be interested in encrypting the media transferred between devices.

There are three popular RTP encryption modes:

  • SRTP MIKEY / SDES (requires TLS encryption of signaling)
  • SRTP DTLS
  • ZRTP

SRTP

The Secure Real-Time Transport Protocol (or SRTP) defines a profile of RTP (Real-Time Transport Protocol) intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast applications. It was first published by the IETF in March 2004 as RFC 3711.

Continue reading “Secure Media Transmission”

Make the right choice! The 8 steps that will help lead you to success with a UC&C partnership

Having worked in the communications industry for over 25 years, it’s great to see a technical advancement that meets the requirements of the consumer; to have smarter solutions for communications rather than just voice.

Sure, Voice over IP changed many things but it still majored on Voice being the main method of communication whereas Unified Communications and Collaboration allows a much greater array of communication solutions.

Spending a majority of my career in technical Roles, starting as an apprentice installation engineer, before progressing to Support Manager and Presales roles, many would believe my main focus to be technological, however I do not consider technology as the primary consideration. Continue reading “Make the right choice! The 8 steps that will help lead you to success with a UC&C partnership”