Wildix vs Samsung: A Partner Story

Loren Cleveland is the owner of BTS Communications. With nearly 30 years in the industry, Loren started with BTS as a technician, then moved into marketing and sales before purchasing the company in 2011.

We sat down with him to ask him about his experiences as being both a Samsung partner and a Wildix partner. Here’s what he had to say:

Wildix and Samsung both have their pros and cons, but I’ve been very impressed with what Wildix has to offer. The option of being totally hardware free definitely has its advantages. For example, there was recently a lightning storm that did some damage to hardware for a few clients I have. I had to drive out and spend hours fixing it all. Had they had Wildix installed, this would have been avoided. Continue reading “Wildix vs Samsung: A Partner Story”

Reviewing Security Concerns of UC solutions

VoIP communications are completely safe if implemented correctly. As with any other technologies, there are best practices which must be followed to achieve the best possible results.

You must address security concerns while developing or selecting your UC solution. While many vendors delegate security to separate entities, such as VPNs, this approach is not necessary nor recommended as a substitution to the security policies.

The system must protect itself from attacks that attempt to guess user and password combinations. This can be achieved by blocking repeated failed attempts. The IP address that is generating the attack must be added to a ban list for an ever-increasing period of time.

Continue reading “Reviewing Security Concerns of UC solutions”

How To Offer Your Services And Not Lose Customers

Losing customers costs money.

Primarily because earning new ones is a strain that is impossible to get used to.

And every day we wake up with the aim of finding new customers, despite the frustrations that we accumulate each night.

Care for our current customers, on the other hand, is so simple, that we often forget to even do it. The point I’m trying to make here is that, typically, once we have sold the product, it ends there. We send the technician for installation and we don’t worry about how our customer has experienced their product experience post-purchase. Continue reading “How To Offer Your Services And Not Lose Customers”

How Two-Factor Authentication and Single Sign-On improve Security?

Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security.

Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login and password check, the system will always ask for a security code.

The security code is generated either in real-time (by the authentication system) and sent over SMS, email, or via applications such as Google Authenticator or Microsoft Authenticator.

Continue reading “How Two-Factor Authentication and Single Sign-On improve Security?”

Partner Story from Austria: TOOL IT

“I learned about Wildix from the recommendation of a Swiss business partner, who said: ‘Look at what these people do!’” – Hannes Jauk, CEO

Tool IT was founded in 1996 in Café Sperl in Vienna, between an apple strudel and a coffee – and this is not by chance if you think of the cultural tradition of Viennese coffee houses, places for communicating and exchanging ideas. Tool IT’s “leitmotiv” is precisely that, of providing the most efficient tools for company communication. In the beginning, the company was a classic IT business with a wide portfolio of services, but 10 years ago, it chose to direct itself towards VoIP and Unified Communication. Continue reading “Partner Story from Austria: TOOL IT”