Page 17 - Telecom Reseller April-May 2014
P. 17















COLWELL –
TelecomReseller
 SEE PAGE 19
TM Interaction 20
BUSINESS STRATEGY
20

& TELECOM
UCNetworks
MANAGEMENT
Ruffiffin 27 27
UCNetworks
STRATEGY


SEE PAGE 19
ASK THE PRO
The Voice of Unifified Communications and Collaboration
Colwell
19

The Voice of Unified Communications and Collaborations


NixoN 
A
UDIN
Of-site,outof
ffit, t f by Gary Audin – Note: This blog was
miind? Nott so
originally posted at www.nojitter.com
ffastt:: On-siitte power wiitth How Real is Cloud Data
clloud serviices
Center Sustainability?

TBByyDDuussttoonnNNixixoonn,,MaarrkkeettininggCCoommuunnicicaattioionnssSSppeecciaialilsistt,,
M
ininuutteemaannUUPPSS
erms have been used too often as generic,
M
M 
without formal certification. As a result,
oviing tteelleephonee ssysstteemss,, sseerrv-- 
yoeursm, ayanfidnddtahteaclsotuodrasegrevicoeffysoiuteusheais
ers, and data storage offsite has 
ess reliablbebetehccoaonmaedevaearttitosoepdp. prriiorriitty fforr bussii--
l
neesThsseessaodofvfeanaltllossfiizczleoesus,,dusesuruavalicllyeyswowffiitethrheadatherefoftutyghlliisstt 
odofaftrareeqcqeunitirereremsmreaeninstetsstatonoeiemnspsuouretearnretelqliiauabebisiltliiottyny.:.“How
Thee ffeeelliing iiss offtteen outt off ssiightt,, outt off reliable are cloud services?” Cloud-based data
miind onccee ttheessee sseerrviicceess haavee beeen aaccttii-- centers can be configured many ways, from non-
SeeeEnngaageeClolouudaatt: : vaatteed..Theerreeaalliitty,,howeeveerr,,iisstthaattttheeyaarree redundant to fully redundant operations. The
EntterrprrisiseConnectt20114
onllyaassrreelliiaablleeaassyourrowniinffrraassttrrucctturree.. non-redundant is the least reliable configuration,
Bootth4011 How ccaan you eenssurree aa sstteeaady lliink tto yourr while the fully redundant is expected to be
cclloud??IIttssttaarrttsswiitthrreelliiaablleepoweerr.. 
Marrch117--20,,20114 the most reliable but also the most expensive
Orrlalando,,FL
to implement and operate. Are you sure that
A Sttrrong Connecttiion Begiins wiitth
cloud data center operators are providing useful
Sttrrong Powerr
Cloud-Based Call Recording & WFO Ideal for information about their sustainability?
Alll cclloud sseerrviicceess,, no maattteerr how rreellii-- 
It has been claimed that at least one company
aabllee,,deepeendonaassiimplleeiintteerrneettcconeeccttiion 
SaaS and Other Hosted Service Providers
promoted Tier III classification for its data center
SSeeeNNIXIXOONN, ,ppaaggee2266
uptime, without having the Uptime Institute
certify that this was true. The standards for 
Tier I through IV as specified by the Institute
L
beeeneuwswed aisisgseneric terms, have unfortunately
One off ttoday’s’s hotttesstt ttrrendss iin SaS iiss tthe grrowiing rrankss off which has led many enterprises to assume that
cconttacctt ccentterrss and bussiinesssess ssekiing cclloud--bassed ssolluttiionss Encrypttiing tthe a particular data center satisfies the Institute’s
fforr ccalll rreccorrdiing,, qualliitty managementt,, and ottherr worrkfforrcce requirements, when in fact the facilities have not
wave off biig datta 
opttiimiizzattiion((WFO))sserrviiccess..
been certified.
Parrtt 1 
TellSttrratt’s’s Engage Clloud llettss you ttap tthiiss hiighlly prrofifittablle AUDIN continues on page xx ››
marrkett tto upsselll yourr exiissttiing VoIIP ssubssccrriiberrss and rreacch BByyJJoonnaatthhaannLLeewisis,,ddirireeccttoorrooffpprroodduuccttmaarrkkeettiningg,,SSSHH 
enttiirrellynewccussttomerrss..Bessttoffalll,,youccandotthiisswiitth::
CCoommuunnicicaattioionnssSSeeccuurritityy
L
Wd
haatt iinveenttorry sshoulld bee ttrraanssffeerrreed
EWIS
•• Noccapiittallorrottherrup--ffrronttiinvessttmentt
oussee??Howw aarree ccussttomeerrs hiicch waarreeh
ttowhs
•• Yourrexiissttiingiinffrrassttrrucctturre
ussiing ou s
rr weebssiittee?? How aarree tthee maarrkeetts By: Jonathan Lewis, director
• • T Te e l l S S t t r r a a t t h h a a n n d d l l i i n n g g a a l l l l i i m m p p l l e e m m e e n n t t a a t t i i o o n n & & s s y y s s t t e e m m m m a a n n a a g g e e m m e e n n t t
ttrreendiing?a
? Todaay,, you ccaan ussee Biig Daatta of product marketing, SSH
ttoheellps
iinfforrmbussiinneessssdeciissioonss aaccrross
CommunicationsSurityiindussttrriieess.. Thee prreevaalleenccee off Biig Daattaa –
EngageClloudiisshiighllyafffforrdablleandflflexiibllyprriicced,,wiitth aand iittss eeccossysstteem off aapplliiccaattiionss aand usseess Encrypting the Wave
botthssubssccrriipttiionandperrpettualllliiccenssepllanssavaiillablle..
–haassbaalllooneedoveerrttheepaassttdeeccaadee..Wiitth 
iinccrreeaassiinglly eeaassy aand ccosstt--eefffeeccttiivee ttoollss
of Big Data: Part 2 
Yourrcconttaccttccentterrandbussiinesssccussttomerrssarredemandiing Iaavaaiillaablleettoaanaallyzzee–aandmoneettiizzee–maass--
tthesserreccorrdiing&WFOsserrviiccessiineverriinccrreassiingnumberrss.. ssiivee aamounttss off daattaa,, orrgaaniizzaattiionss aarree n part one of “Encrypting the Wave of Big
Don’t’tmiisssyourrcchanccettogenerrattessiigniifificcanttaddiittiionallrrev-- diissccoveerriing neew waayss tto ssollvee prroblleemss Data” we discussed the rise of Big Data
enuewiitthtthessebussiinesss--ccrriittiiccallsserrviiccessfforrnoup--ffrronttccosstt!!
aandeexttrraaccttvaalluee..
and the security risks associated with this
Trraadiittiionaallly,, ccorrporraattee ssttaafff cconttrrollleed growth. Administrators may be aware of the
BigDataapplications,butastheusesof
Coonnttaaccttyyoouurraauutthhoorrizizeeddtteeleleccoomeeqquuipipmeennttrreesseellelerroorr i ata alicatis, t as te ses f problem, but stymied by how difficult the
Biig Daattaa haavee prrolliiffeerraatteed tthee aappss haavee 
TeelSlSttrraattffoorrmoorreeininffoorrmaattioionnaannddaalilviveeddeemoo!!
problem is to solve.
fifilltteerreed down tto tthee deepaarrttmeenttaall lleeveell aass 
Part of the issue in deploying a centralized
weelll.. Thee piioneeerrss off Biig Daattaa weerreen’’tt 
identity and access management to (potentially)
eesspeecciiaallly cconcceerrneed aaboutt sseeccurriitty aatt tthee 
millions of machine-based identities is the
onsseett,, yeett aass iittss ussee beeccomeess morree wiidee-- 
scsphprarelealaedndgoeorrogfaainmniizpzalaettimioensstimnmgucsshttatntaagkekeeonssisigynsnitiefifimccaantt 
ststhteeaptp’satltoroeaedenynsusuprreaentdthraauttnnBiinig. DWDahatetaan atahneaallyttiiccss’’ 
acacocmceepsslsexttoiotydoaafttamaigissraptrironotgteeaccntteednd.v.AiArondmtethneetyneeed 
CaalllReccorrdiningIIQuaaliltityMaanaagementtIICoaacchining&E--LeaarrniningIISccrrenCaaptturreIISpecch&DesskkttopAnaalylytticicssIIWorrkkfforrcceMaanaagementt twtoitahacoctut tqiunuiticeckrkrlulyp;;titnthgeertrehe’e’ssyasatellomottinofpf rgogrgrorueusnsdis tto 
ssaleless@ttelslsttrratt.c.com||972--543--3500||www.t.telslsttrratt.c.com
ccoveerr..
LEWIS continues on page xx ›› SSeeeLLEEWISIS, ,ppaaggee2255

EEnnggaaggeeCCLLOOUUDDAAdd-T-TRR-J-UJUNNIOIORR-2-2-6-6-1-144.i.ninddd 11
22/6/6/2/2001144 1100:5:522:0:033AAM



p1-28_TelecommsReseller_AprMay_2014.indd 17
13/05/2014 20:24
   15   16   17   18   19