Page 13 - Telecom Reseller September-October 2016
P. 13

12 Cloud Questions
TR
The Newsource on UC ● UCaaS ● Collaboration ● Mobility
VIEW
Telecom Reseller 13 Every Company
January/February 2016
Upgrade your Router
September/October 2016
Telecom Reseller 13 Should Ask Itself
Voice QoS, Multi WAN Redundancy, Content Filter & Network Security
The Latest TR EDUcasts
CHANNEL
environment (part 1)
by 2019.
lf
The Newsource on UC ● UCaaS ● Collaboration ● Mobility
RESELLER.COM VIEW Podcasts
Call ABP
S
curity industry must embrace
The Newsource on UC ●
S ● Collaboration ● Mobility
profitable, secure andEevfefircyieCnotmwpoarnkying
31-1600 to discuss your application. www.DrayTekUSA.com COLWELL RUFFIN PATTERSON
TELECOM VIEW
TR The Latest AG PAGE 23 By Pat Patterson, Director of
Org Design Determines
Nortel Notes Telecom
E1
5
e
VVIEIEW The Latest EDUcasts
emand for cloud services continues to surge, driven by corporations interested in so ware  exibility and scalability. But
Te
agement Success
Services for Avaya
modern PTT technolog1i2eCslfourdaQmuoersetions
DT
security services will be a nearly $9 billion market
S
h
o
u
yp
l
ro
d
A
how secure is the cloud? No surprise, analysts
pred
ict
sec
urit
duc
ts an
he global security industry is growing
at a rapid pace. More professional and
cosctlosauvdi’ns g se,xainbdlesOmpaErtxermaondesl a(foe reintdereapclotiyoends as
PCI Compliance in
betawseuebnscsericputrioitny-sbtas e.d cloud service) but may not
totally grasp the implications of adopting the OUcloTu-dD.  ATisEcDanCleOadMtoMwUellN-foICunAdTedIO(aNndSnot so
the Contact Center:
ROwUellT-fIoNunEdSed) fears about the security of a cloud Ansoimluptiornta. nAtsfacrteosruflot,rmsafneyanladrgee ccoimenptasneiceusraitrye
D
i
mo
teosr
ththe
i
oslno
ni nd g t h e i r
o
iniv
ti
hn
wa
n
’
t
L
ng
isn
espu
e
Be Fooled into
t
Y
...Part3of3
by Will Melendez,
Complacency
rcic
nd
CEO
o
o
veasts
intuersceoonfntehcetipounbbliectwcloeeund.guards and security contrAolcceonrdteirnsgwtohiolenepaetsrtoimlliantge, ecsopmecpianlliyeswwhietnh
c o v m e r o i r n e g t l h a a r n g e 1 a , 0 r e 0 a 0 s e s mu c p h l o a y s e s e h s o u p s p e i a n n g a m v e a r l l a s g , e of 1,154 cloud-based services, “ranging from
HEDBERGcontinuesonpage 16 ›› Complacency
the Contact Center:
s
u
efuc
PATTERSON continues on page 21 ›› Phishing and Vishing
PCI Compliance in
established strict guidelines for companies
that accept credit card payments, setting a host of developments into motion for industries
that utilize contact centers—and consequently,
OTHER POSSIBLE VARIATIONS
for resellers of contact center solutions. PCI
SURELYLIEAHEAD
compliance mandates are rigorous, fees for non- People buy hundreds of millions of smartphones
leniency being o ered to violators.
As criminals turn to using text messages and
to PCI compliance is staggering. More than 12 fraud both at home and at work. We will see
million businesses in the United States accept more worm, virus, spam, and smishing attacks
cardT
(www.voice4net.com)
d
clou
r
C
e
k
I
locuo
ialeti
MELENDEZ
fK
(www.knowbe4.com)
do,rwd
s
t
by Stu Sjouwerman, founder
he PCI Security Standards Council has
a
no
o
d-
l
t
wBe4
MELENDEZ
compliance can be debilitating, and there is little every year, creating a rich market for scammers.
 e extent of organizabtyioWnsilltMhaetleanredeszu,bject VoIP to target victims, we can expect to see more
b
Executive Vice President of
Global Sales at Voice4Net
-based payments, through online, mobile, against mobile users via SMS, mobile Internet,
and voice communications, and are therefore
B l u e t o o t h h e , a P n C d I WS e i c - u F r i . i t y S t a n d a r d s C o u n c i l h a s
subject to PCI DSS (Data Security Standards)
 e foelslotawbilnisgheadresatrfiecwt goufidtheelinemesefrogrincogmorpanies
regulations.  is means the market base for inc
reasinthgamt aecthceopdtscorfedsmit icsahridngpaoyrmviesnhtisn, gs:etting a
companies who need to implement compliant Mhosbtiolef dbaenveklionpgmfreanutds:inAtsomorteiopneofoprleinudsuestries
contact center solutions is similarly wide-
thetihramt uotbiliilzeepchonteasctoceanctcers—onanlidnecobnansekqinuegn, tly,
reaching.
frafuodrsrtesreslwleirlsl toafrcgoent tahcetmcewnittehr msoolurteiorenasl.isPtCicI
s
ase
e
d
TELECOM
companies like Sony and U.S. government
and geographical borders among criminals, is
COLWELL RUFFIN
RESELLEPARGE .
VIEW
agencies, cloud security is in sharp focus.
one of the drivers of the increased demand for
OM Don’t Settle for
99% SLAs
C
The Latest
PAGE 23
As we said in August, the C-suite likes the advanced security services.  is calls for more
OLWELL
PAGE 15
nal Design Determines
RUFFIN
With recent high pro le cyber-attacks at coordinated operations across disciplines
E
PATTERSON
1
5
HEDB
G
By Pat Patterson, Director of
Podcasts Management Success D
Telecom a subscription-based cloud service) but may not
PAGE 23
to the Europol “Serious and Organized Crime
Nortel Notes by Magnus Hedberg, CEO of GroupTalk (www.grouptalk.com)
totally grasp the implications of adopting the Assessmenmt aRnedpoforrt”c. lGouardtnservpiucets tchoengtilnoubeasl to
N
o
R
rte
l Notes
cloud’s  exible OpEx model (o en deployed as intense surveillance andSesrevcicuersitfyo,raAccvaoyrading
cloud.  is can lead to well-founded (and not so security msuarrgkee,tdartiv$e8n6bny,cworitphoarnatniounasl ginrotewrethsteodf
well-founded) fears about the security of a cloud
clo
se to nininseop ewrcaernet , ecxitibniglit“ygraonwdinscgaclaobmilpitlye.xBituyt
solution. As a result, many large companies are
of ahtotawcksse”c.ure is the cloud? No surprise, analysts
investing in the private cloud, while slowing their Aprtetdhiectsasmeceurtimtyeptrhoedusecctus raintydicnldousdt-rbya sends
use of the public cloud.
itseslefciunraitycosnersovilcideastwioinll pbheasen,eadrlayp$ti9ngbinlleiown market
According to one estimate, companies with tecbhyno2l0o1g9i.es with a strong focus on digital
more than 1,000 employees use an average servicWesitahnrdeoce netrshaigshSepcruo rilteycaysbaerS-eartvtaicek.s at
of 1,154 cloud-based services, “ranging from IntceonmsepcaonmiepseltikiteioSnoinytahnedinUd.Su.stgroyvaerenmalseont
squaegeznincigesp,rcolo utsd, fsoercuinrigtyseiscuinristyhacropmfopcaunsie. s
PATTERSON continues on page 21 ›› to focAus wone msaiodreinloAguisgtiucsatl,lythe Cc-iseunitesolilkuetisotnhse,
n
t
Be Fool
Executive Vice President of Global Sales at Voice4Net
TDon’t Let Your Clients
SJOUWERMAN
(www.voice4net.com)
e
d
i
n
p1-24_TR_JanFeb_2016.indd 13
Mlenoibeinlecyembeainl gdow enrleodadtos: vPieoolaptloerisn. creasingly
a c c e s  s t h e e e i x r t e e m n t a o i l f a o c r c g o a u n n i z t s a t u i o s i n n s g t s h m a t a a r r t p e h s u o b n j e e s c , t
matkoinPgCiItceoamsieprlifaonrctehisevsteasgtgoedrionwg.nMlooadre than 12
m a ml i c i l i l o i o u n s s b o u   s wi n a e r s e s e t o s i t n h e t h p e h Uo n n e i t s e . d M S o t a s t t e p s h a o c n c e e p s t
donca’trhda-vbeasaendtipvairyums epnrtost,etchtrionuglihkeonPlCinsed, om, osobile,
detaencdtiovnoiicsemcoumchmmuonriceadtio ncsu, latnfdoratrheethuesreerf.ore
p1-24_TR_JanFeb_2016.indd 13
05/02/2016 20:0
at 972-8
P
anizational lecom Man
UCaa
C
Organizatio Telecom
texctomepslsiagnecsetmhaatnlodoatkeslikareethriegyo’reoufrso, mfeetshfeobr annokn-
MELENDEZ continues on page 16 ››
or coremdpitliuanicoenc.an be debilitating, and there is little
FsuakbejeacctcteosPs CpoIiDntSsS(A(DPast)a: BSoecgursitWy Si-tFaindards)
netrwegourklastilonosk. l ikeislemgietaimnsatheeshmaarerkdehtobtasspeoftosr
in pcoumblpicapnliaecsews h(souncheeads taoiripmoprtles,mceon teceosmhopplisa,nt
andcohnottaeclts)c.eWntherensoulusetirosnlos gisinsimoriluasrelytwheidse-
accresascphoiningt.s from their PCs or mobile phones,
criminals capture all their data.
MELENDEZ continues on page 16 ›› With new technologies rolling out every
SJOUWERMANcontinuesonpage 21 ››
05/02/2016 20:02


































































































   11   12   13   14   15