Page 1 - Telecom Reseller May June 2019
P. 1
TR
Should Ask Itself
TR
Podcasts Telecom Management Success
TR
Voice QoS, Multi WAN Redundancy, Content Filter & Network Security
p1-24_TR
with their high frequency, globally dispersed
2018
Organizational Design Determines
Nortel Notes
CHANNEL
The Latest
Should Ask Itself
TELECOM
The Latest 03
n
Businesses and Residential LANtelligence, Inc. and
RESELLER .COM
Customers
agencies, cloud security is in sharp focus. transformation. To a large extent, this is
Prodoscore Announces the Vendor Evaluation: ‘How’
bySachaGera,SVPCloud
RESELLER Program
cloud’s flexible OpEx model (often deployed as measuring and improving PrIondguactse, RSibybsotne(wmwswA. nnouncesemployees and paretnetresrwprhisoehcauvestgormowenrsup
Prodoscore Partner
Matters Just As Much As
productivity, Jabra research
Services for Avaya
EDUcasts Transform gDEWaD ital
The Newsource on UC l UCaaS l Collaboration l Mobility
EDUcasts
Channel
predict security products and cloud-based
What Is Delivered
reveals
Belgium
totally grasp the impPliacattionsAopfpaodionpttsinNgTthSeas connecteedm. Eandtefroprrcisleosudansdercvaircreisecrsonwthinouaersetno’t
Business leaders lack
Talkdesk partnership brings
strategicapproachto
How to Stay
TELECOM
Call ABP at 972-831-1600 to discuss your application. www.DrayTekUSA.com COLWELL RFOURFENFSINC PATTERSON
RESELLER.COM VIEW
Podcasts Telecom Management Success Telecom Pro
VIEW
FRAUD PAGE 15 REPORTING
ASKTHE May/June 2019 Telecom By Pat Patterson, Director of
TR The Latest PREVENTION IN PAGE 23
MEDIA PACK
Competitive in
ly
THE 5G ERA: 3 TIPS S Avaya
The Newsource on UC ● UCaaS ● CollaboratioAnN●ALMYToIbCiSlity 12 Clou uestions
VIEIEW
surge, driven by ions interested
REMELLA
COLWELL
Every C pany
The Newsource on l UC to The
C
or
Subscribe
lU
in software flexi scalability. But how secure is the clou rprise, analysts
PAGE 15
PAGE 23
As we said in August, the C-suite likes the being driven by a ncelwouBgdyencPoearntaPtaiotctnetrcoseofnc,utDesitroetmcotoerso,f
Organizational Design Determines
p1-231620:02
001_01 20:06
C
aa
Sl 05
llab
o
ation
lM
OR DATA
07 D
Nortel Notes
in
or
nues
to
ob
See page 11
in
t
by Will Melendez,
cardT
(www.voice4net.com)
eman
ility
d for c
lou
co
digQ corporat
ervices for
ds
er
vices
ld
om
bility and
d? No su
FPraeuvdention
ne
solution. As a result, many large companies are
andholewssseccoumrepeistithiveec. loud? No
surprise, analysts
investing in the private cloud, while slowing their Tpwrieldioicht assecduisrrituyppteroddtuhcetswaonrdldcolofuedn-tbearpserdise
use of the public cloud.
comsemcuurnitiycasetirovnicse, sbwuildl ibnegaanbeuasrliyne$s9s bvialliuoendmarket
According to one estimate, companies with
at obvye 2r0$159
.b i l
lion
d i b ml e
toeft
.ge.pTloVyedas
, bas
ed o
iEnrath:3eT5Gips
more than 1,000 employees use an average capitaWlizitahtiroenc,eannt dhihgahsprreocfielnetlcybtuern-aetdtaicnks at
of 1,154 cloud-based services, “ranging from seqcuoemnptianl iqeusalirkterSsonfygarnowd tUh.Sb.ygaotvterranctminegnt
largageeenctiersp, rcilsoeucdlisenctusrtiotytihseiinr s“hOavreprf-othcue-sT. op”
PATTERSON continues on page 21 ›› (OTTA)sswerevsicaeids,iinAclugduinstg, tchoemCm-sunitiecaltikioenssthe
(e.gc.lov uodic’se
eOsspa
netn(ed
fl a e nx
Egxinmg)o ,dceoln(
PCI Compliance in
anda smuubsiccr)ipatniodnc-lboausded-bcalsoeud(see.grv. icoem) bputtemanydnot
comsomluutinoinc.aAtiosnasre(RsuTltC,)mdaenlyivlearegdevcioamspoaftnwieasreare
pla itnfov
s n, g t
by Dheeraj Remella, chief
erms
hine
ha
pslto
ti
llouw
w
use of the public cloud.
yt h h
Be Fooled into
eavp
er i b
veate
of 1,154 cfolorucdo-mbamseudnsiecravticoens,s“eravnicgeinpgrforvoimders CLoemgplaceyncy
th
e
C
n its
m
en c s
(CSPs) and their customers for
PATTERSON continues on page 21 ›› decades. According to research by the
Modernization
Communications Fraud Control Association
PCI Compliance in
o
MELENDEZ
(CFCA), organizations and carriers suffered
and Integration
losses of $29.2 billion in 2017. And to add
n
t
a
c
t
C
insult to injury, the rollout of 5G over the
ne
m
of
the
fra
Executive Vice President of
e
xt f
h
ew
ye
ars
w
ill
dr
ive
th
e
T
ud pr
Complacency
obl
e
em
ex
Because the li(gwhwtnwi.vnogicfea4sntestp.ceoemd)s promised TDon’t Let Your Clients
Industry
Be Fooled into
that accept credit card payments, setting a
before.
T
J
O
host of developments into motion for industries
Another rea
so
that utilize contact centers—and consequently,
nw
hy
5G
wi
ll d
compliance mandatesVaProefrBiugsoinreosussD, efeveslofpomrenot,n- are outsmarting the legacy tools being used
T
nd
to detect them. T
leniency being offered to violators.
M
compliance can be debilitating, and there is little
l
G
maps back to the fact that CSPs are no match
for resellers of contacbt ycePantreicrksJolgugteiorsnts, E. xPeCcuItive for savvy cyber-criminals, many of whom
E
telecommunications anomalies, databases
The extent of organizabtyioWnsilltMhaetleanredeszu,bject here are many good reasons to upgrade
must be faster than ever. Utilizing traditional
to PCI compliance is staggering. More than 12
d , t ow
diloe
e
pon
Global Sales at Voice4Net
by 5G are sure to increase the number of
he PCI Security Standards Council has
connected devices in the world, offering
established strict guidelines for companies
more opportunity for exploitation than ever
G
L
nti
03
PAGE13 VPIEAWGE15 AndD10UsbHeadsets
security services will be a nearly $9 billion market
Amazon Chime Certification
08
Daily
AppSwarm and Deep Sky Sidepath Achieves Platinum
TELECOM
eBull
09
For Sennheiser’s Sc 165 Usb
Mobile Launching VoIP
by 2019.
Partner Level with Intelisys
News
With recent high profile cyber-attacks at UFFIN nterprise communications and
C
LWELL
GER
eti
O
CommunicationServicefor PATTERSON
A
R
companies like Sony and U.S. government collaboration are undergoing a major
Telecom a subscription-based cloud service) but may not ribNbeonwcoPmamrtuniecartsioins.Fcroamn) ce and
mobile first, cloud first and who are constantly
1
1
lead Ctoewrteilfil-efoduCndheadnn(aenldPnarotnseor w serviincessoaftnwdarceapflaebxilbiitliietsy rainskd bsceacloambiilintyg. lBesust
cloud. This
adaptingsfuarsgtee,ndoruivgehn tboyccuosrtpoomraetriodnesminantedrsesftoerd
can
well-founded) fears about the security of a cloud
LEARN HOW TO CONNECT THE DOTS
BETWEEN UC NETWORK HEALTH AND CUSTOMER EXPERIENCE
UC monitoring tells you when something breaks, but UC service management will tell you that something’s about to break – so you can act before customers notice.
VSM keeps lines open and customers connected, flagging potential problems before they disrupt customer experience.
CONTACT US:
Learn how proactive UC management trumps break-fix management, every time, from the company that manages billions of UC system transactions every month.
See how our cloud-based toolset Virsae Service Management (VSM) is changing the rules of UC service management.
_JanFeb_2016.indd 13
www.virsae.com sales@virsae.com 1-800 248 7080 @Virsae
››
technologist, VoltDB
ing their
GERA continuesonpage 10 ›› According to one estimate, companies with
ar
li
e
c
em
en
E
E
Ribbon Communications (www.
o id
en
tif
yn
ribboncommunications.com)
ket
stotroatgaell)yogffrearsipntghse. WimhpiliecaCtiomnsmoufnaidcoaptitoings the SercvloicuedP. Throvisidcearns l(eCaSdPtso)wareell-infoaunudneiqdu(eand not so
REMELLA
the Contact Center:
poswiteilol-nfotuonodwend)tfheearnseaxbtoguetntehreatsieocnuoriftyreoafl-aticmloeud
DF
more tharnau1d,00h0asembepelnoyaenesounsgeoaingavperroabglem
o
n
’
t
L
e
t
Y
o
u
r
C
e
n
R
N
etw
Executive Vice President of
real time communications (RTC)
disk and cloud-based databases lengthens
million businesses in the United States accept
Global Sales at Voice4Net
networks and platforms, which are
the response time before an anomaly is
-based payments, through online, mobile, impacting the way Communications Service
detected, leaving legacy tools behind the
and voice communications, and are therefore Providerhse(PCCSIPsS)ec–uarnitdy tShtaenednatredrsprCisoeusntchiel yhas
8-ball and costing carriers thousands of
subject to PCI DSS (Data Security Standards)
serve – aersetapbllaisnhneidngst,rbicutdgueitdinelginfoesr faonrdcoromllpinangies
dollars every time it occurs.
regulations. This means the market base for
ou tpurethInatearcncetpPtcroretodcitocla(rIdP)paeynmvieronntsm,senttisn.ga
One of the most notable facets of 5G
companies who need to implement compliant
Ahos stthoefdiegvitealol premvoenluttsiiontoacmceolteiorantefos racinrodsustries
is the fact that it will lead to a massive
contact center solutions is similarly wide- evetrhyatausptieliczteocfohnotawctwcenlitveersa—ndanwdocrokn, IsPeq- uently,
rise, not just in the volume and velocity
reaching.
basfoedr rsesrevlliecres oafrecodnistaructpctiengtehroswoluctoinonsus.mPeCrsI
of data streaming in, but also the level of
andcobmupsilniaenscsesmcoanmdmatuesnaicraetreigaonrdouens,gfaegees for non-
complexity associated with processing the
MELENDEZ continues on page 16 ››
in compmliearnccee. Fcaronmbemdoebilietatpinpgli,cantidonthsetroe is little
data to identify and prevent scams. It stands
omlenniciehnacnynbeleicnugstoffmereerdsetorviicoel,aatonrds.from web-
to reason that traditional fraud prevention
centrThic e-ecxotmenmt oerfcoergsoanluiztiaotniosntsot“heavtearryethsuinbgjeacst
techniques implemented by CSPs will not be
a steorvPiCceI”cboumsipnleiasnscaepipslisctagtigoenrsindge.lMiveoredthvaiant1h2e
viable anymore. Today, CSPs must constantly
clomudil,lieovnerbyutshiinegssiesscihnatnhgeinUgn. ited States accept
contend with hundreds of distinct and
Tcaerledc-obmasecdarpraieyrms eantds,etnhtreorupgrhiseosnulined,emrsotabnilde,
ever-changing fraudulent schemes, along
theaynmd vuosticme coodmermniuzneitcoatrieomnsa,iann(doarrbeetchoemreefo)re
masrukbejtelcetatdoePrsC. IODnScSe (dDigaitalStercaunrsiftoyrSmtantidoanrdals)
origins, and multiple layers of machine and
prorjeegcutlsagtieotnusn. Thderiswmaye,acnosnttheendminargkwetitbhaslegfaocry
network generated anonymity, making fraud
tecchonmolpoagniieessawnhdoinfereadsttrouicmtuprlemiseontecofmthpleiant
extremely hard to detect and prevent.
bigcgoenstaocbtscteanctlersstohleuytifoancse.isThsiemgiolaorldynweiwdes-?
When it comes to uncovering fraud, in-
Threeraecihsinog.needto“ripandreplace”legacy
event detection and prevention is far more
phone systems – or any other technologies – to
desirable than post-event reconciliation.
MELENDEZ continues on page 16 ›› leverage software-driven RTC advantages.
Once fraud occurs, charges are levied either
JOGGERSTcontinuesonpage 10 ›› REMELLA continuesonpage 4
n
t
o
a
tiall
S
e
gn
ri
D
ork
a
t
itu
s
r
:
d
y. Why?
ve fraud
E
Z
05/02/2016 20:02
4_TR_JanFeb_2016.indd 1
6_TR_SeptOct2018.indd 9
05/02/20
02/10/2018
NEWS
SUBSCRIBE TODAY
TELECOM RESELLER
P.O. Box 1826
Stuart, Florida 34995-1826
PRSRT STD U.S. POSTAGE
CHANGE SERVICE REQUESTED
PAID
The Bureau, Inc. 33406