Page 9 - December January 2018 2019
P. 9
ry/February 2016
December 2018/January 2019
Upgrade your Router
Telecom Reseller 13
Telecom Reseller 9
TRR W EDUcas
M
oftware fleGxiebtitlitnygaonrdgascnaizlabtiolintya. lBbuuty-in translates
MEDIA PACK
TheNewVsoiucreceQonS,lMUuCltli WUACNaaRSeldCuonldlaabnocrya,tiCononlteMnotbFiliiltyer & Network Security
2018
CHANNEL
VVIEIEWW CO
The Latest
The Latest Podcasts
COLWELL
PAGE 15 PAGE 23
TR_MonthlyPrintAd_SDW5000.indd 1
companies who need to implement compliant contact center solutions is similarly wide- reaching.
Upg
r Router
Voice QoS
12 Cloud Questions
The News
y, Content Filter & Network Security
Call ABP at 972
ation. www.DrayTekUSA.com
ith unified communication being more
VIEW
ShouldAskItsLeYlNfCH
rade you
Telecom Reseller 13
1600 to discuss your application. www.DrayTekUSA.com
Call ABP at 972-831-
, Multi WAN Redundanc
ource on UC ● UCaaS Subscribe to
-8 discuss your applic
es ts
The Channel Daily News eBulletin
31-1600 to
t
VIEW
VIEW
Organizational Design Determine
Telecom Management Success
Telecom
Risk Identification Simplifies
● Collaboration ● Mobility
Project Management
s
Nortel Notes
hould Ask Itself
planning and operating these integrations by setting
By Pat Patterson, Director of
theSeprlvaincnesedfoor Abjveacytaive, implementing the plan, controlling, and supervising the entire
proper security measures and policies to meet them.
RUFFIN
Every Company
The Lat
common, it’s easy to forget the risk associated
The Newsource on UC ● UCaaS ● Collaboration ● Mobility 12 Cloud Questions convenience and high usage unified communication
ELEM COLWELLRUFFIN PATTERSON
with having numerous avenues where sensitive information can change hands. Because of the
by Ken Lynch, Founder and CEO of Reciprocity Labs reciprocitylabs.com
Every Company
systems have, they can become a target for bad-actors.
ESELLER .COM EDUcasts
Employees at all levels of a company can prevent a
variety of security pitfalls when risk identification is used
S
In IT, project management is geared towards describing
the need or goal, laying out the strategies for meeting emand for cwlourdk steoravvicoeisdceoxncteineduiensgtothe budget, and
PATTERSON
D
10/15/18 11:20 AM
surge, drivecnobmypcloertpinograetaiochnsstinepteirnesvtoeldved.
VIEW
The Latest Podcasts
PAGE 15
Organizational Design Determines Telecom Management Success
PAGE 23
Nortel Notes Telecom
in s how secu
Meet the Future Prepared
SDW 5000
Wireless Headset Series
The SDW 5000 wireless Series is a professional communication and collaboration hub providing total flexibility in your office. All your devices connect seamlessly through one single headset system. Super wideband sound offers a voice experience beyond conventional business standards, while a busy light ensures maximum productivity. Advanced security protocols keep your conversations confidential.
Meet the future prepared with the ultimate in professional communication tools. www.sennheiser.com/sdw5000
PCI Compliance in Be
By Pat Patterson, Director
Services for Avaya
PATTERSON continues on page 2
the Contact Center: Co
Don’t Let Your Client Be Fooled into Complacency
collaboration features
Global Sales at Vtohiacte4uNtielitz (www.voice4net.com)
T– Superior Sound: for reselle
Natural, rich sound with complian he PCI Security Standards Council has super wideband audio complian
established strict guidelines for compa
– Higher Productivity: leniency that accept credit card payments, settin
Busy light and advanced The ext host of developments into motion for indust
to PCI co that utilize contact centers—and consequent million b
for re–seEllnehrsanocfecdonSteacutrcietyn:ter solutions. PCI card-base compliWanicthe PmroatnedcatetedsPaarreinrgigaonrdous, fees for n
DECT Security certification and voice compliance can be debilitating, and there is l
leniency being offered to violators. subject to regulatio The extent of organizations that are subjec compani
to PCI compliance is staggering. More than contact c million businesses in the United States accep reaching.
predict se
D
security s
by 2019. emand for cloud services continues to With r
surge, driven by corporations intereste
compani in software flexibility and scalability. B
agencies, how secure is the cloud? No surprise, analyst
As we predict security products and cloud-based
cloud’s fle security services will be a nearly $9 billion m
by 2019.
a subscri
totally gr With recent high profile cyber-attacks at
cloud. Th companies like Sony and U.S. government
well-foun agencies, cloud security is in sharp focus.
solution. As we said in August, the C-suite likes the investing cloud’s flexible OpEx model (often deployed
use of the a subscription-based cloud service) but may
Accord totally grasp the implications of adopting the
more tha cloud. This can lead to well-founded (and no of 1,154 c
well-founded) fears about the security of a cl solution. As a result, many large companies a investing in the private cloud, while slowing use of the public cloud.
According to one estimate, companies wit
more than 1,000 employees use an average of 1,154 cloud-based services, “ranging from
PCI
the
Don
MELENDEZ
– Total Flexibility:
by Will Melendez,
A hub for all your people,
that
ExecutiveVicePhreositdeonftdoe audio sources and headsets
T
he P
esta
card-based payments, through online, mobil and voice communications, and are therefor subject to PCI DSS (Data Security Standards regulations. This means the market base for
re is the tcolocuodm? pNroehseunrpdrinisge,wanhaelryesths e project falls,
of
curity prpoadrutictuslanrldy cwloituhdin-btahsedbusiness objectives of ervices wyiolul brecoamneparnly.$A9 brisllkioenvemnatreknetails a possible condition or event that can either impact the
ecent higphropjreocfitlne ecgyabteivr-ealyttaocrkpsoastitively. Here are the d
es like SotnhyreaencdaUte.gSo. grioevseornf imdentified risks in IT: ut
cloud security is in sharp focus.
s
said in AlugRuisst,ktihneICnt-seugirteatlikoens the
xible OpIEntxemgroatdieoln(orftiseknfodceupsloeyseodnatshe issues that
arket
ption-baseemdecrlgoeudwhsernvipcreo)cbeustsemsaoyrnteocthnology fail to
asptheimwporlikcattoiogentshoefr,aldeoapdtiingttohethedisruptionof iscanleaedssteonwtiaello-fpoeurnadtieodn(parnodcensosteso.
ded) fears about the security of a cloud
As a result,RmisakniynlaErxgeccuotmiopnanies are
in the prEivxaetceuctlioundr,iwskhciloevselroswriensgisthaneicre within the as
public ccloumdp.any, stakeholder commitment, and not
ing to onreseosutirmceataev,aciolambipliatny.ies with
n 1,000 employees use an average
t so loud-basledRsiesrkviocfest,h“eraUnngkingofwronm oud
Even though anything can occur, not all re PATTERSON continues on page 21 ››
their
will. In spite of being defined as “unknown,”
Cont
most can be recognized by focusing on
Compliance in
h
other companies with similar projects and
assessing their progress.
a
l
ot
P
c
H
otential Risks?
t
C
ow
D
rs of contact center solutions. PCI
o
Yo
ce mandates are rigorous, fees for non-
ce can bT
linkedin.com/in/hugoroseiro/
ly, usinesse
)
ROSEIRO continuesonpage 11 ››
e
n
uS
e debilitating, and there is little
nies
being offered to violators.
ga
ent of organizathioenrsistehaotfaVreoiscuebojevcetr Internet
ries
mpliance is stagPgerroitnogc.oMl (oIrPe)thasni1n2troduced
t
p
1 ›› In IT, possible risks can be grouped into five categories.
’t Let Your Clients
Fooled into mplacency
e
r
:
s
LYNCH continuesonpage 10 ›› Can telephony
providers
MELENDEZ
survive in a
by Will Melendez,
digital age?
Executive Vice President of
Global Sales at Voice4Net
(www.voice4net.com)
CI Security Standards Council has
s accept credit card payments, setting a
fvelopmentsintomotionfboyrHinudguosRtorsiesiro,Director e contact centers—and coonfsPeaqrutneenrtslhyi,ps at
ROSEIRO
blished strict guidelines fo
r co
mpa
nie
SpeakIntelligence. Contact
through LinkedIn: https://www.
s in the UsenaimteldesSstatneds asctacteeplet ss connectivity
d paymeanctrso,stshrsoecutgohrso.nThlinise,gmloobbailliez,ation of on-
commutneilceapthionsy, amnadtcahresththereegfolorebal capabilities of ittle
PCI DSbSu(sDinaetassSaencudrhitaysSatlalnodwaerdse)nterprise to grow
ns. This mexepaonnsethnetiamllayr.ket base for t
eswhoneedCtlouimd-pblaesmedenctocnovmerpslaiatinotnshavemade 12
enter soludtiisotannscies sriemduilnardlyanwtitdoe-business transactions
t e,
but the technology not alone in doing so. Universal International Freephone Numbers
e MELENDEZ continues on page 16 ››
a
T R
O
nFeb_2016.indd 13 MELENDEZ continues on page 16 ›› 05/02/2016 20:02

