Page 7 - Telecom Reseller August-September 2019
P. 7

Upgrade your Router
Voice QoS, Multi WAN Redundancy, Content FilteTerlec&om NReseltlewr or7k Se
TR T
 August/September 2019
   CHANNEL
T E
he breakneck pace at which digital transformation is occurring is dizzying. From cloud migration to
TE OM
super-charged network speeds to artificial
PATTER
By Pat Patterso Services for Av
Upgrade your Router
The Newsource on
U
Telecom Reseller 13
lication. www.DrayTekUSA.com
V
ITAD Companies Can Flourish
oS, Multi WAN Red
Newsource on UC
at 972-831-1600 to discuss
I
h
Subscribe to The Channel Daily News
D
eBulletin
EW
e Latest Ucasts
C
all
A
BP
a
t9
7
2
-8
3
1-
16
0
0
to
d
is
c
us
s
yo
u
r
ap
ty
l
l
l
l
p
C
U
C
a
a
S
C
o
ll
ab
o
ra
t
io
n
M
o
b
ili
    MEDIA PACK
Voice Q undancy, Content Filter & Network Security
2018
Should Ask It The Newsource on UC ● tion ● Mobility 12 Cloud Questions
 Fight or Flight in the Digital Age –
 The ●UCaaS ●Collaboration●Mobility 12CloudQue How IT Managers, Resellers, and
Call ABP your application. www.DrayTekUSA.com
Every Compa
   VVIEIEWW LEC
UCaaS ● Collabora
VIEW
Every Company
JEFF
COLWELL RUFFIN
LONDRES
   RESELLER .COM EDUcasts
intelligence, we can’t get enough technology
or innovation in our professional and PAGE 23
There are three players in the information D Telecom Management Success
The Latest
The Latest Podcasts
COLWELL
PAGE 15
ould Ask Itself
VIEW
 S
CEO at NextUse (nextuse.us)
h
personal lives. Nortel Notes
Organizational Design Determ
RUFFIN
ITAD vendors, and resellers. Will these
in
technology industry who are feeling Telecom
these growing pains deeply: IT managers,
es
emand for cloud services co
PATT surge, driven by corporation groups choose fight or flight? For savvy
E
R
S
  VIEW
The Latest Podcasts
PAGE 15
Organizational Design Determines Telecom Management Success
PAGE 23
Nortel Notes Telecom
D
how secure is the clo predict security pro security services will by 2019.
With recent high companies like Sony agencies, cloud secu
As we said in Aug cloud’s flexible OpE a subscription-base totally grasp the imp cloud. This can lead well-founded) fears solution. As a result, investing in the priv use of the public clo
According to one more than 1,000 em of 1,154 cloud-based
PATTE
PCI Com the Cont Don’t Let Be Foole Complac
The PCI Securit established stri that accept cre host of development that utilize contact c
 A new sound
standard
When talk matters
emand for clo surge, driven
in software fle
 The Sennheiser SDW 5000 Series is a flexible range of wireless headsets offering users rich and natural sound, enhanced security and triple connectivity. The two- microphone noise-cancelling system
and own-voice detection technology
work seamlessly together to guarantee exceptional speech intelligibility with every call. Manage all calls and devices with ease with this award-winning DECT headset providing a flexible choice of wearing styles and an array of smart features to increase productivity.
www.sennheiser.com/sdw-5000
 M
sion
als
, now is the time to think
IT
pro
N
in software flexibility and sc
By Pat Patterson, Director of
O
fes
of these challehnogwessaescouprpeoirstuthnieticelso, uwdor?kNo surpri
together, and forge ahead.
predict security products and clou
Services for Avaya security services will be a nearly $ Digital transformation = shorter
by 2019.
asset lifecycles to manage
ud services continues to
With recent high profile cyber-a
What does digital transformation mean to
by corporations interested
IT asset and dcaotamcpenatneirems lainkaegSerosn?yItamnedanUs.S. gove
xibility and scalability. But
keeping up wiatghetnhceiJeosn, ecsleosu, dorsbeectuterrityetis in sharp
ud? No surprise, analysts
the Googles, Ciscos, and Amazons. They
As we said in August, the C-suit
ducts andeecdlothuedl-abteasteadnd greatest networking
cloud’s flexible OpEx model (often
be a neaqruliypm$9enbtiallniodnunmifiaerdkectommunications
a subscription-based cloud service
(UC) platforms to ensure that their
totally grasp the implications of ad
endusers remain productive. They also
profile cyber-attacks at
need to knowctlhoautdth.eThsciosrceasnofledatdatfloyiwngell-found
and U.S. government
through the ether is secure. Encryption,
well-founded) fears about the secu rity is in sharp focus.
security patches and training may ward off
solution. As a result, many large co ust, thecCyb-esruaittealcikseasntdhespammers in real time,
x model (often deployed as
investing in the private cloud, whil
but what about the shortened lifecycle of all
use of the public cloud.
the assets moving and housing all that data?
d cloud service) but may not
What happensAtcocaollrdthiantggteoaroanseitesstimate, com
lications of adopting the
obsolescence mis oacrceetlehranted1,i0n0a0neemvepr-loyees use an
to well-founded (and not so
changing digital ecosystem? For the IT
of 1,154 cloud-based services, “ran about thpreosfescsuiornitayl,othf eaycalroeuhdoping to dispose of
many liat rgesepcoonmsibplaynaineds, aidreally, usePiAt tToTiEnRfuSOseN continue money back into their budget or get credit
ate cloud, while slowing their
ud.
through an equipment buyback program.
estimate, companies with
to know that a
ll c
omp
lian
ce
req
act Center:
ts
PCI Complianc
Enter the ITAD company as a
ployees use an average
unifying subject matter expert
serviceITs,m“ranagienrsgwfraonmt to upgrade their
the Contact Ce
equipment quickly, economically, and
Don’t Let Your C
RSON continues on page 21 ››
responsibly. They want a flexible, agile
partner who will get in, get out, and
evaluate their gear for resale or credit. If
pliance in
B
e
F
they are in a regulated industry, they need
are met. IT asset disposition (ITAD)
center component types, IP telephony/
VoIP hardware, plus servers, drives and
lore.
Nothing is black and white in this space.
peripherals gaT
MELENDEZ he PCI Security Standards C Challenges like secure data destruction,
o
o
Complacency
vendors are a critical part of closing the
loop in their process.
YouAnd this is also the point where the loop
r
C
l
i
e
n
ese
ll
er.
t
op
In the ITAD space, as technology
s
en
advances so must ITAD solutions. The
s fo
r
t
he r
d into MELEN ITAD space is all about used equipment
ency
so ITAD companies have to navigate
a multitude of brands, a bunch of data
l
e
u
ire
men
d
i
established strict guidelines f
compliance, product variety, transportation,
ustodtyhpartoaccecsseepstacllrnedeeitdctoard payme be addressed. It’s a complex process that
and chain of c
by Will Melendez,
Executive Vice Presidheonsttooff developments into motion
is labor-intensive from the time goods are
Global Sales at Voicet4hNaettutilize contact centers—and c
picked up to the time they arrive at the
(www.voice4net.com)
for resellers of contact center soluti
ITAD facility. ITAD solution companies
compliance mandates are rigorous,
must ensure that their data destruction
y Standards Council has
compliance can be debilitating, an
services are certified, that all asset
ct guidelines for companies
leniency being offered to violators.
dit card payments, setting a
The extent of organizations that
nto
by Will Melend
Executive Vice
Global Sales at
(www.voice4ne
   0619_TCReseller_PrintAd_SDW5064.indd 1
for resellers of contact center solutions. PCI
6/19/19 9:36 AM
s into motion for industries
to PCI compliance is staggering. M
 enters—andJcEoFFnLsOeqNuDeRnEtSlyc,ontinuesonpage 9
million businesses in the United St
 card-based payments, through onl compliance mandates are rigorous, fees for non-
compliance can be debilitating, and there is little
subject to PCI DSS (Data Security
and voice communications, and ar
                T O
s n s
n a
n s a s d
9
t r
e
)
o e
r
e
p
g
s
e n l
e P V t
o o
f o
d a
a i e
S regulations. This means the market
leniency being offered to violators.
   5   6   7   8   9