Page 14 - Telecom Reseller FebMar 2016
P. 14
14 Telecom Reseller February/March 2016
IBOS
continued from page 13
But this exibility, along with the CapEx and UC enables a wider range of communications:
OpEx savings inherent in any hosted solution, not just voice, but video, chat and le sharing, IP telephony devices have weak links and are running OS kernels that risk
come with a caveat: UC is easier for hackers to too. e more ways that organizations can
attack when it’s in the cloud than when it’s on communicate internally and externally, the being exploited. As a result, VoIP hardware should be isolated on their own
premise.
more opportunities hackers have to steal
ere are several reasons why it’s a mistake con dential documents and eavesdrop on the networks to eliminate the risk that a breach will create back doors into other
to assume that hackers will ignore voice and board of directors’ video conferences, to name
video and instead focus on an organization’s just two examples.
network-attached devices.
other assets, such as customers’ credit card UC is on track to become as ubiquitous in the
information:
enterprise as telephony has been for decades.
Some will target VoIP for the same reasons at’s because organizations recognize the
they attacked circuit-switched voice, such as bottom-line and competitive bene ts of making deployments. is democratization means more ey require opening ports to enable the ow of
to steal service, facilitate fraud and harass an it available to all employees, especially when usage, which means more opportunities for data, which means additional unwanted tra c
organization and/or its customers.
cloud-based UC lowers the cost of widespread
hackers to nd what they want.
is able to ow freely. However, organizations
As more organizations become aware of
can take precautions, like installing session
these risks, it threatens to limit the market for border controllers (SBCs) to close ports that
cloud UC services. e good news for cloud UC aren’t required and protect their networks from
resellers and their customers is that these risks dangerous tra c. e legacy, on-premises PBX
Make sure your agents have can be minimized.
architecture was isolated to the enterprise from
the business tools to leverage One strategy is to identify the unique an IP networking perspective and used the
vulnerability in each type of UC service. Some PSTN for multisite interconnect. In contrast,
available information and
examples:
UC is typically deployed as a multisite IP service
do the job right.
IP telephony devices have weak links and are that requires opening a wide range of ports,
running OS kernels that risk being exploited. which creates a security risk.
For resellers, the bottom line is that by As a result, VoIP hardware should be isolated
• Identify and Act Upon Training Opportunities understanding UC’s vulnerabilities, they on their own networks to eliminate the risk
• Comply With Legal Requirements
can help their customers secure their that a breach will create back doors into other
• Increase Ef ciency and Performance
communications. And by protecting UC, network-attached devices.
resellers protect the market opportunity. ■
Instant messaging will serve as an entry
• Ensure High Customer Satisfaction
point for security breaches the same way that TR
email has for decades, such as when employees ADVERTISING
Contact the communications recording
click on an IM and get malware as a result. Call: 360 260-9708
and quality monitoring experts to get your Implementing technological safeguards and • Toll Free:
free assessment at www.goserco.com or employee best practices, such as not clicking on 800 667-8965
.
links from contacts they don’t know, helps shut Web:
call 1-800-285-0108 and press 2 for salesthe IM back door and thus protects the rest of http://telecom- reseller.com/
the UC system.
TELECOM .COM
category/in-print/
Integrated platforms are at the heart of UC.
RESELLERtelecom-reseller/
You are the Service Provider
You should be in
the driver’s seat.
VoIP Logic gives you the best platform
using the leading technologies to run
your Hosted PBX business.
Control:
VoIP Logic allows you all of the control associated with facility
ownership. This allows you to adapt your offer, differentiate
from your competition, evolve with the market, retain ownership
of your customer data, add new services, features and devices,
choose network and prioritize your technical objectives.
Flexibility:
VoIP Logic provides you the exibility to determine your cost basis
and the options which give your business a distinct advantage. This
exibility puts the key decisions about choosing your network
carriers, bandwidth access, devices, services, features, platform Let us be your pit crew.
add-ons and external integrations in your hands.
We’ll leave the driving to you.
www.voiplogic.com