Page 14 - Telecom Reseller FebMar 2016
P. 14




14 Telecom Reseller February/March 2016

IBOS
continued from page 13

But this  exibility, along with the CapEx and UC enables a wider range of communications: 
OpEx savings inherent in any hosted solution, not just voice, but video, chat and  le sharing, IP telephony devices have weak links and are running OS kernels that risk 
come with a caveat: UC is easier for hackers to too.  e more ways that organizations can 
attack when it’s in the cloud than when it’s on communicate internally and externally, the being exploited. As a result, VoIP hardware should be isolated on their own 
premise.
more opportunities hackers have to steal 
 ere are several reasons why it’s a mistake con dential documents and eavesdrop on the networks to eliminate the risk that a breach will create back doors into other 
to assume that hackers will ignore voice and board of directors’ video conferences, to name 
video and instead focus on an organization’s just two examples.
network-attached devices.
other assets, such as customers’ credit card UC is on track to become as ubiquitous in the 
information:
enterprise as telephony has been for decades. 
Some will target VoIP for the same reasons  at’s because organizations recognize the 
they attacked circuit-switched voice, such as bottom-line and competitive bene ts of making deployments.  is democratization means more  ey require opening ports to enable the  ow of 
to steal service, facilitate fraud and harass an it available to all employees, especially when usage, which means more opportunities for data, which means additional unwanted tra c 
organization and/or its customers.
cloud-based UC lowers the cost of widespread
hackers to  nd what they want.
is able to  ow freely. However, organizations 
As more organizations become aware of
can take precautions, like installing session 
these risks, it threatens to limit the market for border controllers (SBCs) to close ports that 
cloud UC services.  e good news for cloud UC aren’t required and protect their networks from 
resellers and their customers is that these risks dangerous tra c.  e legacy, on-premises PBX 
Make sure your agents have can be minimized.
architecture was isolated to the enterprise from 
the business tools to leverage One strategy is to identify the unique an IP networking perspective and used the 
vulnerability in each type of UC service. Some PSTN for multisite interconnect. In contrast, 
available information and
examples:
UC is typically deployed as a multisite IP service 
do the job right.
IP telephony devices have weak links and are that requires opening a wide range of ports, 
running OS kernels that risk being exploited. which creates a security risk.
For resellers, the bottom line is that by As a result, VoIP hardware should be isolated 
• Identify and Act Upon Training Opportunities understanding UC’s vulnerabilities, they on their own networks to eliminate the risk 
• Comply With Legal Requirements
can help their customers secure their that a breach will create back doors into other 
• Increase Ef ciency and Performance
communications. And by protecting UC, network-attached devices.
resellers protect the market opportunity. ■
Instant messaging will serve as an entry 
• Ensure High Customer Satisfaction
point for security breaches the same way that TR
email has for decades, such as when employees ADVERTISING
Contact the communications recording
click on an IM and get malware as a result. Call: 360 260-9708 
and quality monitoring experts to get your Implementing technological safeguards and • Toll Free: 
free assessment at www.goserco.com or employee best practices, such as not clicking on 800 667-8965
.
links from contacts they don’t know, helps shut Web:
call 1-800-285-0108 and press 2 for salesthe IM back door and thus protects the rest of http://telecom- reseller.com/ 
the UC system.
TELECOM .COM
category/in-print/ 
Integrated platforms are at the heart of UC.
RESELLERtelecom-reseller/








You are the Service Provider

You should be in 


the driver’s seat.



VoIP Logic gives you the best platform 

using the leading technologies to run 
your Hosted PBX business.



Control:

VoIP Logic allows you all of the control associated with facility 
ownership. This allows you to adapt your offer, differentiate 
from your competition, evolve with the market, retain ownership 

of your customer data, add new services, features and devices, 
choose network and prioritize your technical objectives.


Flexibility:
VoIP Logic provides you the  exibility to determine your cost basis 
and the options which give your business a distinct advantage. This 

 exibility puts the key decisions about choosing your network 
carriers, bandwidth access, devices, services, features, platform Let us be your pit crew.
add-ons and external integrations in your hands.
We’ll leave the driving to you. 
www.voiplogic.com









   12   13   14   15   16