Frequently Asked Questions

Click On Section Or Scroll Down To Read More

Contact Center Frequently Asked Questions

The benefit of CCaaS is you pay only for the features you need. You can choose exactly what is required and pay for that alone. As your requirements grow, you can add more features and functionality.

Yes you can. This is a very popular scenario. An overlay architecture can add a CCaaS layer on top of your existing PBX. consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

No. Cloud solutions already come with redundancy included. 

This is dependent on many factors such as your network, number of seats, business type and many other factors. However most businesses see a full deployment within 45-60 days. 

Desktop - (DaaS) Frequently Asked Questions

This depends on your situation. You have to consider hard and soft costs when looking to implement a DaaS solution and the accessibility and security it provides when considering cost.

DaaS is considered extremely secure. 

We recommend that you keep an IT department that can help make informed decisions and understand the system. However, it does allow IT to play more of a strategic role. 

Varies by each solution. Based on user environment and applications. 

Disaster Recovery Frequently Asked Questions

  • Office documents
  • Images
  • Videos
  • Sound files
  • Databases
  • Regulation controlled data (PCI, HIPPA, Others)

IoT Frequently Asked Questions

By devoting the necessary resources to your businesses needs, we can determine the impact of IoT integrations on your business. This may include engineering and sales resources to pay you a visit and complete an assessment to determine the best supplier/provider and benefits.

No they are not. Based on several factors data centers are placed into one of 4 tiers. They all are relevant and meet different business needs. These tiers are:

  • Tier 1 – 99.671% Uptime, Lacks Redundancies
  • Tier 2 – 99.741% Uptime, Power and Cooling Redundancy
  • Tier 3 – 99.982% Uptime, Multiple Power Sources, Uplinks, and more
  • Tier 4 – 99.995% Uptime, Full Redundancy, Error Tolerant

 

You can track:

  • temperature/humidity
  • Room environments
  • Refrigeration units
  • Trucks
  • Drivers
  • Lights
  • Basically anything with a computer

This means you need to understand what you need to track and we can figure out how to implement it.

Most carriers for data centers are extremely secure. Especially if you compare it to an on-premise solution. There are several forms of security that generally apply to gaining access to data within a data center including:

  • Key card access
  • Security checkpoint
  • Security escort
  • Multifactor access
  • Man traps
  • CCTV – recorded and backup for at least 90 days
  • Barriers around all access points
  • Ballistic glass

Suppliers usually provide a portal which can be accessed by authorized users. You can also set up certain triggers and notifications within the portal to customize it based on your business needs.

Yes. Most suppliers will have remote access to your IoT system. 

Data centers generally plan for the worst possible scenario and have multiple built in redundancies. However, based on the failure or catastrophe, it is rare but possible to have the data center shut down.

IT/Cyber Security Frequently Asked Questions

It is important to know that over 75% of breaches are because third-party vendors and their products have vulnerabilities. This is because they sometimes have a poor environment of control processes. It is equally important to choose vendors that both have a strong history of security and they follow the same security practices that the hiring organization has. This also includes making sure that third-party vendor contracts have security control requirements. 

There are many important factors that go into securing any organization. Making sure that there are no weak links is very important. This means that educating and training employees through the entire organization is a key part of maintaining that security. This includes creating, implementing and maintaining strong policies and procedures as well as adhering to those policies. 

If you don’t have a plan in place to deal with security incidents, then you will already face many challenges. Through understanding all scenarios, and points of vulnerability as well as forming a response plan that is run by trusted individuals that work across the organization is equally important.

There are many things you can implement to build a more secure organization. Multi-factor authentication, encryption of data, investigation of anomalies and abnormalities, controlling user access and controlling user privilege to control software are just a few of the things that should be included.

Meeting Services Frequently Asked Questions

Most suppliers understand that it is not practical to have a reinvestment into hardware if it already exists. This is why most platforms implement their solutions “over-the-top” of existing hardware and infrastructure through the internet. This means that almost all phone and video hardware is able to be reused.

Many providers will be able to offer Meeting Services standalone. However, there are some who have their system setup to purchase Meeting Services with other required services. You will be provided all solutions that are viable for your organization and have ample time to make a decision.

The short answer is yes. Any participant or member requirement will be discussed and supported through our suppliers. 

Yes, most of our suppliers and platforms offer comprehensive integrations and support for existing voice platforms. 

SD-WAN Frequently Asked Questions

There are no single points of failure in the SD-Wan architecture.  For the distributed WAN architecture, a hybrid SDN approach offers the benefits of centralized control plane policies, but with distributed local control plane forwarding with local real-time knowledge of link conditions for reliability.  All local Edge devices will continue functioning as normal even if communications with centralized orchestrators is disrupted.  Onsite Edge devices support high availability configurations and any cloud gateways utilized are also redundant with sub-second failovers.

SD-WAN provides the flexibility to support hybrid WAN connectivity combining private with public Internet circuits or pure Internet only connected sites.  The various Dynamic Multi-path Optimization techniques ensure all different WAN circuits are utilized to their fullest based upon pre-defined performance and capacity rules.

Traditional QOS with the DSCP and TOS markings is not possible over the internet.  However, if you look at the way traditional QOS rules operate, they only go into effect if you run out of bandwidth.  And when you run out of bandwidth, then the QOS rules are designed to reserve bandwidth for the critical applications like voice and video to prevent loss and jitter. If you think about it, traditional QOS rules are basically designed to eliminate loss/jitter and to ensure the voice/video packets have the best chance possible to get to the end destination.

SD-WAN techniques like packet replication and best path selection provide the same end results.  Replicating each voice packet over 2 or 3 internet links eliminates the chance for loss or jitter affecting the call. Best path selection used in conjunction also chooses the links that have the least amount of loss and jitter; not just low latency or up/down status.  While they don’t utilize the same tagging concept, the techniques utilized still yield the same end result — eliminating loss and jitter and ensuring the packets have the best chance possible to get to the destination.

By default, all site-to-site enterprise traffic are sent over encrypted tunnels independent of the underlying transport — usually AES128/SHA1 ipsec tunnels.  Internet-bound traffic typically isn’t as much.  However, settings can typically be changed — even the encryption levels.

UCaaS Frequently Asked Questions

This is a common rebuttal from businesses looking at different UCaaS providers. The major reasons include the potential for saving costs, adds productivity benefits, allows for new collaboration under a unified approach, and helps to manage everything on the admin side. We would love to chat and break down all the benefits for your specific business environment and needs.

The short answer is: YES, because most business networks and internets are built for this time of bandwidth use. However, each network is different and by asking a few simple questions during our discovery and assessment, we will determine if there are any requirements for changes and what those changes are. This will ensure that you have the highest quality of call and voice quality for your UCaaS system. But like we mentioned, most networks support this already and can easily be extended without much cost or investment if a need to expand does occur.

Yes. Mobility is just as important as reliability and customers don’t stand for a lapse in either one. One of the primary benefits of UCaaS is to simplify mobile application implementation, deployment, and management. Many businesses opt for a mobile-first strategy that allows them to build for mobile primarily with desktop support where required. 

UCaaS has fully redundant, always available multi-data infrastructure that provides service available at guaranteed even if a data center fails. This means that no matter the failure your service will remain unaffected.

Subscribe and Get the Latest Updates

Scroll to Top