Thursday, February 23, 2012

Article: SIX Card Solutions Selects Mitel for Virtualized Voice

Check out the original release here...
"The supplier of a range of products and services supporting card-based electronic payment transactions selected Mitel's Freedom architecture to address the growing demand for mobility and the need to reduce internal costs. Mitel's solution offer additional functionality that will help SIX Card Solutions optimize internal communications and collaboration."
Ok, so SIX Card Solutions is a Swiss company based in Lexembourg, but this release is an excellent example of how a major technology company, anywhere in the world, can increase their functionality and efficiency while decreasing internal telecom costs. Besides, the release does mention that the Mitel solution will be extended to their Chicago office later this spring. By doing this...

"...SIX Card Solutions anticipates overall call costs between branches will be down 25 percent, with significant saving from transatlantic calls between Sweden and the United States. 'The call costs between Sweden and the US will be reduced to zero. Overall we think the return on investment will be in three years..."
If your company is looking to trim some fat around internal costs, or is just in the market for a new phone system, Mitel is definitely an excellent solution to any company, large or small, domestic or international.

If you're in Northern California and want to learn more about how Mitel can help you and your company, visit our website at www.mavericknetworks.net or e-mail us at info@mavericknetworks.net.


SIX Card Solutions Selects Mitel for Virtualized Voice
25 Percent Call Cost Reduction Calls and ROI in Three Years
Press Release: Mitel Networks Corporation - Fri Feb 17, 2012 8:00 AM EST

MECHELEN, Belgium, Feb. 17, 2012 (GLOBE NEWSWIRE) -- Mitel(R) (Nasdaq:
MITL - News), a leading provider of unified communications and collaboration (UCC) software solutions, today announced that SIX Card Solutions will replace their legacy communications infrastructure with Mitel's virtualized voice solutions. The supplier of a range of products and services supporting card-based electronic payment transactions selected Mitel's Freedom architecture to address the growing demand for mobility and the need to reduce internal call costs. Mitel's solutions offer additional functionality that will help SIX Card Solutions optimize internal communications and collaboration. Mitel partner CTTL is responsible for the implementation of the new communications environment.
Implementation of Mitel's IP communications solution, based on VMware, has been completed at SIX Card Solutions' head office and contact centre in Luxemburg, and at its branch offices in Sweden. Deployment of the Mitel solution will extend to SIX Card Solutions new office locations in the United Kingdom and Chicago later this spring.

By moving to Mitel's virtual voice solution, SIX Card Solutions anticipates overall call costs between branches will be down 25 percent, with significant saving from transatlantic calls between Sweden and the United States."The call costs between Sweden and the US will be reduced to zero. Overall we think the return on investment will be in three years," says Benoit Collet, IT manager at SIX Card Solutions Group Luxembourg. "In addition, the flexibility of the new system is critical to support additional communications requirements to meet growing business needs."
Mitel's Freedom Architecture, including vMAS and vUCA, supports centralized management of the communications infrastructure. It also offers enhanced functionality including unified messaging, voicemail, mobility solutions, teleworking, collaboration and audio and web conferencing.
"We are specialized in processing card-based electronic payment transactions for several leading hotel and restaurant chains. Being able to respond quickly to those customers is critical. With SIX Card Solutions offices in multiple countries, we were not able to achieve the type of dynamic working environment with the centralized management required with our old system," says Collet. "After comparative market research we selected a virtualized voice in combination with UC. Flexibility, ease of use and integration with other systems were key selection criteria. Mitel was the only supplier that met all our needs."
"The project at SIX Card Solutions is a great example of why and how organizations with branches worldwide can benefit from IP telephony," said Jozef Van Royen, channel director for Mitel Belgium and Luxemburg. "Our communications portfolio supports the growing need of organisations for more effective communications and call cost reductions."
About Mitel
Mitel (Nasdaq:MITL - News) is a global provider of business communications and collaboration software and services. Mitel's Freedom architecture provides the flexibility and simplicity organizations need to support today's dynamic work environment. Through a single cloud-ready software stream, Mitel delivers a powerful suite of advanced communications and collaboration capabilities that provides freedom from walled garden architectures and enables organizations to implement best-of-breed solutions on any network; extends the "in-office" experience anywhere, on any device; and offers choice of commercial options to fit business needs. For more information, visit: http://www.mitel.com
The Mitel Networks Corporation logo is available athttp://www.globenewswire.com/newsroom/prs/?pkgid=8599
About SIX Card Solutions
SIX Card Solutions, with offices in Luxembourg, Sweden, UK, Germany and Germany, has been at the forefront of credit card processing since 1986. Today SIX Card Solutions leads the market in integrated card payment processing, providing Bespoke Solutions to hospitality, parking, retail and Internet merchants. SIX Card Solutions delivers secure, efficient, Integrated Card Solutions, enabling merchants on four continents to focus on their core business. SIX Card Solutions simplifies global card processing, everywhere.
About CTTL
Present on the Luxembourgish market since 1990, CTTL is already known in the telecommunications and security world. Today, the company is active as integrator in the three following sectors: Telecommunications, security and networking. CTTL is currently running with about fifty employees and serving about 1000 customers from both the finances, industry, healthcare, publics and services sector.
We are offering these customers a solution fitting with their existing needs. Based on their objectives and their constrains, we offer them innovative and pragmatic solutions. www.cttl.lu
Mitel and the Mitel logo are registered trademarks of Mitel Networks Corporation.
All other trademarks are the property of their respective owners.
Contact:
Mitel, Marieke Adama, Tel: +31 (0)30 8500 030, 
Email: marieke_adama@mitel.com 
Whizpr, Elke De Ridder, Tel: 052 55 33 26, 
Email: elke@whizpr.be 
CONTACTS (US):
Scott Smith (media), 408-884-5157, 
ssmith@sterlingpr.com
Amy MacLeod (media and industry analysts), 613-592-2122,
amy_macleod@mitel.com
Cynthia Hiponia (investor relations), 
613-592-2122 x71992, investorrelations@mitel.com


Wednesday, February 22, 2012

Mobile security - it doesn't have to be a Wild West standoff

Last month, we posted a blog about the “bring your own device” (BYOD) practice that more and more businesses are welcoming as a part of their internal communications. 

While we could speak all day on the plethora of benefits this provides for organizations, there’s another trend running parallel to this that IT directors should be wary of, and it’s not a good one.

"This network ain't big enough for the two of us!"
Think of the recurring use of personal devices for work purposes like the old, Wild West. There are many landscapes still being discovered while more and more people join the trend. But, like the Wild West, there’s still a lack of governance for these new landscapes. Therefore, there are more possibilities for some “bad apples” to take over the territories for themselves, putting peoples’ smart phones and tablets in jeopardy.
Nope. He's not living among the Kiwis.

Confused by the Wild West reference? We’re talking about hackers here, people. 

Hackers, like the people that have enough technical experience that they can take control of others' computers from their own device, no matter the distance between the two operating systems, or can sneak in to PBS’s network and tell the world that former rap star
Tupac Shakur was still alive and living in New Zealand (*cough* LulzSec *cough*).

In February 2011, PC World reported than cybercrime had doubled in growth "year after year," and according to Noa Bar-Yosef, senior security strategist for Imperva, 
"In the last half of (2010) there were 2,383 mobility-related keywords in hacker forum threads compared to only 264 on the previous half - almost a tenfold increase" (Keeping Data Safe When it Leaves the Corporate Nest).

These hackers are using the same tactics with mobile devices as they have for years with computers - installing malware, phishing, etc. The difference now, however, is that companies, particularly those with sensitive data, that allow their employees to use their own devices for out-of-office communication, are at a much higher risk of a security breach on their data and information than they were before.


Why is this the case? Because there is still limited IT control over these devices. A personal device is thought to be just that, personal. But when an employee makes the decision to bring it to work and use it for business-related transactions and communication, their phone is no longer
just their own device.

"Organizations need to respond to this trend by developing policies to address new mobile work styles that can drive productivity through more flexible working, while safeguarding the use of data and sensitive information," wrote Stephen Withers
in an article for iTwire last November.

Business Computing World lists some policies that can be developed and implemented by IT directors:
  • Remote wipe and lock: IT managers can required employees to install remote wiping software on their device before using it for work. This allows IT to lock down and erase data if the device is stolen or lost.
  • GPS tracking: "Some Mobile Device Management (MDM) solutions allow IT to send an alarm to the device to help identify the location for a user, and if truly lost, IT can then leverage the wipe and lock technology mentioned above."
  • Network authentication, authorization, account: IT can adopt a solutions that tie devices connected with the organization's network with each user's identity and role, then apply proper policies (depending on the role) to grant certain access privledges. "This enables IT to differentiate access for different levels of employees or guests, or even by device type. It also lets IT take a proactive stance on tracking and monitoring how mobile devices are being used within their network."
  • Secure remote support: Many users of BYOD use person mobile devices for work when out of the office - having a secure way to support and fix these devices from a remote location is necessary. It allows help desks to "configure devices, chat, transfer files, and even remotely see and control the device."
  • Acceptable use policy: As a company would expect its employees to use their computers only for work-appropriate purposes, so should it expect its employees to use their personal devices if they choose to use them for work. Having employees sign an Acceptable Use Agreement to allow them access to the company network with their person device allows IT to have a better grasp on the conditions under which the employee is allowed to use their phone. The agreement may include conditions, such as installing a device certificate or the remote wipe software, or state that devices can be seized if necessary for legal matters.

     While some may see IT taking such measures as a bit controlling, at the end of the day, it will ensure security, not just for the company's data, but also for the person to whom the device belongs and
    their personal data (i.e. banking information, personal account logins, contact information, etc.). And, just like in the old, Wild West, when a new sheriff comes in to town (or, in this case, a new IT policy regarding personal devices), keeping order is a shared responsibility between both parties. The "sheriff" lays down "laws" to ensure everyone's safety, and if people follow these laws, they're less likely to be harmed by malicious, external forces.

Monday, February 13, 2012

Virtualizing for the future

No. Not this kind of virtualization.
This week, Maverick Networks CEO, Aaron Lee (@MaverickVoIP) is at the VMware Partner Exchange 2012 in Las Vegas. VMware is a global leader in virtualization, partnering with companies like DELL, MITEL, Intel, ShoreTel, etc. to “improve the efficiency and availability of IT resources and applications.” 

“Virtualization?” you ask?


Yes. Virtualization.


You’ve probably heard the word buzzing around the IT industry for a few years now, but only recently has virtualization made such a large impact in the way companies conduct their business. While to some it may sound like a video game that allows you to live in an alternate reality from your own (which
would be really cool to have as part of company protocol and procedures), to others, virtualization is something even cooler (at least in terms of IT efficiency) than a virtual reality video game.

According to Storage Virtualization for Dummies, virtualization is,
 
“the act of abstracting, hiding, or isolating the internal functions of a storage (sub)system or service from applications, computer servers, or general network resources for the purpose of enabling application and network independent management of storage or data…” or, more simply aggregating “storage components, such as disks, controllers, and storage networks, in a coordinated way to share them more efficiently among the applications it serves.”
Here’s how VMware virtualization works: a thin layer of software is inserted directly on to the computer hardware or on a host operating system. This makes the machine a virtual monitor, or “hypervisor” that allocates hardware resources dynamically and transparently.
“Multiple operating systems run concurrently on a single physical computer and share hardware resources with each other. By encapsulating an entire machine, including CPU, memory, operating system, and network devices, a virtual machine is completely compatible with all standard x86 operating systems, applications, and device drivers. You can safely run several operating systems and applications at the same time on a single computer, with each having access to the resources it needs when it needs them.”
In summary, storage virtualization allows for multiple operating systems to run on a single computer (including Windows, Linux, and more), with each virtual “machine” sharing the resources of that one, physical computer across multiple environments. This frees up all of the space originally taken by each and every server.

But saving storage space isn’t the only perk about virtualization.


Earlier this month, we posted a blog about shopping for the best total cost of ownership (TCO) in addition to shopping for a new phone system. We pointed out that when you purchase a new phone system and new handsets, you aren’t purchasing
just the hardware – you’re also purchasing the type of upkeep the products will need, as well as the training that IT managers and employees will need to become accustomed to the new system. Another aspect to think about is what the return on investment will be with upgrading the phone system.

When adding a storage virtualization solution to a system upgrade, the ROI increases even more, faster.


In addition to condensing servers, virtualization solutions:
  • Increases energy efficiencythe less servers running, the less energy your business is consuming, meaning a smaller energy-consuming footprint for your organization, and energy costs reduced by 80 percent.
  • Improved disaster recovery solutions - using VMware, organizations can effectively and rapidly recover data with automation; recovery includes non-disruptive testing automation and simplified testing of recovery plans; affordable recovery that doesn’t require a duplicate, idle datacenter, and hardware infrastructure can be consolidated at both the production and failover sites to reduce costs.
  •  Reduced datacenter costs – by reducing your physical infrastructure and improving your server to admin ratio, fewer servers and related IT hardware means reduced real estate and better management tools allows for reduced personnel requirements.
The additional benefits of virtualization are, well, virtually endless. As businesses’ capacities expand and cloud computing becomes increasingly relied on for data storage, there is no doubt that there will be a need for the same businesses to go completely virtual with the telephony and IT needs.

At Maverick Networks, Inc. we are continuously working to offer the best IT solutions for our customers and clients. With the advancements in the IT industry even in the last year, we truly believe that virtualization will be the next business necessity when it comes to upgrading, updating or expanding telephone systems.



Stay tuned for more information about virtualization when Aaron returns from VMwarePEX 2012 and shares his insights with the Maverick crew later this week.

For more information on how Maverick Networks can help your organization become virtualized,
visit our website or contact us at info@mavericknetworks.net.

Monday, February 6, 2012

AVST releases new product line to increase small-to-midsize business productivity

Last week, Applied Voice and Speech Technologies, Inc. (AVST), announced its unveiling of a new product line of enterprise-class unified communications (UC) solutions for small-to-midsized businesses (SMBs). The new product line, AVST CX-S, includes AVST Mobile for iPhone® and Android™, speech0enabled automated attendant and person assistant, unified messaging, single number reach and voicemail.

“By integrating with all major IP-PBX brands, premise-based and cloud e-mail solutions, CX-S enables SMBs to unlock the full potential of their existing communications infrastructure and achieve measureable business productivity improvements with new mobile and speech-drive UC solutions from AVST.”
To learn more about AVST CX-S and its features, click here.

Wednesday, February 1, 2012

Total Cost of Ownership - What are you REALLY paying for?

Purchasing a new phone system is like buying a new car. If you’re in the market for a new automobile, you’re not going to fork over money for the first piece of metal on wheels that you see. Chances are, you’ve researched the kind of car you want – the year, the make, the model, the engine power, etc. Then, when thinking about how much you’re going to spend on the car, you don’t think of how much just the car itself will cost. Other factors come in to play financially – the interior of the car (do you want leather or cloth?), the built-in amenities (do you want a car that’s OnStar-ready, or one with hands-free, Bluetooth capabilities?), the type of tires the car needs, the oil that goes in it, the type of gas it needs (regular, premium, or diesel?), and, most importantly, how much car insurance will cost with your new purchase.

If you’re an IT director at a company in need of a new phone system, you’re probably shopping for handsets and network providers in the same way. You’re going to look at different vendors and providers that match your company’s needs to the products available from these suppliers. You’ll look at the pricing of the products and services and compare them to what your company’s budget can afford. But one of the main things you should be wary of when shopping for a new phone system is the total cost of ownership (TCO), especially with an economy that’s seen brighter days.

Considering the financial landscape of the last four years, IT spending may not be at the forefront of many CIOs’ agendas. However, according to an article on CIO.com, a survey conducted by CDW IT Monitor revealed that there is an uptick in economic confidence with increasing IT budgets.

“CIOs are looking at every IT investment in terms of how it makes sense for the business and our data shows they are still spending on key investments including software and hardware – particularly mobile devices, virtualization and security... The investments that are being planned by CIOs for late this year reflect a decided shift to software installations – at a level that CDW calls the greatest on record, and covering a significant part of their organizations.”
With the shift of budget focus to software installations that allow for mobility, virtualization and security, analyzing the overall TCO of a purchase from a vendor is incredibly important.

Last month, ShoreTel revealed results from a comprehensive industry study from Aberdeen Group that showed ShoreTel Unified Communications solution as having the lowest TCO in the telecommunications industry.

"The survey of 236 different businesses validates that ShoreTel’s unified communications solution is the easiest to use, deploy and manage when compared to other solutions in the market today…

ShoreTel’s UC solution was designed from the ground up to take advantage of IP technology – making it better suited to the realities of business than other ‘IP-enabled’ legacy technology or bolted-together systems, which are inherently complex… Enterprises can scale with ease by simply plugging in an addition switch – without the need to rip and replace infrastructure. Moves, adds and changes (MACs) can easily be performed in-house because of the ability to manage users instead of devices, reducing the time, complexity and cost of system administration. These fundamental differences are what enable ShoreTel to provide the lowest total cost of ownership in the industry.”
When considering a phone system, measuring the TCO requires planning for the future. Important things to consider outside of the hardware itself are installation and implementation (ensuring proper cabling and a service provider that is compatible with your phone system), maintenance costs (in a perfect world, the only time an organization would need a new phone system would be for an upgrade to keep “with the times”… but it’s not a perfect world, and things break, wear out, and stop working), additional application add-ons and their compatibility with the phone system (like we’ve mentioned before, mobility and BYOD are increasingly being adopted by businesses to expand their efficiency and cut costs), training (let’s face it – new technology, especially conference-capable technology, can be confusing and hard to learn on your own), and licensing.

Upfront training cost for new Deployments from Aberdeen study.

The survey also revealed that ShoreTel IP phone deployment took only 53 minutes to complete as compared to Avaya Aura, which took more than 2.5 hours for each phone, and the cost for recurring training for a ShoreTel system was 85 percent less than the recurring training cost for an Avaya IP Office system.

At Maverick Networks, Inc., we partner with companies like ShoreTel to ensure that our customers and clients are getting the most for their money. We offer the best products at competitive prices because we know that it’s the quality of the products and services that matter the most in the long-term when it comes to IT spending.

For more information on what we offer, or to get a quote for your company’s UC needs, visit our website or contact us at info@mavericknetworks.net