Monthly Archives: January 2017

Business Solutions Ideas

Many SMBs and SOHOs are walking away from their traditional phone companies and moving to the Internet for their telephony needs. In tech jargon, they’re switching from POTS (“plain old telephone service”) to Voice over IP (VoIP, pronounced as one word). Read on to find out what it is, why you should use it, and what to watch out for.

 

VoIP lets you make phone calls over the Internet with a number of advantages over your landline. It gives you low calling rates, especially when making overseas calls; excellent voice quality, rather than the muffled squawk of a traditional phone; and extra features (or easy access to the hard-to-use features you already have).

A phone using VoIP is different from a regular phone; instead of connecting to an analog phone line, it connects to a computer. That computer is usually called a VoIP gateway, and it’s the bridge between the handset and other telephone users.

 

Breaking it Down: VoIP Types

Cloud vs. Local

The gateway connects you to the regular telephone network, or to other VoIP users. Your gateway might be on-site, or it might be a hosted service—“in the cloud”—that you connect to via the Internet.

Running it yourself might be a good option if you have the expertise in-house, but for most people, a service is the simplest and least expensive option.

 

Which System?

Classical VoIP is based on Internet standards like SIP and RTP. The best-known example of a commercial service like this is Vonage; the best-known in-house product is probably the Cisco UCM Suite.

Some newer systems are based on a different standard, called Asterisk. This is a robust, battle-tested system supported by many vendors, including Fonality.

(Normally, you can ignore all this nerdy alphabet soup, but it’s helpful to know which standards your system uses, in case you ever need to know about compatible add-ons.)

No discussion of VoIP software would be complete without mentioning Skype. It’s probably best known as a consumer-focused, free, peer-to-peer service, but the company also offers a service aimed at businesses of all sizes. It’s not just a program you run on your computer; you can also buy dedicated desk phones that work with Skype.

 

Security

One of the advantages of VoIP over regular phone service is the extra security. In the VoIP world, voice scramblers aren’t just the preserve of the military.

It’s similar to working with a secure website, such as your bank. By enabling encryption, you get privacy for your business communication, plus authentication (i.e., protection against call rerouting).

Save money with cloud computing

Why move to the cloud? There are plenty of good reasons, but mainly it makes good business sense. You can call it efficiency, or call it doing more with less. But whichever spin you prefer, cloud computing lets you focus on what’s important: your business.

Cloud computing can be used for almost all types of applications, not just business security. While the idea of cloud computing can sometimes seem hard to grasp, it’s clear that it saves its users money – especially SMBs, including small office/home office (SOHO).

 

Plenty of oh-so-clever industry people will tell you what cloud computing is and isn’t. Here’s my simple view: It’s what we used to call software as a service (SaaS), but it’s set up so it’s easy to switch on, simple to expand and contract, and usually has a usage-based pricing model.

Read on to discover why moving to the cloud will save you money in five ways (six, if you’re picky)….

 

1. Fully utilized hardware

Cloud computing brings natural economies of scale. The practicalities of cloud computing mean high utilization and smoothing of the inevitable peaks and troughs in workloads. Your workloads will share server infrastructure with other organizations’ computing needs. This allows the cloud-computing provider to optimize the hardware needs of its data centers, which means lower costs for you.

 

2. Lower power costs

Cloud computing uses less electricity. That’s an inevitable result of the economies of scale I just discussed: Better hardware utilization means more efficient power use. When you run your own data center, your servers won’t be fully-utilized (unless yours is a very unusual organization). Idle servers waste energy. So a cloud service provider can charge you less for energy used than you’re spending in your own data center.

 

3. Lower people costs

Whenever I analyze organizations’ computing costs, the staffing budget is usually the biggest single line item; it often makes up more than half of the total. Why so high? Good IT people are expensive; their salaries, benefits, and other employment costs usually outweigh the costs of hardware and software. And that’s even before you add in the cost of recruiting good staff with the right experience.

When you move to the cloud, some of the money you pay for the service goes to the provider’s staffing costs. But it’s typically a much smaller amount than if you did all that work in-house. Yet again, we have to thank our old friend: economies of scale.

(In case you worry that moving to the cloud means firing good workers, don’t. Many organizations that move to cloud computing find they can redeploy their scarce, valuable IT people resources to areas that make more money for the business.)

 

4. Zero capital costs

When you run your own servers, you’re looking at up-front capital costs. But in the world of cloud-computing, financing that capital investment is someone else’s problem.

Sure, if you run the servers yourself, the accounting wizards do their amortization magic which makes it appear that the cost gets spread over a server’s life. But that money still has to come from somewhere, so it’s capital that otherwise can’t be invested in the business—be it actual money or a line of credit.

 

5. Resilience without redundancy

When you run your own servers, you need to buy more hardware than you need in case of failure. In extreme cases, you need to duplicate everything. Having spare hardware lying idle, “just in case,” is an expensive way to maximize uptime.

Instead, why not let a cloud computing service deal with the redundancy requirement? Typical clouds have several locations for their data centers, and they mirror your data and applications across at least two of them. That’s a less expensive way of doing it, and another way to enjoy the cloud’s economies of scale.

Comprehensive endpoint device security management

The variety of ways workers are now connecting together and to the web to work more effectively continues to grow.

 

As the connections expand, so do the steps that need to be taken to ensure those connections communicate with the network in a secure fashion.

Because employees increasingly are using mobile devices to connect to the corporate network, this puts pressure on IT to provide endpoint security and device management solutions that make sense for both the mobile worker and the enterprise.

Research firm IDC predicts that the number of mobile workers will increase to 1.19 billion by the year 2013. The variety of devices that these workers use to connect to the network will also continue to grow.

According to the iPass 2011 Mobile Enterprise Report, 73 percent of enterprises allow non-IT managed devices to access corporate resources. This is a figure that is likely to get larger as 83 percent of firms said they expect to support Apple’s iOS, while 77 percent anticipate supporting Android-enabled devices.

Each mobile device provides its own set of security vulnerabilities. Additionally, mobile equipment has less evolved security applications – most have no anti-virus or anti-spyware protection on the devices themselves. So endpoint devices are among hacker’s preferred targets.

According to the Juniper Networks Malicious Mobile Threats Report 2010/2011, there was a 400 percent increase in Android malware between June 2010 and January 2011.

To take advantage of the productivity offered by web-enabled endpoint devices, including laptops, smartphones and tablets, it is essential that firms adopt policies and procedures that protect enterprise data while enabling staff to use the mobile devices that best fit their needs.

Use Best Practices for Endpoint Security Solutions
There are a number of established best practices for endpoint security management- among these observances are:

  • Require the staff to sign policies and usage statements for all endpoint devices, including those owned by the business and employee-owned equipment. Policies and usage statements should clearly state the security and support that IT will provide, so it is responsible only for those apps and services that IT delivers and approves.
  • Use the cloud layer to route all network requests such as email and server access to block security threats before they can do any damage.
  • Place security solutions in the cloud. This method enables the enterprise to provide central endpoint device management and security rather than going to each device to install security applications.
  • Use the cloud layer to provide authorization capabilities, allowing workers to access different areas of the network, depending on their needs. For example, an auditor might need access to sensitive corporate financial information, while a customer service representative would need to access customer transactions.
  • Delete corporate information from endpoint devices in the event that they are lost or stolen or if the employee’s relationship with the company ends. The Juniper malware study reports that 1 in 20 mobile devices were lost or stolen.