Acme Packet Extends Outsourcery’s Cloud Offerings for Businesses

UK-based cloud service provider Outsourcery has selected Acme Packet Net-Net session border controllers (SBCs) to extend its broad cloud product offerings for businesses. Acme Packet’s SBCs will support Outsourcery’s launch of Microsoft Lync 2010 and allow geographic distribution across multiple sites.


Outsourcery, which is Microsoft’s worldwide ‘Hosting Solutions Partner of the Year‘ 2010, notes that it will use these SBCs to deliver SIP trunking services to Outsourcery’s hosted Microsoft unified communications (UC) customers.  Acme Packet specializes in session delivery network solutions and enables the trusted, first-class delivery of next-generation voice, data and unified communications services and applications across IP networks.

For this project it has deployed the Net-Net 3820 SBCs in multiple high-availability (HA) pairs at Outsourcery’s access and interconnect borders.

The deployment will deliver several benefits such as securing the network, routing VoIP and UC sessions as well as aggregating usage statistics for its customers.

Outsourcery claims it offers one of the broadest cloud product solutions for businesses in the world. It is a founding member of the Cloud Industry Forum (CIF) and also the UK’s first carbon neutral UC and hosted IT solutions company.

We chose Acme Packet for a number of reasons, including their market leadership and experience with Microsoft UC deployments in enterprise and service provider networks,” said Ryan O’Reilly, head of Telecoms Infrastructure & Networks at Outsourcery. “The Net-Net 3820 SBC will play a key role in our network as we expand our customer base and add new services to our IP communications portfolio.”

Service providers worldwide recognize Acme Packet’s proven track record in next-generation hosted services solutions,” said Dino Di Palma, Acme Packet’s senior vice president of worldwide sales and business development. “Our commitment to interoperability pays dividends to service providers such as Outsourcery as they build out hosted UC and other service offerings.”

By Anuradha Shukla

Sorry, comments are closed for this post.

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…