Acme Packet Extends Outsourcery’s Cloud Offerings for Businesses

UK-based cloud service provider Outsourcery has selected Acme Packet Net-Net session border controllers (SBCs) to extend its broad cloud product offerings for businesses. Acme Packet’s SBCs will support Outsourcery’s launch of Microsoft Lync 2010 and allow geographic distribution across multiple sites.


Outsourcery, which is Microsoft’s worldwide ‘Hosting Solutions Partner of the Year‘ 2010, notes that it will use these SBCs to deliver SIP trunking services to Outsourcery’s hosted Microsoft unified communications (UC) customers.  Acme Packet specializes in session delivery network solutions and enables the trusted, first-class delivery of next-generation voice, data and unified communications services and applications across IP networks.

For this project it has deployed the Net-Net 3820 SBCs in multiple high-availability (HA) pairs at Outsourcery’s access and interconnect borders.

The deployment will deliver several benefits such as securing the network, routing VoIP and UC sessions as well as aggregating usage statistics for its customers.

Outsourcery claims it offers one of the broadest cloud product solutions for businesses in the world. It is a founding member of the Cloud Industry Forum (CIF) and also the UK’s first carbon neutral UC and hosted IT solutions company.

We chose Acme Packet for a number of reasons, including their market leadership and experience with Microsoft UC deployments in enterprise and service provider networks,” said Ryan O’Reilly, head of Telecoms Infrastructure & Networks at Outsourcery. “The Net-Net 3820 SBC will play a key role in our network as we expand our customer base and add new services to our IP communications portfolio.”

Service providers worldwide recognize Acme Packet’s proven track record in next-generation hosted services solutions,” said Dino Di Palma, Acme Packet’s senior vice president of worldwide sales and business development. “Our commitment to interoperability pays dividends to service providers such as Outsourcery as they build out hosted UC and other service offerings.”

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…