8×8 Acquires Cloud Call Center Services Provider Contactual

8×8 Acquires Cloud Call Center Services Provider Contactual

8×8 has acquired cloud-based call center and customer interaction management solutions provider Contactual acting on its intent to buy the company on September 12, 2011.

Headquartered in Redwood City, California, Contactual provides small businesses and enterprise departments with an efficient way to improve customer satisfaction while lowering costs. The company has been acquired for 6,700,000 shares of unregistered 8×8 common stock on September 15, 2011. The companies note that this share amount was reduced at closing by 215,100 shares as 8×8 agreed to pay statutory tax withholding on behalf of five former executives of Contactual, Inc.

This strategic move is expected to broaden 8×8’s technological expertise and service offerings in the hosted SaaS (Software as a Service) call center market. Acquisition of Contactual also brings in house the only major software technology of 8×8’s service offerings that was not owned and developed by 8×8.

Together, 8×8 and Contactual become a formidable competitor in the customer interaction management and contact center space,” said 8×8 chairman & CEO Bryan Martin. “With our combined resources, longevity in the market and proven solution, we are in a unique and powerful position to quickly and effectively meet the needs of the growing number of businesses seeking non-premise, cloud-based call center services.”

Contactual and 8×8 have shared a business relationship since 2007.  8×8 has been reselling the Contactual contact center technology since then and has now made a strategic investment to advance its mission of becoming the industry’s premier provider of broad-based cloud communications and IaaS (Infrastructure as a Service) solutions.

8×8 is a pioneer in the development of cloud-based VoIP, video, mobile, and unified communications solutions. The company was in news last month for appointing Vance Raeside to lead Federal Government cloud-based sales initiative.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…