Taking The PBX Into The Cloud

Taking The PBX Into The Cloud

Taking the PBX into the Cloud

No matter how dramatic the reductions in OPEX, no matter how impressive the promised ROI, small and medium businesses cannot afford to rip and replace current infrastructure every time a technology breakthrough makes headlines. Take the case of the PBX—on-premise equipment and systems have become increasingly complex and unwieldy to support and upgrade.

Cloud-hosted PBX services, in contrast, offer an enticing list of cost-saving IP communications capabilities:

  • Enterprise-class unified communications features (audio-video conferencing, integrated voicemail and email, automatic call forwarding, and more)
  • Integration with other enterprise-class business applications (instant messaging, conference room scheduling, etc.)
  • Simplified administration (managed services model)
  • SIP trunking
  • Voice-over-IP long-distance services

What business doesn’t want to take advantage of cost savings and advanced features? Clearly, there is demand for these types of services and the cloud infrastructures exist, both private and public.The missing link is literally the link between the two worlds. To enable businesses to migrate to cloud-hosted PBX and other IP-based communications services the cloud service provider should include an edge solution that addresses several key requirements for the business customers.

Availability. The phones are mission critical, and any new communications feature will quickly become mission critical. While the cloud has built-in redundancies and automatic failovers, the connections to the cloud must also include redundancy and a failover plan to minimize or eliminate the impact of unforseen network based failures..

Quality. Dropped packets are tolerable in data streams; transporting real-time voice requires elevated quality of service. Converged voice and data traffic must be intelligently prioritized, giving real-time voice traffic preference over data traffic.

Security. With public-switched telephone networks, privacy is assumed. Sending your voice calls out to the cloud raises concerns about security, and maintaining control of sensitive company information that can be shared in voice communications, instant messaging, and other forms of unified communications. Security and policy management must be an integral part of the overall on-premise-to-cloud connection.

Reliability. A managed cloud-hosted communications solution must comply with service-level agreements (SLAs), which calls for a new class of tools and troubleshooting capabilities that can provide visibility to support engineers, and help isolate issues in the cloud, at the edge, or on the customer premises.

Interoperability. The PBX and IP worlds are both evolving and differences in vendor implementations of the VoIP signaling protocols often prevent interoperability An edge device that can manipulate the signaling protocol to ensure interoperability is critical to any successful deployment.

Affordability. For cloud services to attract high volumes of customers, the service—including the cost of the edge device—must be affordable to small and medium businesses as well as enterprises with larger technology budgets.

So is this merely a wish list? Is it describing the components of a future solution? If that were the case,  would be locked out of the cloud and stuck with aging, costly, PBX and telecommunications solutions.

Actually, the attributes above should be taken as a shopping list that can help those businesses find the right cloud service and edge device today. The list describes an enterprise session border controller solution, which provides businesses of all sizes the opportunity to drive down costs while giving employees the latest communications and collaborations capabilities.

The key is to find the service providers who support the best enterprise session border control devices, those that have been designed from the ground up for today’s networks and cloud infrastructures. Historically, SBCs emerged as devices deployed in the service provider core for linking IP networks. Today, the latest designs and technology innovations have resulted in an edge device that bridges on-premise and IP-based voice networks at the enterprise edge. The new generation of low-cost devices fit the budgets of small businesses with as few as 5 to 10 employees. The best designs also scale up to serve offices with as many as 5,000 employees and more.
Choosing your service provider and edge device should never call for compromises in any of the above areas. Communications and collaborations are too vital to your business. Today’s cloud services and the availability of affordable full-featured enterprise session border controllers mean that you don’t have to compromise.

Instead, without a major up-front investment, businesses can immediately leverage leading-edge collaborative solutions. Whether to augment existing features, or completely move to a new hosted solution, the cloud gives businesses exciting new choices.

Dave Martin Head Shot 2013By Dave Martin

Dave Martin is a recognized expert in the enterprise session border controllers, SIP trunking and hosted PBX markets.  He currently serves as Vice President of Marketing for Edgewater Networks, where he is responsible for strategic business planning, product marketing, partnerships and marketing programs to support the company’s ongoing growth. 

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

One Response to Taking The PBX Into The Cloud

  1. Hosted PBX is the future specially when it is in the cloud. if you are looking for a good service provider check into BroadConnect Telecom.

Comic
In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…