Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype

Skype is the most popular cloud-based VOIP service. Since being bought out by Microsoft for $8.5 billion in 2011 the company has grown to more than 300 million users and now accounts for 34% of all international calls. Some people don’t want to use Skype though. Reports of poor customer service, in-call interference, or even a general dislike for anything touched by Microsoft all contribute to some potential users staying away.

What alternatives do these users have available to them? CloudTweaks offers four Skype replacements…

Grasshopper

Grasshopper styles itself as a more business-orientated solution than Skype. The service provides many of the features found in expensive office ‘Private Branch Exchange’ systems for a fraction of the cost. Features include support for multiple users (each with their own extension), individual greetings, voicemail, web access and notifications by email or text message, as well as the ability to have local or toll-free numbers for people to call you on.

The service is more expensive than the comparative Google and Microsoft services thanks to the advanced features available. The cheapest plan is $12 per month, though the most popular plan is $49 per month for 2,000 minutes. The most expensive plan is $199 per month for 10,000 minutes.

Google Hangouts

Google Hangouts is the most obvious replacement for Skype. While some users might baulk at using Google products in the same way that some hesitate to use Microsoft or Apple devices, this service is unquestionably the most widely used and full-featured. Google Hangouts launched in mid-2013 as a result of the homogenisation of several independent Google products such as Google Talk, Google Plus Hangouts, and Google Plus Messenger.

The software can replace most features of Skype. While it won’t allow you to directly call landline telephones until it merges with Google Voice later this year, both video conferencing and document collaboration are both supported.

ooVoo

ooVoo is messaging and voice/video calling service that features instant messaging, text chat, video calls, and twelve-way video conferencing. A unique aspect of the program is its ability to make calls directly from your web browser to other PCs without the need for software to be installed.

The service’s file and screen sharing works well and is great for collaborative work and online meetings. Purchasing premium credits allows you to call landline numbers in over seventy countries at reasonable rates, as well as connect landline callers to conference calls. Unfortunately, of all Skype’s competitors, ooVoo has the most expensive PC-to-phone calls.

Before installing the desktop software you need to be aware that the free version is ad-supported. It will also try and install the ‘Ask Toolbar’ when you run the installer – be vigilante when clicking through the installation options.

Tango

This California-based start-up was launched in September 2009 by Uri Raz and Eric Setton – both of whom remain at the company as CEO and CTO respectively. The service already boasts 200 million users worldwideTango is a free app that, in addition to video calls, is also optimised for voice calls, texting, sharing, and playing games. It is mainly aimed at the mobile market, with most of its users using the Android or iOS client to access the service, though there is also a PC client available.

Critics of the service say video quality is sometimes uneven, and there are occasional delays and poor voice-syncing in video calls.

Your Opinion?

Do you like Skype? Have you found a suitable alternative? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…