With Voice over IP rapidly taking over the telephone market, BC and Alberta businesses are looking for the same kind of management of their Voice and Video network as is available for data networks. Enter Skyway’s Modern Edge: a fully managed SD-WAN cloud service which allows you to maximize the advantages of our modern SIP Trunks, Hosted ...
What are the the advantages of SD-WAN (Software-Defined Wide Area Networking) over other networking solutions? The standard WAN technology for businesses with multiple locations has been MPLS or Multiprotocol Label Switching. While MPLS is reliable, fast, and widely accessible, it can also get very expensive as your business, or its serving locations, expands. This is one ...
SIP trunks offer a direct connection between a provider’s network and a customer’s devices, for significant cost savings and business process improvements.
With fewer people working in your office, are you still paying for expensive landlines? We’ve helped several clients move their phone number(s) to our Auto Attendant Virtual Receptionist service, allowing calls to seamlessly connect to mobile or home phones. We can also provide desk phones or software clients for remote use; either way, you have the potential to ...
Transform your business to the modern digital workplace Digital Transformation is the use of new, fast-changing digital technology to solve problems. It often utilizes cloud computing and reduces reliance on user-owned hardware while increasing reliance on subscription-based cloud services. The modern Digital Workplace provides a new way of working for employees and new techniques to ...
This Post republished with permission from our Partner, Ribbon Communications Original Post published by Ribbon, Thursday, December 6, 2018 by David Walsh, Founder, Kandy The real time communications (RTC) industry continues to evolve at warp speed and 2018 was no exception. As Communications Service Providers and enterprises continually try to maintain their dominance in an ...
Part 5: The IBM “Immune System” Approach: a Security Chastity Belt? It has been awhile — I apologize! I have been busy attaining accreditation from the world’s largest security vendor, IBM! At IBM they speak about an “immune system” approach as opposed to “layers” and it’s a remarkable difference. According to them, many companies have ...
Part 4: Define, Assess and Prioritize Your Security Architecture “And a step backward, after making a wrong turn, is a step in the right direction.” ― Kurt Vonnegut, Player Piano Before we commence our discussion on security architecture as part of our security evolution, I’d like to share a recent relevant experience. While scoping ...
Part 3: What to Expect in a Security Assessment Hi again fellow cyber-security concerned business people! In my last security post (Five Areas for Complete Coverage), I promised to begin our cyber security journey with a “security assessment”. First, make sure you go into that security assessment in the right frame of mind. Focus on ...
Part 2: Five Areas for Complete Internet Security Coverage Hello again cyber security-concerned business people… Last post I wrote about the somewhat confusing landscape of cyber security. Let’s continue on that theme with an eye to removing some of the confusion. “One step at a time” is the required approach — this isn’t exactly rocket ...