UCaaS Project Step By Step Part 5 - Testing

Posted by John Teeling on Jun 6, 2018

Step 5 - Testing

In our blog series, there has been a lot of emphasis on attention to detail and setting up a project that is steeped in “tried and true” project management fundamentals. We are now at the point where we have worked with the customer to ensure that we captured their requirements to the best of our ability. We’ve designed and developed a solution with the customer’s approval. Finally, we’ve had our implementation team provision and deliver that design to specifications. Now comes the final piece – testing – to ensure that what we provisioned and delivered functions to the manufacturer’s specifications.

Read More

Tags: UCaaS, Customer Experience, CCaaS

Detecting an Embedded OS Infected with Conficker On Patient Medical Monitoring Device

Posted by lantelligence on May 22, 2018

Healthcare Struggles To Protect Health Data 

5,579,438 patient records were breached in 2017, according to new data released on 23 of January 2018 in the Protenus Breach Barometer Report. Insider threats can remain undiscoverable for long periods of time. The Report states that "on average, it took 308 days for an organization to discover it had suffered a breach in 2017."

Read More

Tags: Vigilant, Cyber Security, Insider

UCaaS Project Step By Step Part 4 - Provisioning & Delivery

Posted by John Teeling on May 15, 2018

Step 4 - Provisioning & Delivery

Up to this point in our blog series, we have primarily been talking about the initial steps for getting a project off to a successful start from an administrative and design perspective. With this segment, we cover assembling the items needed to build and deploy a UCaaS Project to the customer’s specifications.   

Read More

Tags: UCaaS, Customer Experience, CCaaS

UCaaS Project Step By Step Part 3 - Solution Design

Posted by John Teeling on Apr 13, 2018

Step 3 - The Solution Design

In our blog series, we pretty much have the prerequisites out of the way, and it is time to start executing for the customer.  When it comes to a design, that means taking the project requirements as defined by the customer, performing data collection (using templates) and creating a design document with the results of that data collection.  

Read More

Tags: UCaaS, Customer Experience, CCaaS

POS System Update With The Infected Code - Case Study 

Posted by lantelligence on Apr 5, 2018

Attack Attempt To A Large Dealership

“When someone uses third party software or devices like POS Systems, medical devices etc., they are at the mercy of the levels of security the vendors have built into them. Vigilant CyberDNA can give you visibility into remote devices without needing to have any agents installed on them."


Read More

Tags: Vigilant, Cyber Security

Mitel Connect Client User Interface Overview 

Posted by Henry Roberts on Mar 20, 2018

Check out our Mitel (former ShoreTel) Connect Client user interface overview. New look and feel. Improved user experience.

Read More

Tags: Mitel

UCaaS Project Step By Step Part 2 - Kick-off Call

Posted by John Teeling on Mar 15, 2018

Step 2 - The Kick-off Call

In the first topic of the series, I talked about the critical role that project management plays in the success (and sometimes failure) of a project. In this edition, I am going to talk about the Kick-off Call and what it takes to get a UCaaS project off to a good start, thus setting the tone for the rest of the project. I know some of this is fairly basic, however, teams effectively execute when the basics are done well.

Read More

Tags: UCaaS, Customer Experience

SD-WAN For Branch Routing

Posted by John Teeling on Mar 7, 2018

Let Velocloud Be Your Next Branch Routing Device

With the general acceptance of SD-WAN it is becoming clear that there is a movement afoot that allows you to replace your traditional Branch Routing device with a VeloCloud SD-WAN solution.

Read More

Tags: SD-WAN, VeloCloud

Vigilant Cyber Security

Posted by Henry Roberts on Mar 6, 2018

Cyber DNA by Vigilant Technology

Operational need + Control (FW, AV Compliance) + Visibility

Today’s world doesn’t raise a question of the Cyber Security necessity. Being reckless about your data protection either on a personal or business level is not an option anymore. Luckily, there’s plenty of offerings on the market for any budget and any level of protection.

Read More

Tags: Vigilant, Cyber Security

UCaaS Project Step By Step - Part 1

Posted by John Teeling on Mar 1, 2018

Step 1 - Project Management

This 9-part blog series explores 9 different phases of the UCaaS project, ranging from best practices for the kick-off call through the provisioning and delivery phases of a project and to the point where you will take the project live and ultimately transition to support. 

Read More

Tags: UCaaS, Customer Experience