Cloud-Based File Storage Programs Enhance Business Collaboration, Safety and Simplicity

 

It’s become quite clear to us how valuable collaboration is to the health of a business in today’s marketplace. Today’s businesses cannot afford to have staff waiting around, in order to get access to the tools they need, so they can do the job.

As businesses grow from small teams to larger organizations, there is a growing need to communicate and collaborate effectively. The problem that central data storage solves is that it gives everyone on the team the ability to immediately retrieve, backup and share mission-critical files in real-time. Salespeople no longer need to wait around for support staff to send them follow-up files for customer contact. Managers can instantly access subordinate data in order to make sure that work is getting accomplished. In sum, everyone can get what they need, when they need it, wherever they are, without having to wait on other people.

 

When evaluating cloud-based data storage services, two primary concerns for businesses are security and ease-of-use. One of the pioneers of cloud-based data storage, Dropbox.com, is clearly a simple-to-use solution, yet they lack in security. According to Business Insider, “Nearly 7 million Dropbox usernames and passwords have been hacked, apparently via third-party services that hackers were able to strip the login information from.”  This security breach has huge implications for other off-the-shelf data solutions in that they lack the foundational feature of data storage technology; it must keep your company data safe

 

The second key factor is to examine a solution’s simplicity and ease-of-use. With many providers data storage can be set up at a secure physical location and a central file repository can work well within the confines of an office. Unfortunately, this falls short for the “71 percent of businesses who require technology that enables their staff to work anywhere, at any time.” Solutions that are cloud-based and work independently of employee location are clearly superior.

 

At Prime, we have a number of excellent data storage solutions available for business users. Feel free to reach out to us and let’s get the conversation started.

Your Step by Step Guide to Mitigating and Preventing a Ransomware Virus in your Small/Medium Business

With the recent epidemic of ransomware viruses (up over 600% in 2016 and with the newest batch of exploits wreaking havoc internationally), I thought it would be a good idea to go through the basic guidelines for mitigating and containing ransomware for your small to mid sized business. There are plenty of additional pieces to putting this together completely so please reach out to me if you would like some assistance. Some of these are simple recommendations and this is by no means a complete list. But, then again, eat healthy, exercise regularly and don’t smoke are simple recommendations – and if you don’t follow them, you know what to expect.

  1. Use a reputable multi vector end point security – Use anti virus programs like Webroot/Kaspersky/McAfee/Avast. Don’t be penny wise and pound foolish. Buy a proper license for each machine. Keep it updated for all new definitions. Keep it current and get one that is constantly being updated. No one program is going to be 100% effective. Also, make sure that you have a program that detects malware. Malwarebytes Premium is my favorite. Again – go for the full paid version and don’t try to cut corners on freemium or freeware versions. An ounce of prevention is worth a pound of cure.  You need protection that is going to detect phishing from spam, detect unsafe websites and web browser protection.
  2. Put strong back up procedures in place– you should have back ups in place with a return point objective that you can live with. That means that you should have back ups both onsite on a device and in the cloud. Both of the back ups should be constantly tested for verification and the process should be monitored. When this is successfully in place, in case of an outbreak, you can restore to the last back up that was unaffected. Please note: tape drives, USB sticks, and removable hard drives are not adequate for business applications. You need a proper belt and suspenders- a properly sized on premise device that is backed up to the cloud.
  3. Make sure that you are updating your operating system and plug ins regularly – the current round of ransomware is exploiting unpatched and un-updated Windows vulnerabilities. We update our clients with whitelisted patches and updates from Microsoft. Make sure that you are constantly updating your operating system. Make sure that you are scheduling your updates properly- for all of your computers and all of your devices. Make sure you update all of your computers- even those that you may use less frequently. For example, we use micro pc’s in our conference room- for use with our large screen monitors. All of those units must be updated regularly.
  4. Make sure that your firewall is regularly updated and maintained– your firewall should be under contract and updated with the very latest definitions. Your firewall is all that stands between you and the virus filled Internet. We recommend Watchguard because it is constantly being updated and maintained – and it includes best of breed components that would be too expensive to buy separately bundled in.
  5. Disable autorun- make sure that you disable autorun for everyone!!Yes, autorun is useful. Yes, it is also used by viruses and malware to propagate itself throughout a network. In these dangerous times, disable it.
  6. Stop making everyone an Admin!! – administrators should be admins. However, if you give everyone admin rights, you open yourself up to more damage. User should be users and admins should be admins. Period.
  7. Enforce secure passwords– believe it or not, people use stupid passwords. Enough with stupid. If you want to get infected, use a simple password. If you don’t use a secure password (strong with characters, alphanumeric and symbols). Better yet, have your users get a password manager app.
  8. When relevant, encourage the use of two factor authorization– if you have compliance requirements (HIPAA or PCI) definitely use two factor authorization.
  9. Disable RDP– remote desktop protocol is used by all sorts of viruses and malware to gain access. If you don’t need it or don’t know what it is, disable it.
  10. Educate EVERYBODY– even if your office is a handful of people- but especially if you have less sophisticated users- education of the threat is important. Your staff should know what phishing, spear phishing and how to recognize and avoid suspicious emails. Incorporate this into your onboarding of new employees or have a meeting about this. If you would like a recommendation for videos, send me an email and I will send you a recommended list. Along with that, add pertinent sections to your employee manual about bringing your own device onto the network, using “free”USB drives, and clicking on links in emails.

Like I said, this is by no means a comprehensive list. I have learned Mark Twain may have had the last word. “It’s not what you know that gets you in trouble, it’s what you know for sure that just ain’t so”. The world of viruses and malware is changing. Yesterday’s method may be overcome in an instant and you have to keep on top of it. If you need help- just let me know!

 

Prime Telecommunications Leverages State-of-the-Art Cybersecurity Techniques and Tools to Protect Customers

Prime Telecommunications, Inc., a leading provider of unified communications, announced today that the company is leveraging state-of-the-art cyber security techniques and tools to protect customers from cyber attacks that have become a daily occurrence in the small to mid-sized business marketplace. The company has been at the forefront of cybersecurity for many years and has taken their expertise to an entirely new level, well beyond their competition. Prime Telecommunications protects businesses from several key cybersecurity threats.

The first threat facing organizations is phishing. Phishing is essentially, using fake links to lure users into offering up sensitive information, by posing as an authority. Hackers can embed malicious links into emails, attachments or images, which usually lead to another page that requests the sensitive information, which will later be used against the user. One of the most creative ways hackers have found to attack SMBs is to call in and impersonate IT staff or Network Administrators, asking for specific information off the employee’s computer to resolve a potential “virus.” The employee will usually comply and supply the information, giving the hacker the exact keys they need to infiltrate the system.

The next area of concern is mobile security. As web traffic continues to migrate from PC to mobile, hackers have followed suit by redirecting their efforts to mobile attacks, as well. At an organization, whereby users are encouraged to BYOD (bring-your-own-device) to the network, this increases the exposure for network attack exponentially. SMBs need to be on the lookout for attacks from third party apps, mobile malware and unsecured public Wi-Fi locations. For example, employees will use their phone at an unsecured Wi-Fi hotspot to work but they won’t realize that the network is rigged to enable hackers with easy access to sensitive apps, data and information on any phones connected to that particular unsecured Wi-Fi hotspot. In many cases, users will be attacked without even realizing that the attack has happened.

The last area for an SMB to monitor is malvertising. This threat is where hackers embed malware within advertisements, landing pages or even directly on reputable websites. Sites that offer advertising on a massive scale, such as Facebook, have a tough time regulating online security throughout the buying process. Facebook can do its best to ensure that the links on Facebook aren’t malicious; however, they have no access to monitoring the pages that those advertisements lead to, once the user has left Facebook. Malvertisers can embed a code on an advertisement which leads to a dummy checkout page or a fake application page, which phishes all of the sensitive information that the hacker needs to launch an attack.

“These threats all point to the importance of SMBs consulting with an expert in the cybersecurity field,” stated Vic Levinson, President at Prime Telecommunications. “We are well-equipped to deal with threats like these, in addition to the new threats that will undoubtedly arise over the coming years. For any business that leverages technology as one of its key productivity drivers, it pays to have a team like Prime Telecommunications to face the hackers of the world.”

Prime Telecommunications Offers Innovative Cloud Disaster Recovery Solutions

Prime Telecommunications, Inc., a leader in unified communications, announced today that it has launched a program that focuses on cloud-based data safety. This program is aimed to help small to mid-sized businesses (SMBs) to effectively store, manage, and transfer their critical business files seamlessly while simultaneously increasing the overall security of all of their business files. Whether employees are utilizing files on their servers, laptops, workstations or smartphones, this Cloud Disaster Recovery Program will change the way that business owners handle their sensitive corporate and financial information.

For those who aren’t yet familiar, disaster recovery, is a set of policies and procedures which enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. The majority of enterprise-level organizations have recognized the blatant need for disaster recovery programs because they focus on strengthening the underlying IT or technology systems supporting critical business functions, especially in moments of need. For example, when an organization starts growing and adds on more staff, there are more possibilities for human-induced disasters or data theft. An accidental deleted or misplaced file can can cost companies dozens of hours in lost producitity. Futhermore, with more staff come more devices, which in an increasing BYOD (Bring Your Own Device) environment, means that there are more vulnerability points for hackers to enter the network. When businesses begin to scale, these productivity interruptions are no longer tolerable.

“When a business begins its growth trajectory, it’s easy to sit back and enjoy the success,” stated Vic Levinson, President at Prime Telecommunications. “We know that feeling. It’s so rewarding to see your business growth outpacing your operating expenses and all of the years of sacrifice make it completely worth it. It’s so easy to kick your feet up, relax and enjoy the fruits of your labor in that moment, however, this is precisely when businesses need to take the steps to protect themselves so they can continue to grow at that same rate. This is when they are most susceptible to virtual disasters and without a comprehensive disaster recovery plan and cloud technology that is engineered specifically to shrug off these types of disturbances, they are putting that stable growth at risk.”

In years prior, many businesses were hesitant to purchase cloud-based disaster recovery solutions because they required large, up-front capital expenditures. Prime Telecommunications’ cloud disaster recovery program breaks this pattern because its on a pay-as-you go model, so businesses only pay for what they use, enabling them to scale up and down their disaster recovery program in perfect sync with the pace of their businesses. It’s file syncing, syncing with business growth, syncing with a cost structure that makes this technology easy to implement into any growth-oriented SMB.

Waazzzup? WaaS – Work Space as a Service!

Prime Telecommunications, Inc., an industry leader in unified communications, announced today the release of their newest technology deployment, which is their WaaS (Workspace-as-a-service) program that is being offered to the SMBs (small to mid-sized businesses). The program is designed to help businesses make the proverbial jump to the cloud. As the number of executives increase, so does the demand for more flexible and secure applications, hardware, software and virtualized components. WaaS takes this a step further, by taking office technology to new heights by running every component through a virtualized network, instead of requiring local device management. Prime Telecommunications is very excited to announce this program and to share the value-adds with their existing client base.

In layman’s terms, WaaS virtualizes every component on a desktop computer. So instead of having a physical component such as servers on-site, which can become obsolete, security-breached or malfunctioning, all components are run through the cloud. For end users, this means that every single component of an employee’s workstation will be available to them, regardless of where they’re located or which device they happen to have with them. Everything resides in the cloud including all software, data, file sharing capabilities, Microsoft programs, and line of business software.

“We’re so excited to offer our WaaS program to SMBs,” stated Vic Levinson, President at Prime Telecommunications. “The majority of businesses will be transitioning the bulk of their IT infrastructure to the cloud and our WaaS solution enables them to do it in a secure manner without compromising their need for flexible access to all of their software tools and programs. Most businesspeople don’t have access to all of their technology at any point in time and WaaS eliminates this problem forever. Furthermore, the complete virtualization of the IT network into the cloud bolsters security. For example, in a WaaS environment, employees can BYOD (Bring Your Own Device) onto the network without any hassle and if that employee leaves the company, their access to the cloud can simply be deactivated, drastically reducing the risk of data loss, systems-breach or malicious use. The case for WaaS is quite clear, because it increases employee flexibility and company security. Over time, these combine to drive productivity and boost the bottom line, which is the core reason for any technology to reach popularity in the business community.”

Presence Management: The Greatest Form of Communication

digital_presence

Want to increase communications and productivity between employees and customers?  Then, presence management is the way to go.  This wonderful technology gives all individuals within a company the ability to know what everyone is else is doing in real-time.  Is someone in the building or even at their desk? Are they in a meeting? Are they on the phone? By having this information one can determine if and in what manner to connect with another person.  That’s essentially the purpose of presence management and it’s enhancing the way we communicate. Having this information presents one with an array of communication options that’s dramatically driving up productivity for those companies – both large and small deploying presence management.

Unified presence management is driven off of a company’s voice and data system and empowers people to control every facet of their communications.  It includes and functions off of all devices such as computers, cell phones, Voice over IP (VoIP), and personal communications services.  As soon as someone logs onto their computer a pop up window appears containing the names of fellow employees and their current activity as well as their location.  Essentially, the technology lets you see the presence status of others, send emails and voicemails, receive faxes, control all your phone calls via desktop phones or a softphone, send secure Instant Messages and voice messages, launch a collaborative web conference session – all with a single mouse click.  Users may also put notes into presence for everyone to see.  For example, a note may have the time when an employee will be back in the office from lunch or say an off-site meeting.  Another user may make everyone aware that they may be working from home that day.  Knowing everyone’s availability offers greater options to rapidly assist with everyday business issues.

The power of presence is absolutely incredible.  For instance, a customer may contact your facility with a question and the individual that answered the phone may not have the necessary information to respond appropriately.  Immediately, the employee can view presence and see who is available to assist the customer.  They may send a question via an instant message or put the caller on hold, contact their colleague to gather the information or directly transfer the call while giving the colleague a heads up.  The flexibility of presence is tremendous and one can assume that it is easily driving customer satisfaction levels through the roof.  A basic phone system cannot operate in this fashion and unfortunately those that utilize traditional telephony are missing the boat.

Included in presence are such features as find me follow me.  This unique technology gives people the ability to reach a specific individual anytime, anywhere based on the implementation of a few easy to set rules in the system.  A can call come in and the caller has the option of finding the person on their cell phone or at another predetermined location.  The user may also have all calls set to directly transfer to the cell as well.  Another relatively new feature is twinning – a setting that rings both the desk and mobile phone simultaneously.  Reaching the person you want to, has never been this easy.

Time is more important than ever in today’s business environment.  Presence management saves an incredible amount of time because of the technology’s innate ability to drive efficiency and productivity.  Every business owner realizes the positive impact that even a minimal amount of improvement in this area can have on an organization’s bottom line, not to mention the empowerment an employee has to make better-informed communication decisions that in the end drives satisfaction in the workplace.  Presence management is a true win for everybody!

Got Cloud Voice? Don’t Let Your Competitor Beat You to It

Why cloud voice

It’s no secret that the business world isn’t what it used to be. Simply put, the old age of operating within the normal hours of 8-5pm is an outdated paradigm. The traditional workforce is no longer the norm and remote workforces continue to grow in number because of the drastic reduction in overhead and increases in employee satisfaction. While this level of flexibility was unavailable in years prior, expanded capacities offered by the latest in technology have made this new working environment possible. This new environment is also enabling businesses to keep their customers happier than ever before. Companies leveraging the latest technologies, like cloud voice, are able to keep their customers happy 24/7, which is leaving their competition in the dust. The business leaders who have shifted their mindsets in order to take advantage of these new opportunities are being rewarded handsomely.

One problem that virtually every company faces is the need for quick responses. This is especially true of inbound customer calls. In the past, when a customer would call-in and seek immediate support, companies would typically juggle the phone call between departments, until the customer was frustrated and then eventually transfer the call out to a manager’s cell phone, where they would usually have to leave a voice mail and wait for a call back. As you can expect, it didn’t take businesses long to realize that this way of conducting business was completely unacceptable and damaging relationships.

Companies have solved this problem with Cloud Voice phone systems. Since these systems operate “in the cloud” they are no longer tied to a single physical location and can accommodate the flexible workforce better than ever before. Best of all, the corporate experience is maintained all the way through and calls are handled with more elegance and professionalism than ever before. From the customer’s perspective, it’s as if these two were sitting right next to each other, collaborating on the issue at hand and resolving it as quickly as possible. The bottom line here is that when customers feel important and valued, they will continue to do business with any company. This is a rarity in today’s marketplace and technology is transcending these limitations better than ever before and this is making it much tougher for outdated companies to compete.

Also, today’s leading companies utilize cloud voice in order to assign “Find Me Anywhere” numbers to staff, which are essentially single numbers that will call the office phone, then cycle to their cell phone, then cycle to other staff members, so that customers can reach the exact department they need, without being stuck on-hold for long periods of time. These numbers can also be configured to all ring simultaneously, so anyone that can solve that exact customer problem can handle it immediately. Reduced wait times and instant connections with the right person are huge advantages for today’s organizations over their competitors. Imagine if your customers never had to wait on-hold again and that they got their problems resolved in only one-step. This is another way in which Cloud Voice is creating competitive advantages.

A superior customer experience is only one reason why more organizations are embracing this technology at an increasing rate. A significant reason that companies are utilizing this technology is because there is no risk. Prime Telecommunications, has created an innovative program to get this type of technology in the hands of business owners without making them invest in equipment which has required large, up-front, capital outlays in the past. Business owners can get access to all equipment and services without any substantial expense as cloud voice can now be acquired on a month-to-month agreement, which incentivizes performance and satisfaction across the board.

Since the barriers to entry for cloud voice are lower than they have ever been, it’s no surprise that this is gaining widespread adoption. Businesses need to be aware of these solutions and need to take advantage of these opportunities to get a leg up on their competitors as soon as possible, before they’re beat to the punch.

 

SNET Polycom Phones

Cloud Collaboration is the New Normal

CollaborationCollaboration in business used to be about face-to-face communication, involving brainstorming, notepads, extensive meetings and a single-office environment. Today, it’s all about creating similar engagement and teamwork, but without the limitation of a single location or physical closeness. This step forward is possible and popular thanks to cloud collaboration tools.

Cloud Collaboration Defined

Cloud collaboration is already extremely popular in both the consumer and business worlds. Its power lies in allowing people to work together on documents, or other data types, simultaneously. Current cloud collaboration tools include cloud word processing, spreadsheet and presentation software, as well as file sharing. The magic of cloud collaboration is that it allows people to share and edit projects at the same time. Many cloud collaboration applications also include communication tools, like chat, accessibility tools to limit who can view and edit the document, and the ability to see who else is working on the project.

It works like this:

  1. One user, from any device and any location, creates a project.
  2. This user can then extend access to others, sharing the ability to make live changes to this project.
  3. These changes are saved and synced, offering every user the same live view. And even if you make the changes offline, they will sync up as soon as you go online again!

Business Benefits of Cloud Collaboration

Email was previously the most popular way for businesses to share documents among employees. The downsides of this method included restrictions on file sizes and the fact that multiple people couldn’t work on something at the same time. Additionally, it’s easy to lose the latest version of a file when edits are constantly being sent back and forth. Ultimately, this method is unproductive.

Cloud collaboration tools, on the other hand, increase employee efficiency and productivity. They empower employees to more effectively and freely interact with each other, enhancing team communication. These applications also improve teamwork and innovation, as ideas are exchanged more easily.

Cloud collaboration tools also maintain one of the most popular benefits of cloud computing: anywhere, anytime access. These tools promote on-the-go productivity and remove the geographical barrier that used to accompany collaboration in business. This means that an employee from one side of the globe can successfully work on a project with an employee on the other side of the globe.

When it comes to the IT team, there are sometimes worries about implementing new technology. However, cloud collaboration software actually requires less maintenance than in-house options, allowing an IT team to focus their attention on more lucrative business endeavors. And since the applications are hosted externally in a provider’s data center, businesses will most likely experience higher availability and better support. A business can also quit worrying about file loss, as these documents and projects will be securely backed up and protected in the cloud environment.

We’re living in a mobile world, so it’s important to have mobile business solutions. Cloud collaboration tools provide this mobility, maximizing employees’ time, no matter where they are. It’s easy and productive to collaborate with coworkers at any time, in any location. A business will enjoy the increased productivity and efficiency, while employees will appreciate the freedom and ease.

It is all about a well planned and well executed recovery and continuity plan

National Preparedness Month was this September and already Hurricane Joaquin is here. We should remember that it is crucial to know how to recover when disaster strikes. It’s serious stuff: the economy takes a damaging hit, and some businesses suffer financial loss so great that they never reopen.

Gartner estimates that the average business loses $5,600 per minute of downtime. Natural disasters such as Hurricane Katrina and Hurricane Sandy have devastated local communities almost to the point of no return, costing billions in reparations to infrastructure, businesses and the lives of those personally affected.

The graphic below illustrates the states most prone to such incidents. September falls in the middle of hurricane season when many coastal businesses keep careful watch on developing storms such as the recent Tropical Storm Erika. However, storms are not the only crises with high potential to harm business continuity. More commonplace disruptions, such as equipment failures and critical employees calling in sick, can also have major business impact over time.

States Most Prone to Natural Disasters

National Preparedness Month serves as a reminder to businesses across the country of how critical it is to assess their readiness to handle disruptions and create a comprehensive disaster preparedness plan. As B2B businesses conduct continuity assessments, they should pay particularly close attention to the reliability and capability of their technology.

According to Frost & Sullivan analyst Michael Brandenburg, “Well-architected cloud [private branch exchange] or [Unified Communications as a Service] offerings can provide a high level of protection during a disaster event, as well as significantly reduce or almost eliminate the time it takes to recover after a disaster.”

In an effort to ensure disaster-related downtime is kept at bay, businesses should proactively back up data, move servers to the cloud and keep communication a top priority.

Back Up Business Data

The first step in disaster preparedness is backing up all relevant data and ensuring that there are replicas of important files and information in case the primary data is lost, corrupted or inaccessible. From personal business files on PCs to sensitive corporate data on servers, this information is a company’s lifeblood and powers day-to-day business decisions, large and small.

To maximize security, businesses should look for cloud-based solutions where information is stored in multiple data centers. This geo-diversity ensures access to backup files in case a regional disaster affects one of the data centers.

One of the most important factors in preparing a backup solution is the time it takes to recover your data. Businesses will want to start recovering time-sensitive materials immediately, and for companies with large volumes of data, this could take days, weeks or even months. Work with a provider who will prepare and ship a physical hard drive so that businesses continues as normal as possible.

Move Servers to the Cloud

Moving infrastructure to the cloud protects businesses far more effectively than relying on outdated, on premise solutions. Cloud service providers should be able to guarantee 99.99 percent uptime.

This reliability is the top consideration that draw businesses to the cloud, according to a Frost & Sullivan survey of IT decision-makers. From a disaster preparedness perspective, scalability is also a key consideration in transitioning servers to the cloud. The ability to increase off-site server capacity at a moment’s notice through a web-based portal makes organizations even more nimble in responding to business disruptions.

Such a level of access makes it easier to get these resources up and running quickly, regardless of location, without any capital investment and with minimum additional IT resources. Beyond reliability and scalability, the cost effectiveness of cloud-based UC solutions is yet another strong factor in forcing businesses to reconsider their disaster preparedness solutions. All three factors interconnect to offer a high quality, effective solution to ensure business continuity.

Keep Communication a Top Priority

Clear, timely communication is more critical than ever during disruptions. To keep lines of communication open, businesses should look for cloud-based IP phone systems. Features like mobile twinning, which sends inbound calls to mobile and desk phones simultaneously, ensures employees are available at any location at a moment’s notice.

Businesses should also invest in voice services that use a dedicated circuit with automatic failover in order to reduce dependence on the Internet, proactively identify potential issues with the primary line and seamlessly switch to alternate lines without downtime.

To keep business functioning optimally, it is best to house 100 percent of communications in the cloud. While hardware such as phones and desktops are key for in-office productivity, any programming stored in a physical phone increases the odds of disruption when the unexpected occurs.

Keeping phone communication settings in the cloud allows businesses to leverage features like softphones, which aid mobile workers by allowing any Internet-connected PC, iPad, iPhone or Android device to be turned into another phone extension.

B2B companies must be able to address the needs and concerns of the businesses they serve – even in the midst of a disaster. Town Residential, a New-York based real estate company that deals in both commercial and residential properties, lived that reality during Hurricane Sandy. When businesses across Manhattan were shutting down, Town Residential did not miss a single phone call. In fact, the day after the hurricane hit, they closed their single largest deal of the year.

Too many businesses settle for surviving disaster, when the right technology would enable them to thrive despite it. Town Residential ensured business continuity in advance to the disaster by choosing the right provider and the right solutions.

While National Preparedness Month places business continuity at the forefront of business planning, companies should prioritize preparedness year-round. Backing up and moving critical data, servers and communications into the cloud, and ensuring open communication are foundational steps to reducing vulnerability.

Putting the right technologies in place today is critical to navigating accidents, failures and disasters in the future that might otherwise disrupt operations. With proper planning, businesses may never need to recover from disasters – because they will avoid them altogether.

Prime Telecommunications wins 2015 Cloudy Award from Channel Partners

Channel Partners magazine, a resource for indirect sales channels offering IT and telecom solutions, is pleased to announce that Prime Telecommunications, Inc.  has been selected as a winner of the 2015 Cloudys Cloud Channel Innovation Awards.

Twenty-five winners were honored at a reception at Cloud Partners, a Channel Partners event, in Boston. These winners were featured in Channel Partners’ September digital issue.

“Winners of this year’s Cloudys awards run the gamut from IP telephony to shifting a customer’s entire IT infrastructure into the cloud,” said Lorna Garey, Editor-in-Chief of Channel Partners. “We have cloud brokers, desktop and backup as a service providers, and more. This program recognizes the array of business-focused cloud offerings that partners are delivering, and we were pleased to invite our innovators to share success stories with first-time Cloud Partners attendees.”

Prime Telecommunications partnered with Zultys and CTS Technology Solutions to provide a hybrid cloud solution for the Lyric Opera of Chicago that combined the Zultys Hosted Communications Solutions as well as an on premise Zultys MX system to provide integration with the analog sets on site as well as full back up and redundancy of functionality.

This is one of the first major implementations of the Hosted Zultys Cloud platform and an on premise chassis. It enables the use of SIP trunking, IP sets and analog sets across a single seamless platform. Now all users, whether analog or IP set based, have access to soft phone functions, voicemail to email integration and call center agent are able to use integrated functionality between their phones and their CRM for ticketing.

The Lyric Opera was able to use existing primary and secondary fiber bandwidth, element costly TDM circuits and fully integrate all users onto a single platform with enhanced functionality. The integration of Tessitura CRM software, Clearfly SIP trunking and Zultys Hosted Services as well as on premise Zultys hardware were instrumental in the deployment. Teams from CTS and Prime Telecommunications worked with the Lyric Opera IT department to successfully integrate all aspects of the cutover.

The Cloudys Awards were open to VARs, MSPs, agents, integrators and consultants. To determine the Cloudy winners, providers completed an application that asked them to demonstrate how they are used innovative cloud solutions to help customers grow their businesses.

Channel Partners editors evaluated and scored all applications to determine the 25 candidates that best exemplify the spirit of innovation.