VoIP Channel Update
In this update: 3CX version 16 3CX Quick Reference Guide 3CX road map - Update 1 preview 3CX technical training Grandstream - new DECT technology Got 3CX customers on 16-SC Standard free 1-year trials, expiring soon? WiFi Voice - ready for the real world? How to...
How to practice better VoIP security
We all know that any internet facing application needs to have security as a core focus. Thankfully Zero Trust Architectures are becoming more common as network and sysadmins adopt better security practices in light of news around 0 day exploits, botnets and general...
Vendor Watch – Managed Antivirus for Mac is here
Microsoft-based machines remain dominant in most of your end-users’ operating environments. While this makes life simpler to manage, the question remains on how to best implement antivirus (AV) on Mac workstations. You may be setting up AV manually on these...
Have you automated your Active Directory process for user onboarding?
The new employee onboarding process usually stays the same at most organisations. Many companies are still manually onboarding employees within their Active Directory (AD). This manual process not only takes a lot of man-hours, but also risks human error while setting...
Revising pricing for GFI’s products – May 1, 2019
As a valued GFI partner, we wanted to advise you of an upcoming change to the GFI price-book, as they have revised pricing. Please share this notice with anyone in the organisation you believe should be across these licensing changes. On May 1, 2019 GFI...
VoIP Troubleshooting
Capturing traffic for VoIP troubleshooting When troubleshooting VoIP issues, there are a few ways to get the details needed for both Soft Solutions and our vendors to assist. This will be along the lines of increasing the logging verbosity within 3CX, generating the...
How do you track down a lost or stolen mobile device?
Have you thought about what you would do if your mobile gets stolen? These days we all rely on our phones for both work and personal use. If it gets stolen or lost, it becomes a nightmare. There’s a tonne of private data stored on our phones - from photos to texts,...
Vendor Watch – A backup solution that scales with your needs
The days of guessing how much data your customers need to back up, are over. With a traditional backup solution, it requires ongoing storage forecasting, provisioning and adjustment. Choosing a cloud-first solution, lets you easily scale up (and down) as demand...
How to discover ALL potential impacts before rebooting a server
IT changes are one of the main sources of outages, that easily impact a business’s production environment. Change management is an ITSM (IT Service Management) process that has been designed to mitigate such risks, however, it’s often difficult to follow. Potential...
3CX launches v16 of their IP PBX
Now more than ever customers are switching from a traditional PBX to an IP PBX. 3CX has stamped its mark as a leading provider in the VoIP space. With the launch of version 16 last week, the product introduces much longed for features. 3CX is well known for its...
