Www.vocalcom.com Version 1.0June 11th 2013 VIRTUAL CONTACT CENTER in the Cloud Cloud Contact Center Global Infrastructure for Aditya Birla Minacs.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

IP-PBX & Voice-Gateway Solution From Green Path Technologies Co.,ltd.
The leader in session border control for trusted, first class interactive communications.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Aeonix & Ingate Role in Enterprise
Which server is right for you? Get in Contact with us
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Hermes EC3 Name, Title Presenter Notes -----
1 Introduction to Aeonix Presented by:. 2 What is Aeonix?
Session border control applications
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
1 Solutions 1.OmniMMS Multi Media Server 2.OmniMessaging Mass alarm notification 3.Voice mail server 4.Enterprise and Telco IVR most reliable and scalable.
1 Lindsay Kintner VP Product Management Tadiran Telecom SIP Trunking Case Study.
Unified Logs and Reporting for Hybrid Centralized Management
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
CHAPTER 15 & 16 Service Provider VoIP Applications and Services Advanced Enterprise Applications.
Vocalcom Cloud Contact Center
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
1 CCM Deployment Models Wael K. Valencia Community College.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
Version 1.0 by Simon HarrisonJune 14th 2013 VIRTUAL CONTACT CENTER in the Cloud Vocalcom High Availability Voice Mediant 4000 SBC Configuration.
 CHAPTER 2  Understanding the Pieces of Cisco Unified Communication.
Plan Introduction What is Cloud Computing?
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2009 AudioCodes Ltd. All rights reserved. AudioCodes CPE Carrier Applications.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
SIP Explained Gary Audin Delphi, Inc. Sponsored by
5 February 2003 Reality and Future Softswitch - Reality and Future Nikolay Ilyin Chief Technical Officer RealEast Networks ITEXPO.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
Delivering Voice, Video, Data & Mobility to SMBs.
ITNW 1380 COOPERATIVE EDUCATION – NETWORKING Spring 2010 Seminar # 4 VOIP Network Solutions.
CHAPTER 14 PSTN and VoIP Interworking. Cisco Packet Telephony: Connection Control Call Control Services.
Application Overview. Network Zone User Zone – Client Layers.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© Aastra Telecom Schweiz AG – 2013 Sales Presentation Updated as of Release 2.1 [depl-1658v2.10] Aastra 400 and Aastra BluStar Ecosystem All-in-one Business.
Exploring the Network.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Unified Communications February Aastra – OPEN Telephony over IP Solutions for every need Customer NeedsAastra Solutions OPENToIP – SIP OPEN ToIP.
Overview WIALAN Applications Products Administration system
SIP Trunking As a Managed Service Why an E-SBC Matters By: Alon Cohen, CTO Phone.com.
Hosted Voice & Hosted Contact Center
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
LiveOps Outbound Voice Features and Capabilities.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
0 What Does SIP Bring to Your Customer Experience ? Extend VoIP and IP Contact Center values through support of SIP o Media and location independent support.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
#SummitNow Alfresco Deployments on AWS Cost-Effective, Scalable & Secure Michael Waldrop Director, Solutions Engineering .
IPCentrex solution from COLLAB. ONECONTACT PBX THE GAME IS ON Global Surplus capacity Pressure on tariffs Hosted Services (In the Cloud/ telco) Broadband.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
ShoreTel Virtualization February, © 2014 ShoreTel, Inc. All rights reserved worldwide. Unified Communications Deployment Model 1 Secure Reliable.
Chapter 1: Explore the Network
Chapter 1: Exploring the Network
The All In One Hosted Solution
Your Business Opportunity
11/12/2018.
AWS Cloud Computing Masaki.
Ingate & Dialogic Technical Presentation
Presentation transcript:

Version 1.0June 11th 2013 VIRTUAL CONTACT CENTER in the Cloud Cloud Contact Center Global Infrastructure for Aditya Birla Minacs

Hermes.NET Architecture 2 Below the Hermes.NET global architecture, to understand the communication and workflow between each components: CTI Administration Applications Media Management Supervision / Reporting Agents The different proposal studied offers all features, including IVR, recording (voice and video) multimedia platform, multitenant.

Hermes.NET Architecture 3

Workflow Scheme 4

Global Cloud Contact Center  Global Reach –European and American data centers  Local and regional redundancy –Ireland & London –United States –Brazil

Technical Architecture Full Cloud 6

Full Cloud 7 -All benefits from the Cloud architecture -T1/E1 or Sip truncks from telecom providers are located in the Datacenter. -Agents can use either softphone or Ip Phones, registered on the SBC -Amazon Instances can be deployed on different continents, in order to desserve all sites all over the world.

High Availability Cloud Contact Center  Elastic Cloud Contact Center Regions and Instances –Three key regions, North America, Ireland, (London) and Brazil –Minimum two instances, (Availability Zones) per region running Vocalcom Cloud Contact Centre technology 8 –Active / Active Instances launched in separate AZ’s protected apps from failures –Voice technology connected to the AWS infrastructure using low latency high speed dedicated fiber connection, (AWS Direct Connect). active ready

High Availability Cloud Contact Center  Key features High availability end user internet routing 100% SLA Elastic compute capacity, with fast instance replacement and predictability 99.95% availability Elastic load balancing across multiple instances, combined with auto-scaling to ensure enough instances to balance End to end privacy and security AWS PCI Compliance certified Multi-AZ deployed Oracle DBS with built-in automated fail-over. 9

Cost Efficient Voice  Local call costs anywhere in the world –ALWAYS local fixed and mobile cost –Inbound on SIP Softphone calls are FREE –Outbound on SIP Softphone is local, very efficient call rates –Other telephony devices LOCAL inbound call cost to connect to device  Support for non-geographical numbers –Point at our DID ranges, simple and cost effective  Port existing DID ranges if preferred –Benefit from exception call rates, save call costs –Global agreements for 64 countries across the world 10

High Availability Voice  Keep-alive technology –Automatic gateway switching –Call context synchronization, active calls unaffected during a switchover  Hitless software upgrades –Can upgrade SBC firmware without disturbing current calls  High capacity and scalability –Upto 10,000 agents supported on a single gateway  Designed for PCI Compliance  Multi-point voice redundancy –1+1 redundancy scheme –Dual protocol, ports, blades, gateways, geographies

Voice Quality  Management, security and control –QoE in-depth analytics and SLA reporting –Intrusion and fraud detection tools –Secure registration process –Voice quality fully monitored –Bandwidth utilization reviews –Alerts  Precognitive innovation –Live correction of problems before they occur –Pin-point QoE health across entire network  On-Net – “Connected” –VoIP technology and gateways –App and DB servers same backbone

SEM Data Center Customers sites Remote Worker/WAHA PC SIP Client Wi-Fi Home-spot ITSP2 EMS-SEM QoE CDR OnNet Customers sites Internet ITSP 1 Customers sites Mediant4000E-SBC Voice Quality  Live call data recording  Quality of Experience management

Security Firewall and Access Control Encryption Topology Hiding Denial of Service protection Call Theft and Fraud protection Connectivity Interoperability SIP Normalization DTMF Conversion Protocol/Coder Policing Fax &Voice Transcoding NAT Traversal QoE Survivability Call Admission Control QoS Monitoring and Troubleshooting Voice Service Assurance Session Border Controller Voice Technology Innovation Mediant4000E-SBC

Compliant – PCI Secure IVR 15 PSTNwww Agent requests card details from caller 1 1 Caller enters credit card digits by keypad 2 2 Touch tone digits removed 3 3 Agent cannot hear the touch tone digits but can hear the caller 4 4 Payment service provider 5 5 Merchant payment 6 6

PCI Compliance / Key Security Technology  Encryption –Communication streams and signal messaging encrypted  SRTP for media stream encryption (RFC 4568 SDES voice and video)  TLS Security signal messaging encryption  Network Privacy (topology hiding) –Advanced security applied at each ‘leg’ in communication –Dynamic restrictions on ‘untrusted’ legs  Protection against DOS/SIP attacks –Rich message filtering rules: message size, number of headers, message body types, request type and more –Access lists, concurrent calls, layer 3 and SIP Dialog rate limiting

Vocalcom Cloud Infrastructure Benefits Fully redundant High capacity and easy scalability Advanced, reliable and secure Environmental control, fire detection / suppression and multi- layer physical security systems Ultra-low latency Backbone for world leading cloud Uptime 99.95% Advanced and dedicated managed 24x7x365