Categories
Business fun stuff social networking

Effectiveness of Facebook over YouTube for video reach

Facebook versus YouTube – best bet for video marketing?

On 2nd June we released the broadbandrating.com “bullet proof broadband” video in which we blasted some routers with a shotgun to monitor the effect. A light hearted bit of advertising for our affiliate marketing site. Thus far on Facebook it has had 2,730 views with a reach of 6,880. Compare this with 55 views on YouTube!

You do have to wonder at where YouTube is going. If we ever have a video to show on a website we always stick it on YouTube because they make it easy for you to embed and it saves on a  lot of server disk space. However it doesn’t really look as if YouTube is necessarily the place if you’re wanting to market something.

facebook versus youtubeWhen you think about it when do you ever engage with friends on YouTube? Never? It isn’t the same answer on Facebook. Videos posted to Facebook are therefore far more likely to spread virally than YouTube. Certainly in our experience.

In our case there were three factors driving the viewer count. One is the video producer, Tom Davies, has an active community on Facebook, as do I (Tref Davies). Then I posted the video, which was shot at a farm just outside Lincoln, to a Lincoln community group (Your1 probably from Lincoln if…).

Posting to the group more than doubled the number of views overnight. The group has nearly 18,000 members. You could see the number of views increasing by 20 – 30 a second simply because of the reach of this group.

Content posted to a group has to be valid. In this case the video was footage of Lincoln/Lincolnshire so it was of. You can’t post any video to any group as it will be moderated out.

This does provide food for thought in how to go about getting the most out of social media platforms for your business. Just sticking up something you might want the world to know about isn’t going to work. Put up some genuinely entertaining of interesting stuff and posting it to relevant pages and groups can clearly make a big difference.

I’ve also found this to be the case with individual blog posts. Post to the right group on LinkedIn, for example, and you get a lot more shares. These is a science behind it. If you want to get more exposure it’s really just about putting in the graft and finding the right places to place the content. Of course the content has to be good…

The one other thing you can do is get a celebrity to retweet or share. Their presumably large following has the same effect as posting to a relevant group. People blindly accept that if their heroes say something is worth looking at then they look. Fair play…

PS Happy to hear from folk with different experiences of the two platforms

1 Their grammatical error not mine

Categories
broadband Business

Superfast broadband Connection Vouchers – not!!

Superfast broadband connection vouchers – hands up if you’ve had one

Slightly annoys me. I get this email from HMRC winding up my expectations. “Up to £3k towards a superfast broadband connection”. Now I already have an 80/20 line but actually it is rubbish. I’m about 800 metres from the cab. It’s a long way. I only get 30 megs down and 7 megs up. It’s a bit of a disappointment but on the other hand much better than the old ADSL2+ I had. Maybe superfast broadband connection vouchers are for me.

So when HMRC send me an email suggesting that I might avail myself of a three thousand pounds grant I think. Okaay. Goood stuff. Maybe I’ll be able to use it to connect to a nearer cabinet. There is one I know.

I clicked on the find out how link and entered my coordinates. It a message jumped out of the screen, punched me in the face and said no way jose do I get a grant.

superfast_broadband_nograntIf I lived in Brum, Coventry, Derby, Chesterfield, Leicester, Milton Keynes, Nottingham, Oxford, Stoke on Trent or Wolverhampton I’d be ok. Maybe.

How totally crap is that? Of course I’m not really bothered, says I putting hands nonchalantly behind my back and looking distractedly into the distance. I am though. It bothers me that there is a finite list of places that can get the grant.

How did they figure that one out? Totally pathetic. What makes Milton Keynes more deserving than where I live?

The other pathetic bit is that HMRC know exactly where I live yet they still spammed me with hope inducing messages. Messages that make them sound great and good and generous whilst knowing that really they were just playing with my emotions. Lifting me up, dangling me there and then letting go.

“Let’s have a bit of a laugh” goes the conversation. Well I don’t find it funny.

Superfast broadband Connection Vouchers. To have and have not.

Categories
Business security surveillance & privacy

Snooper’s Charter a honeypot for security breaches

Snooper’s Charter security breach – an “accident” waiting to happen.

The Snooper’s Charter, they aren’t going to get away from that name, is the proposed law where the Government seeks to legitimise spying on all our internet communications. They of course have very legitimate reasons for wanting to do this – national security, prevention of terrorism etc and promise not to look at the information of innocent persons.

I’m not going to go into the lengthy list of issues with this (list here). Except that is to say that one of my objections to the Snooper’s Charter is the fact that once the government has gathered all this communications data it will lose it. Once lost it will eventually it will find its way into the public domain.

“No no no don’t worry it will be very secure” says a government minister (I’m sure). “Oh no it won’t” says I, as sure as hard drives will fail or get left on a bus.

It isn’t just that the information will get left on a bus. Someone will hack into the vault where it is stored and steal it.

The latest news from the US is that some overseas government (allegedly) has hacked into the Office Of Personnel Management and pinched details of the entire staff of the US government.

Just imagine if this was the Snooper’s Charter database. UK government ministers would have details of their affairs made public, or at least placed in the hands of agencies that might make “good use” of the information.

Who will be the first to be blackmailed? When will the first really serious compromise of national security happen as a result?

This is just an example of a possible scenario. It could be information about you. No national security involved but quite possibly embarrassing. Maybe you don’t want the world to know that you buy women’s underwear for your own use, or that you are a trainspotter.

It will happen if we implement the Snooper’s Charter. It’s up to you to decide whether that is a good thing or not. I don’t think it is.

Snooper’s Charter security breach – an “accident” waiting to happen.

Categories
agricultural broadband Business fun stuff

The making of the broadbandrating.com bullet proof internet movie

Exclusive behind the scenes footage of how we utterly destroyed some routers in the interest of science in the making of our broadband movie

Most of you will have seen the broadbandrating shotgun movie by now. Actually to call it a movie is a bit of a stretch. In fact we would have to stretch the footage by an hour an a half or so to do so because the original is only 52 seconds long.

52 seconds of pure gold nevertheless. What people don’t see in these 52 seconds is the immense amount of work that has to go on in preparation and on the day to make such a blockbuster. Take a gander at this introductory video.

Many years ago I worked as an extra on a movie called “Experience preferred but not essential”. It was made in the Isle of Man and I was home from Uni for the summer. One thing I specifically remember was the frequent meal stops. We had breakfast and a full blown 3 course lunch and I got ten quid for the day.

No meals were provided on set during the making of this broadbandrating movie. We were all back in the office before lunchtime and got our own sandwiches from the caff downstairs.

And finally:

Four old routers were destroyed in the making of this video including a BT Homehub, two netgears and a technicolour. The Technicolour proved to be very resilient. However this was, ahem,  down to the fact that our marksman missed it three times from very close range before thoroughly despatching it with his fourth shot.

We have to thank marksman Clinton Slingsby for turning up to do pyrotechnics shooting, Farmer Bill for the loan of his location and local Lincolnshire weather forecasters for keeping the rain away until we had the last reel of film in the can, so to speak. Also in the various media in this post you will see me and Sasha, able member of the trefor.net staff. Finally thanks to Tom at Eyup Media for putting the film together so professionally.

I do have some stills but seem to be having problems uploading them right now – I’ll do a separate post later.

Ciao amigos

No potatoes were destroyed during the making of this broadband movie.

Categories
Business

Announcing 1st trefor.net Technology Marketing lunch – use of PR in VoIP and internet markets

Thursday 9th July 12.30 – 2.30pm- Kettners SoHo

We all like to get coverage in the media. Exposure for our companies has a value: for existing customers it reaffirms to them why they are customers of yours, for prospective customers it is an endorsement that in considering using your services they are along the right lines, for staff it provides a feel good factor – their employer is a name in the space and they are in tune with what the company message is.

trefor.net is renowned in the tech industry for it’s executive networking lunches and dinners. We invite expert guest speakers who are able to stimulate a highly productive round table discussion that is both entertaining and informative.

Hitherto these events have largely focussed on the IT Director, CTO and CEO. Now for the first time we are introducing a series of networking lunches aimed at giving value to the Marketing Director.  For smaller businesses who perhaps have no marketing department this role is likely to be the business owner – a busy person with many hats.

These events are designed to make the most productive use of your time. A 12.30pm start with a finish at 2.30pm allows you to schedule a useful networking meeting into your busy working day. 2.30 isn’t a hard finish – discussion can continue beyond then if your time allows.

This first trefor.net Technology Marketing lunch examines the whole concept of PR in tech and communications markets. We discuss what works and what doesn’t and how to go about generating material that will be interesting enough to gain traction in the online media space.

ip phone hot-desking ip phone roi ip phone interoperability ip phone security lesley hansen on designing an ip phoneOur guest speaker on this occasion is regular trefor.net contributor Lesley Hansen.

A marketing & PR specialist, Lesley has been working with Snom Technology AG since March 2014 to provide a focus to their marketing in the UK and to ensure a regular and valuable flow of information to Snom channel and prospects.

Lesley has a track record of success spanning 28 years within the IT and telecommunications industries. Previously, she provided marketing services for three companies within the TeleWare Group, a telecommunication product and service provider serving 25% of the FTSE100.

Prior to TeleWare, Lesley was Marketing Director for several innovative companies within the networking and telecommunication sector including Net-to-Net Technologies and Micom Communications which was later acquired by Nortel.

Lesley has also held product management and training roles at Cabletron Systems and British Telecom and has worked with a variety of voice, data and converged communications products both in the UK and overseas.

You will get a lot out of this event. If your business operates in the technology and communications markets you need to be there. Due to the intimate nature of this event we are restricting places to one per company. If you want to bring a colleague let us know and we can see if there is space nearer the time.

Categories
broadband Business fun stuff

Social Media video marketing – bullet proof broadband

social media broadband marketing

I know we got thousands of you thinking when we put out a post last week asking what had happened to the router. Well it was all a taster for our social media broadband marketing – video style.

Last Thursday we had a corporate day out shooting. This was shooting in both senses of the word. We shot routers both with shotguns and with a camera. In fact we shot the shotgun with a camera as well.

It was all done in the name of social media publicity for broadbandrating.com. Here’s the video that came out of it all:

Look out for more from the filming over the coming days.

Many thanks to our video production manager Tom Davies for his outstanding media production skills.

If you are looking for help with a corporate video then do get in touch. This is all part of our trefor.net Technology Marketing capability. Look out also for an announcement this week regarding a series of events we are putting together around the theme of Technology Marketing.

Categories
Business hosting

Amusing superfast broadband in Leicestershire snippet

Superfast broadband in Leicestershire reaches rural parts, as far as we know.

Sasha of broadbandrating.com wrote a little news post about the roll out of superfast broadband in Leicestershire reaching rural areas this morning. She’s a good girl and an asset to the business.

pleskleicestershireI read the post and clicked on the project link:  http://superfastleicestershire.org.uk/ .

Nothing happened, or at least the white screen of the featured image hung around for a while. I checked my connection, which I normally do by accessing the BBC website – usually guaranteed to load like lightening.

rain stop play at headingleyThe BBC loaded like lightening and informed me that the start of the England v New Zealand Headingley Test was delayed due to rain. Not surprised. The cats and dogs have been knocking frantically at the office window here in Lincoln.

 

plesk superfast broadband in leicestershireHaving waited maybe a minute or two for the website not to load the following image screenshot appeared. Ooo. Interesting I thought. Plesk. Ironic chipped in Sasha. Ya gotta laugh really. No gloating though, Happens to us all from time to time.

Hopefully neither the http://superfastleicestershire.org.uk/ website and the cricket will have too much delay. Leicestershire will have all these folk seeing the publicity clamouring to visit their site.

Yorkshire, together with the rest of the country, will have millions of cricket fans eager to see play begin. At least those at the ground can take shelter in the bar.

Yorkshire weather forecastJust as a final bit of community service I’ve looked up the weather forecast for Leeds for the next five days, ie the length of the test match. Today not looking too great but Saturday and Sunday looking ok. Unfortunately Monday and Tuesday back to looking distinctly dodgy.

We have a cricketer in the Davies family and he has games coming up on Saturday, Sunday and Monday. In Lincoln but I imagine the weather will be simlar. Maybe get two out of three in. Two out of three aint bad, as Meatloaf would have it.

Categories
Business

Eight lessons to learn from another failed British start-up

Startup lessons learned

The CTO of a failed British company discusses startup lessons learned (not my business btw TD)

1. Your earliest staff are partners – treat them as such

Lack of funding security is the inescapable reality of any early-stage tech start up; you live each day thinking about where the next batch of funding comes from. As such any early staff you have, like it or not, are living the same rollercoaster as you.

Moreover you can’t afford resilience and redundancy of knowledge. Your lead developer can take the business down any time simply by walking out. You need to square the power/reward/responsibility equation from day 1. The longer you leave this to fester the harder it will be to sort out.

2. Good ideas are ten-a-penny, good businesses are something else entirely

When starting a business to bring a new product to market the hardest problem you will encounter is building a scalable business around your product.

Even today many people seem to overvalue their product idea. I say even today because if there’s one thing the internet has taught us is that truly original thinking is as rare as a Googlewhack.

If you still think the initial idea is worth more than anything else to the business (which, in a few cases, it might be) please bear two things in mind: your idea is probably not original; and, even if it was, originality itself is no guarantee of success in business.

This makes a mockery of the idea of “protectable IPR” so many investors get hung up on. The notion that someone else will steal your idea and make it work before you get your product to market is only applicable to a minority of businesses where the idea is discrete and so overwhelmingly compelling and clearly valuable [typically in an existing market].

In most cases there will be a significant risk associated with bringing the idea to market. Consequently anyone with the resources to steal your idea would probably rather sit back and wait to see how you fair building and scaling your business before jumping in to steal your market share. See point 3.

3. Absence of competitors sucks

Building a market is far harder than building market share. In fact it’s harder than building the product itself.

When you launch a new product in an existing market there’s stacks of people out there who already know there’s a solution to their problem. Your biggest challenge is getting onto the buyer’s radar; and then distinguishing yourself from your competitors. And there’s a solution to both of these: money (on branding and marketing).

For a brand new product your challenge is to find people who don’t know there’s a solution to their problem. People who are not already out there actively looking for a solution. In fact you’ll probably spend a significant amount of time convincing your prospective customers that they have a problem in the first place.

4. FFS listen when somebody tells you, “fail hard, fail fast”

This should be a no-brainer but my business partners and I were told this in the strongest terms on day one but still succumbed to the fear of loss rather than making rational decisions based on a sound plan.

Failing slowly over several years costs far more than ramping up quickly and bailing early, even without taking into account the ongoing soft spending and personal toll on all involved.

Loss aversion is the theory that says we hate losing more than we like winning. This can have two major consequences on a start-up:

  1. We hold back funding for fear of losing it. This pretty much rules out failing hard because no-one’s willing to put all their chips down on day one.
  2. Even when we realise the company is probably not going to succeed we don’t pull the plug for fear of losing what we’ve already invested. We look to keep the dream alive for as long as possible.

The answer is, unfortunately, simple: be prepared to go all-in on day one and pull the plug on Day 6 if it transpires the New World you built isn’t worth living in.

The Fail Fast approach has the added benefit of getting your product to market relatively soon after the initial development. Selling a product designed 3 months ago is easier than selling something built 3 years ago in the fast-moving tech world.

It’s also easier explaining to potential investors why you haven’t got sales in the first year, than it is explaining this in year 3.

5. New ventures are built on personal energy and no, you can’t delegate your enthusiasm

Background/silent partners can be great; so long as they’re (a) aware of what they’re getting themselves in to and (b) sufficiently tolerant to the risks and day-to-day rollercoaster any new venture inescapably becomes.

However, in my experience at least, few background partners remain silent. If you, as a major investor, also want to act like the boss and steer the day-to-day running of the company, you need to sit there as the CEO and run the company.

Building a new company is bloody hard work and probably needs to be your sole focus for the foreseeable future. If this isn’t for you then consider either the silent partner option or whether you really want to get involved at all.

If you’re too busy with other ventures to run your new company what you absolutely cannot do is bring in “your man” (or your lady) to run it for you. It’s unlikely whoever you choose to run the company on your behalf will convey your personal enthusiasm, and it’s highly likely the rest of your partners will resent having to deal with you through your chosen intermediary/enforcer/patsy.

6. Too many cooks…

For every founder of a new venture to qualify for the UK’s Enterprise Investment Scheme (EIS) a company needs at least 4 founders, since no single shareholder can exceed a 30.0% holding.

Since EIS (and SEIS) relief is so attractive to investors (they essentially get a third of their investment back in tax relief, plus additional relief on capital gains on exit) many UK investors insist on EIS status.

An unintended consequence of becoming attractive to investors, as well as getting the most from your own investment, is you need to invite 4 cooks into the kitchen before you’ve even fully worked out the menu.

Queue the inevitable in-fighting and grandstanding as everyone strives to defend the value they each bring to the company.

Also, with share allocation spread relatively thinly from day 1, any future dilution, however necessary, starts to look extremely unattractive.

So… Start small and forget about investment relief, for now. That’s a matter for your future investors and can be solved later (despite what your accountant tells you – there are always options, like creating a new parent company).

As founder (or founders) your only objective is to build and demonstrate a viable business.

7. The UK is not California… And it never will be.

UK investors suck. Or at least I thought that for quite a long while.

The key message here is that as a pre-revenue tech start-up you’re unlikely to be showered with cash based solely on an idea (see also point 2) because the majority of investors here look very hard at the extent to which your idea is likely to scale before investing significantly into risky ventures.

And because you need some revenue and a demonstrable uptake curve to prove your scalability you’re highly unlikely to get significant investment until you have multiple sales.

Consequently, pre-revenue companies need to rely on Business Angels for their early funding, because many Angels will make a decision based on gut feeling, however this somewhat limits your ability to scale early (see point 4).

But I have reconciled myself with this approach as it reduces the waste, folly and premature champagne exuberance of some Silicon Valley ventures (yeah we have a website launch, let’s PARTY..!). That, ultimately, means more money in the pot – and on better terms – for those who make the cut.

8. Don’t think about the end before you’ve started and definitely don’t expect anyone but you to share your own aspiration and self belief

Ok this goes against the accepted wisdom of setting your sights on a target and sticking to it, and also the advice of many investors to start with an exit plan.

But what I’m talking about here is starting off with the attitude that you’ve just founded a £10m company.

It’s all very well having ambition and drive, and a target for your new venture to be worth £10m in 3 years’ time. But confuse aspiration with reality at your peril as you will, inevitably, overvalue what you currently have and undermine the amount of work left to achieve.

When you offer your developer 10% on day 1 you’re not writing a cheque for £1m. You’re giving him or her a reason to ride with you on your journey and stick with you over all the bumps along the way (see point 1). Besides this will be diluted anyway.

Overvaluing what  you have can pollute so many decisions, from turning down much-needed cash because you feel your company is being undervalued, to setting up appropriate share-based remuneration schemes because you can’t imagine why the digital equivalent of a plumber should get £50k of “your money” (reality: £500 – for a year’s work).

Above all else it can give you a clouded view of what still needs to be achieved to reach your target valuation.

Your company is worth what an external investor is willing to pay, it’s as simple as that. Everything else is your aspiration – which is all very well but don’t expect anyone else to share your belief in yourself; go out and prove it!

Categories
Business social networking voip

LinkedIn endorsements but no poetry

There was a young feller called…

trefor davies linkedin endorsements

It’s all coming out now, the narcissist in me:) This is a screenshot taken from my LinkedIn profile. I did it really because I liked the colours. I’m quite a simple guy tbh. I spotted it when looking to see how many LinkedIn connections I have fwiw. I’d spotted an old friend and colleague in my timeline, dropped him a note and then drilled a bit more into my connections.

Whilst I have been around the block a few times the endorsements on LinkedIn do have to be tempered by the fact that one does get endorsed as knowing about a particular subject by people you know who clearly know nothing about it themselves. Hey let’s not be ungrateful eh?

Disappointingly nobody has endorsed me for my poetry. I can understand that no one would do it for my golfing prowess. Poetry is an important part of the workings of the internet industry as attendees of RIPE meetings will know (if you don’t know about this it’s a secret and you’re not in on it). Beer is the other important bit.

Not quite sure how “Cisco Technologies” and “Strategic Partnerships” make the list as they don’t appear to have a number next to them. I should have been shouting more about my Strategic Partnerships skills obviously. I did used to have a Cisco router at home and Timico’s network was initially built around Cisco although that company has lost ground in the core.

I have started to get more out of LinkedIn over the last year or so. There seem to be more LinkedIn shares on the blog than any other social media platform. When you think about it this is a good thing as I whilst I do indulge in consumery stuff the more serious content of the site relates more to business.

VoIP tops this list of endorsements. I guess this is appropriate as I’ve been “doing” VoIP pretty much since it all started. If anyone is interested in coming along to our VoIP workshops, done jointly with ITSPA the next one on October 7th at Sandown Park Racecourse. It’s timed to coincide with Convergence Summit South. Look out for details on this blog.

Anyway got to go. I have an appointment with a therapist who says he can cure narcissism. Btw my wife, who has probably never heard of LinkedIn, should note that none of the endorsements are for plumbing, diy, painting and decorating, or a miscellany of other skills required to maintain the smooth running of the Davies household. I will acknowledge “changing light bulbs” and “mowing grass” as among my core competencies.

PS the one skillset that perhaps should be on the list but isn’t is in writing. Maybe that isn’t available on the LinkedIn list. Or maybe you are all trying to tell me something (scampers off with tail between legs). Check out the trefor.net Technology Marketing services we launched last week.

Categories
broadband Business net neutrality

Global broadband competition stakes heat up

China broadband

Picked up this article in Total Telecom.  China plans to spend $327Bn on rolling out ubiquitous broadband by 2020. The slowest performance will be 20Mps with urban connurbations (or however you spel it:) ) of more than 200k people getting 100Megs.

I don’t know how that compares with the per head spending in the UK but I guess the two things that stick in the mind are the 100Megs in cities and 20Megs on the farm. It’s very difficult to come up with a business model that justifies the investment but of course in China that doesn’t matter.

The UK government should take heed though. In some respect, at least in the cities, competition will ensure that we get the speeds we need. Poor old Farmer Giles however is never going to be looked after. Unless he looks after himself and even then they will probably be exporting milk from China to rural Britain because Farmer 賈爾斯 (look it up) is going to have an edge on him.

Actually there are some things you just can’t leave to a competitive marketplace. I was at RIPE70 in Amsterdam last week (now a distant memory). Someone from the GSMA stood up and towed some bland corporate line on how market competition meant that net neutrality was not an issue in the mobile space. We all know that this is total rubbish. At least in the UK.

I was able to inform the assembly that the only reason net neutrality had been accepted by some mobile operators in the UK was down to 3 years of intensive lobbying (including by ITSPA) and the tacit threat of government legislation if operators didn’t toe the line.

So sometimes governments do need to get involved, even if as in the case of net neutrality they were just a threatening presence in the room. I think that our government should really start thinking about how a competitive UK plc should have a competitive broadband infrastructure, and by this I don’t mean the cheapest services although that does help.

We have always struggled with finding MPs that understand technology enough to be able to make informed decisions. I even recall an anecdote a few years ago whereby the civil servants who worked on the Digital Britain report had all been joking about the fact that none of them had ever been on Facebook. I guess that having ex Facebook Director Joanna Shields in the government could help here. We now also have former Telegraph Technology Editor Matt Warman as an MP.

Only time will tell whether these new kids on the Parliamentary block will make any difference. We shall see. In the meantime if you live in China broadband is coming your way.

Categories
Business voip hardware Weekend

No such thing as a SIP sausage

How now brown cow

It’s that Thursday afternoon lethargic feeling where really you want it to be 5pm on Friday so that you can legitimately be somewhere else. ie the pub.

There is probably lots going on but it’s all passing me by. The Summer test cricket has started. We got off to a terrible start but are recovering some ground. I glance at it occasionally on my screen.

Here in the office it’s getting pretty quiet. My office is at the University of Lincoln campus. The little darlings students are either all in an examination room somewhere or have already gone home to mummy and daddy. Pile of dirty washing no doubt.

This isn’t the time of year to throttle back though. Lots of business still to be done before the summer entertainment season starts followed by the holidays. I am still waiting for my invitations to Wimbledon, Lords etc etc. I’m sure they will come. Probably in the post. I also fancy a bit of sailing and maybe a golf day or two. Nothing too onerous. A stroll round a links course somewhere.

It’s already the BBQ season. I noted someone on Facebook earlier this week informing a group that they were getting their deck ready to put out the barbecue. Huh. Ours has been out for at least a month! My brother in law leaves his out all winter and cooks his roasts on it. This year I’m going to buy a spit.

The weather outside is gorgeous. Must be because it’s exam time. I’ve restarted walking to work. I used to walk to work every day but during the depths of winter I weakened and bought an annual car parking season ticket. Only £72. Barg. It was not the right thing to do as since then I’ve driven more than I’ve walked. I have a hill called Steep Hill between the office and my house. In the morning I walk down the hill but that return journey is a killer.

I mostly walk to work on a Friday anyway which allows flexibility in decision making re whether to stop off for a beer or not. Which is where we came in isn’t it?

Before I go, and to legitimise this post, I’ve just received a snom SIP DECT phone (mouthful that!).  I’ll be getting it up and running and reporting on it in due course, once I figure out how to do it. I need a PoE adapter thingy as it hasn’t got a separate power supply. My Chromebook doesn’t have an Ethernet socket and runs off a separate WiFi subnet. Don’t worry I’ll sort it out.

I used to have loads of SIP phones. Used to test them. There was a time where there were only a handful of handset makes. Then the flood gates opened. We in the industry thought SIP had finally arrived. Really took years more for real SIP services to become available and for the tech to become mainstream. It’s there now.

So kids. Thassit for now. This is more of a weekend post than a businessy one but it’s all yer getting this afternoon. I have that Thursday afternoon lethargic feeling…

PS don’t ask me where I got the post title from – totally random. snom dect phone.

Categories
Business

Announcing trefor.net Technology Marketing

trefor.net Technology Marketing

At trefor.net we regularly get asked if we can help out with content generation. Add to that our PR, video production and graphic design skills and you have a powerful mix of capabilities.

Enter trefor.net Technology Marketing. trefor.net Technology Marketing is a fully blown marketing agency that can help you get your product or service out there, noticed and bringing in the cash.

Innovative ideas combined with a deep understanding of technical and communications markets are the makings of success. Some of our notable successes include:

Pigeon v Broadband race got blanket TV and radio coverage and resulted in public statements from both BT and the Government.

Move Over IPv4 Bring on IPv6 Party to end all parties at the London Transport Museum, Covent Garden attracted 400 people from the UK internet technology scene together with a Government Minister who came along to give a keynote.

Most Comments on a blog post World Record attempt received over 5,500 comments in 24 hours and raised £6,000 for the RNLI.

If you are a vendor trying to sell to Network Operators, Cloud Operators, ISPs and ITSPs in the UK you should be talking to us. If you are a Service Provider then we understand your business model intimately and can help you succeed.

Whether you need short term help just to get going or for one specific project, or ongoing support right across the calendar we can help you.

Check out our full capability here. Talk to us about what we can do for you by calling Tref on 07957 904477, hook up with @tref on Twitter or email [email protected].

Categories
Business ofcom

Ofcom Business Connectivity Market Review

Ofcom Business Connectivity Market Review

As part of their Business Connectivity Market Review (BCMR), Ofcom published a document last Friday detailing its proposals related to competition in the provision of leased lines.

Ofcom are looking at whether BT should grant access to its Dark Fibre network to other ISPs. They also want to consider reducing the Service Level Agreement for leased line installations by Openreach from 46 to 40 days by 2017 (for some reason Ofcom call this Quality of Service). Also Ofcom thinks London is a highly competitive market (which it is) and doesn’t include the Capital in the review.

The news has come as a surprise to many as Ofcom’s previous review of business connectivity (carried out in 2012) which also investigated leased lines rejected the idea of using ‘passive remedies’, including ‘dark fibre’ access.

The proposals are subject to a consultation which will close on 31 July 2015, with Ofcom stating that they expect to publish their final decisions in the first quarter of 2016.

What Ofcom should also be doing in tandem is insisting the government review the whole business rates system for fibre which is stitched up by BT. It’s all very well making BT open up it’s dark fibre estate to competition but BT’s favourable rates deal means that they are almost certainly going to be able to quote the end customer more competitive rates for that same fibre route.

Ofcom also published a press release on the proposals which is available here.

Loads of posts on the subject of fibre rates on this blog here. More specific detail on the subject in the post entitled Fibre Rates Inequity Iniquity. In Valuation Office Parlance the rates are called hereditament btw. Just shows you how archaic the whole system is. The whole system needs reviewing. The problem is that it’s a huge bag of worms. BT may well argue that they pay a fair amount of rates based on their business as a whole but it doesn’t stop the fibre rating system being wrong.

You have until the end of July to get your comments in, at which point there will be nobody in the office at Ofcom to read them.

Ciao

Categories
Business End User Engineer fun stuff

Happy Birthday to us

Happy Birthday to tref, Happy Birthday to tref, Happy Birthday to trefor dot net, Happy Birthday to tref.

I was writing a proposal last night and in it put a vague “trefor.net has been going 7 or 8 years”. This didn’t feel particularly right. I should know how long the blog has been going.

I looked it up. The next day, ie today was the date of first posting. Nothing particularly inspirational but at least a start. I’m not even going to link to it.

When I started I very much kept quiet about it. I didn’t know how interesting that might be. It’s a subjective thing anyway, interesting. After a while my co powers that be at Timico found it and asked if I could do more of the same. They occasionally whinged about me going off message.  For example when I did guess the royal baby competition but hey, those competitions got tons of entries, mostly from people in the industry. Obviously there are lots of royalists in the internet game (or more likely people up for a laugh).

7 years isn’t a particularly important milestone. It’s where we are at though and we have had a few major things happen in that time:

Pigeon v Broadband race got blanket TV and radio coverage and resulted in public statements from both BT and the Government.

Move Over IPv4 Bring on IPv6 Party to end all parties at the London Transport Museum, Covent Garden attracted 400 people from the UK internet technology scene  and a Government Minister.

Most Comments on a blog post World Record attempt received over 5,500 comments in 24 hours and raised £6,000 for the RNLI

There will I’m sure be more to come. In the seven years we have had nearly 2,500 posts with 750k unique visitors.  We didn’t start monitoring for a couple of years so the actual number will be higher. Those visitors have left over 11,000 comments. There have been many more spam comments but Akismet has done a good job looking after us there.

The number of comments has dropped over the last year or two. This is either down to the blog redesign or a change in the type of post. On the other hand the number of social media shares has grown significantly and comments are often left on LinkedIn or Facebook instead of the blog.

One recent post by Rob Pickering during the ipcortex WebRTC week got 15 Facebook shares, 26 on LinkedIn, 90 tweets and even 8 Google+ shares which is pretty darn amazing (G+ that is – there’s never much engagement there). Socail media shares are the way ahead present. They are a far better indication of the reach of a post than comments (in my inexpert mind).

The featured theme weeks and guest editor weeks are proving to be very successful. Firstly they make for a better variation in content. Our pre-election political week attracted 10 posts from 10 different industry experts (including an MP) each offering advice to David Cameron on what he should and shouldn’t be doing with internet regulations.

Rob Pickering’s guest week is also a good example. 8 posts on WebRTC received around 300 shares. Concentrating on one specific subject for a week allows us to cover that subject reasonably well and it’s a great opportunity for someone wanting to establish web credentials to do so by becoming guest editor for the week. A guest editorship (?) also enhances the content in a way that I couldn’t do as a solo writer.

trefor.net is now a business and has been widening its base. Firstly we brought out broadbandrating.com. This is a broadband comparison site that initially did business in the consumer broadband space. That market is heavily dependant on how much money you can spend marketing so we have evolved that site to include B2B ISPs.

These B2B ISPs don’t get the volume of traffic and level interest of a BT or Virgin spending heavily on above the line advertising. They do however represent a significant market value that is there to be tapped somehow. A referral to a consumer ISP can generate as much as £140 in commission. B2B players tend not to have the systems in place to manage these affiliate relationships but they do pay their channels significant bonuses for bringing on customers. Broadbandrating.com together with some follow on sites represent an interesting prospect for the future.

The other developmental areas are in Events and Marketing Services. trefor.net events include workshops, Executive Dinners and of course the now famous Xmas Bash are effectively networking opportunities for vendors to meet service providers in environments that are non-salesey. They are really industry get-togethers. Expect hte number and nature of these to grow and evolve.

Marketing Services are also a natural place for trefor.net to evolve. Content generation, PR and assistance with events and general marketing are essentially what I have been doing over the last few years. We now have a great team of specialists in this space. In my experience it is difficult to find marketing resources that understand tech.

Now you need look no further – If you need help with this type of activity get in touch – hooking up with @tref on Twitter would be a start.

All in all the first seven years have been very exciting and makes me even more excited about the future. In the meantime now would be an appropriate time to sing Happy Birthday to trefor dot net  – the full words are in the sub header of this post.

C ya…

Categories
Business Legal Regs

Sharing data in a Digital Single Market

lyndsey burton digital single marketLyndsey Burton comments on Digital Single Market

The European Commission announced details of their plan for a Digital Single Market in Europe. With it, they’ve outlined a “free flow of data” proposal. Unfortunately it’ll be another wait before we know exactly how they’ll do this – a detailed proposal won’t be ready until 2016. A Digital Single Market has been on the cards for years – earlier this year, the European Commission pushed forward plans for “protecting an open internet” and changes to mobile roaming rules. These were small steps toward more cohesive regulation. But the single market is set to go much further, with far more shared regulation – as the name suggests, the idea is to scrap Europe’s digital borders, creating one big, Digital Single Market.

Reforming data protection rules

To create a Digital Single Market though, a host of outdated policies need modernising first – among them, and the first thing to change, is a long awaited reform of the European Union (EU) Data Protection Directive 1995. The reform – first proposed back in 2012 – could finally be in place by the end of the year. The Commission’s approach is to: improve clarity and coherence of the rules; strengthen individual’s rights; and reduce administrative formalities.

Facebook’s recent experiences with EU national regulators highlighted the kind of red tape the Commission hope to avoid – after meeting Ireland’s data protection rules, the Netherlands and Belgium proceeded to take issue with Facebook’s data protection, and lock Facebook in a regulatory spiral. If the Commission’s plans go ahead, companies would have just one set of data protection rules to abide by in the EU, compared to the 28 they now grapple with. This would make it both easier and cheaper for companies to do business in the EU, and hopefully encourage new digital business in.

Benefits for consumers?

For consumers though, data protection reform is all about building trust, something many agree is lacking at present. Under the reform, we’ll be able to decide how our data is used; we can more easily access our data; we’ll have the right to know if our data’s been hacked; and we can choose to have our data deleted for good.

Overall, the Commission want to “strengthen individuals’ rights, and at the same time reduce administrative formalities to ensure a free flow of personal data within the EU and beyond”. That’s all great – in the UK, our Data Protection Act 1998 could probably do with an update too. But aside from modernising the law, the real point of the EU reform is to get the right rules in place so every EU member state is working under the same regulation ahead of other big digital changes.

Big Data and the Digital Single Market

Of all the uses reliant on data protection reform, there’s possibly none so obvious as the use of personal data for Big Data analyses. In their Digital Single Market strategy, the Commission say Big Data is a “catalyst for economic growth, innovation and digitisation across all economic sectors”. It’s a huge money-spinner. But the seeming contrast between Big Data and an individual’s right to keep their information private won’t be lost on most. How can we maintain control over our personal information, yet allow companies easier and freer access to it?

By March 2018, all new built European cars must have automatic emergency call devices as standard. This is an excellent example of technology that relies on Internet of Things (IoT) – simply, the cars will call up emergency services if there’s a crash, sharing some information about the crash in the process. Technically this isn’t a part of the Digital Single Market but it’s given us a glimpse of the kind of control we could keep over our data as more and more IoT services are introduced throughout Europe. Thanks to rules introduced in conjunction, automatic calls made after a crash would only give the minimum amount of data for the service to be of any use. This would include the type of vehicle, fuel used, time of the accident, the exact location, and the number of passengers. The information couldn’t be passed to any third party without express consent, and later the data would be fully and permanently deleted.

It sounds a logical and fair balance between an innovative, helpful service, and the need for companies to access our data to deliver that service. Let’s hope then, the Commission follows this same logic and doesn’t get too “free” with our data. The Digital Single Market will give us easier access to goods and services – who wouldn’t want that? But it’ll rely heavily on getting data protection right if its benefits are to really outweigh any consumer worry.

Lyndsey Burton is founder of Choose, a consumer information site covering personal finance, home media and retail.

Categories
Business Legal Regs

Digital single market strategy

EU Digital Single Market Strategy

The ITSPA secretariat have published a summary of issues that concern the Internet Telephony Service Providers’ industry in last week’s Digital Single Market Strategy. I’m sure much will be written on this subject in the coming months. In the meantime the ITSPA summary is a good little crib sheet of the issues:

Last week the EU Commission published its Digital Single Market Strategy. In the document the Commission sets out 16 key actions which it intends to complete by the end of 2016 based upon the three following pillars:

Better access for consumers and businesses to digital goods and services across Europe

Creating the right conditions and a level playing field for digital networks and innovative services to flourish

Maximising the growth potential of the digital economy

The DSM Strategy also included the following specific actions of particular relevance to ITSPA members and the telecoms industry:

Present legislative proposals to reform the current telecoms in 2016

the Strategy includes a pledge to overhaul the EU’s telecoms rules, including more effective spectrum coordination, and common EU-wide criteria for spectrum assignment at national level.

creating incentives for investment in high-speed broadband

ensuring a level playing field for all market players, traditional and new; and

creating an effective institutional framework.

Perform a comprehensively analysis of the role of online platforms (such as search engines, social media, app stores, etc.) in the market.

Reinforce trust and security in digital services, notably concerning the handling of personal data. Building on the new EU data protection rules, due to be adopted by the end of 2015, the Commission will review the e-Privacy Directive to ensure that it is aligned with the reformed data protection legislation.

We in the UK have big challenges over the next few years in respect of internet and tech related legislation. Not least since the General Election wiped some tech talent off the parliamentary map. I’m thinking in particular of former Cambridge Lib Dem MP Julian Huppert who was heavily involved in fending off the Snooper’s Charter.

It’s a bit of a worry when I see some of the text in the Digital Single Market Strategy. The worry comes in two guises. Firstly yes some of these areas need looking at. The role of search engines etc. We don’t want them forcing unfair practices.

Secondly I’m not sure I like the idea of government interfering. This is somewhat counter to my first point. If nothing else, governments rarely have the expertise required to get involved.

We aren’t going to solve it all here and now but certainly look out for more content in this space in the coming weeks and months.

Categories
Business webrtc

Where is the WebRTC money? We don’t just do this for fun.

WebRTC monetisation – where is it at?

Last week I chaired a WebRTC workshop. There seem to be a lot of them around at the moment. Very trendy/topical. It was an ITSPA/trefor.net event.

We previously had a WebRTC workshop two years ago where a room full of engineers  were treated to fairly uninspiring demos of WebRTC in action. The uninspiring bit was down to the fact that effectively what we were being shown was person to person video. This kind of service was something that everyone in the room had been offering since time immemorial (we have short memories in the VoIP business – it’s still a young industry).

My prior experience with WebRTC, incidentally,  was at an ipcortex event the previous year where I was privileged to have been one of the first people to make a WebRTC to PSTN call.

Regardless of the number of panel sessions there have been recently on this subject we decided it was reasonable to follow up that first ITSPA workshop with a progress report. The theme of this workshop was the WebRTC business model. Where’s the money?

It took quite a few years for VoIP monetisation to happen. In the early years the only people profiting from the technology were conference organisers. Then came a batch of startup acquisitions – SIP vendors being snapped up by established businesses who had woken up to the fact that they needed to be in the game. Now of course VoIP is mainstream and the growth of the ITSPA membership is testament to the health and profitability of the industry.

So where is WebRTC when it comes to making money?

Before we can answer that we need to understand a little about the technology. The whole reason for being of WebRTC is scalability. If we want to be able to embed communications into any device, and seemingly we do, then current client technology, mostly SIP, doesn’t cut it. WebRTC can be embedded in any browser in theory. At least that’s the ultimate goal. WebRTC also comes with a simple set of APIs that should allow any web developer to incorporate the capability into a site design. One can envisage a WordPress plugin for example.

So WebRTC is about simplicity and scalability of deployment. It’s also about interoperability but I’m not going to touch on that in this post. Interop goes with scalability really.

What about WebRTC monetisation then? WebRTC isn’t something you are going to sell per se. It’s not like an iPhone or a toothbrush (make what you will of my choice of saleable objects). WebRTC is an enabler. The issue is how you take advantage of it

What you will be selling is a capability. A solution. An added value function. There are one or two business models that spring to mind. Using the WordPress example from earlier in this post there is likely to be a support ecosystem for devs in the same way that now exists for WordPress. Linux is another example.

Web developers will be able to sell Real Time Communications functions in websites they pitch to their clients. Customer service organisations will lap up such capabilities. How great will it be to ba able to talk to customers browsing your website and answer any sales questions? Push some relevant product pages maybe?

There could well be some infrastructure money to be made. PSTN Gateways?!

The biggest question in my mind is how a sales channel might approach WebRTC. It’s always been said that traditional telephony channels found it hard to adjust to the world of VoIP. WebRTC takes this a step further away from their comfort zone. Now you need to be able to talk web design to customers.

We live in fast moving and interesting times and it won’t take WebRTC nearly as long to climb the maturity curve as did VoIP. In fact  it is already pretty wide scale use. Google Hangouts for example, and Facebook Messenger.

The Internet of Things is a natural port of call for the tech. IoT, IPv6 and WebRTC. An engineer’s dream. We got it wrong with the concept of the intelligent fridge. Really we shouldn’t expect it to know when we need more milk. We will however find it useful ourselves to talk to Tesco to ask them to deliver some more and we will do that via WebRTC. Strike while the iron’ hot and before the milk runs out.

At last we will be talking to our fridges mwahahahahahaaaaaaaaa.

Previous posts from the ipcortex WebRTC week:

WebRTC and the reseller

Real Time Campaigning: How will WebRTC and other tech impact elections in 10 years’ time?

Hacking together a WebRTC Pi in the sky – keevio eye

Wormholes, WebRTC and the implications of algorithmical analysis

Matrix.org: Defragmenting today’s communications

WebRTC – where are the real world applications?

Welcome to ipcortex WebRTC week on trefor.net

Check out all our WebRTC posts here

Categories
4g Business Mobile ofcom UC webrtc

WebRTC and the mobile reseller opportunity

The WebRTC opportunity for mobile sales dealers

So far in the ipcortex WebRTC week we’ve talked a lot about the impact that WebRTC will have on how we might communicate, as well as exploring some of the technical aspects of the technology. One thing that we’ve not really touched upon is the way that WebRTC will change the commercial comms ecosystem and, being browser based technology, how it will come to affect the mobile business market.

We invited Dave Stephens,  ‎Sales Manager at major O2 dealer Aerial Telephones to share his views on the current challenges in the business mobile market, diversification into unified communications and how WebRTC will impact the delivery of solutions that marry the two.

A changing market

mobile conversationThe business mobile market is in a difficult space right now. Monthly prices are falling whilst handset costs are rising dramatically; a situation made worse in the UK where by and large we still expect to be able to get a free handset with a new contract. Of course we all know the handset is not really free, rather subsidised by the selected tariff, but the result is that many mobile providers only seeing a profit in month 18 onwards.

This differs from  most other countries, where the norm is to select a tariff and then have to purchase the handset separately. While this alternative is beginning to creep into the UK market it’s proving to be a very difficult shift from the “free handset” culture that’s become so ingrained over the last fifteen years.

The business mobile world has also taken a few other hits recently. Non traditional mobile players are making real plans to infringe on the space. WhatsApp are now offering phone calls over 3G, 4G and Wi-Fi, and Google have confirmed their intention to act as an MVNO (in the US at first). Their Project Fi will introduce pay-for-what-you-use data plans, where unused data allowance is credited at the end of the billing cycle. Add to this that within the last few months, Ofcom have proposed a dramatic cap on the price of mobile phone calls between different networks. This will reduce another revenue stream for most UK mobile providers.

For business mobile resellers, there is additional pressure in that many of them have seen their base being attacked by traditional IT or unified comms resellers. It is true that it is far easier for IT or UC resellers to move into the business mobile market than it for a mobile reseller to go the other way, which would take significant investment and upskilling.

Adapt or perish

ChameleonThis all contributes to an environment where companies in the mobile space must adapt or perish. This isn’t limited to resellers, either. It can even be seen at a mobile network operator level where even the big players are beginning to move into some very untraditional services such as hosted telephony, landline services and even hosted IT products.

For the opportunistic and imaginative reseller, however, moving into other areas of business comms like these can present significant benefits and is a challenge worth attempting. “Mobility” is a growing concern within the IT and Telecoms industry right now with many businesses striving to adopt a “work anywhere” approach. We are seeing a clear push to give employees the tools they need to be effective wherever they are. This is ideal for the savvy mobile reseller that has always had this as their core remit.

There are of course issues when looking after a truly mobile unified communications platform. Primarily this is related to the fact that there are 3 core mobile operating systems which are constantly being upgraded, not to mention the 1000s of different handsets that users can choose from, each with their own quirks and nuances. Standard native mobile apps delivered by PBXs produce all kinds of headaches for engineering teams. This is where the development of WebRTC is really exciting as it may negate the need to install, upgrade and manage these difficult situations.

That’s a long way off – not every mobile OS supports WebRTC – but we are watching the progression of the standard with a keen eye.

Previous posts from the ipcortex WebRTC week:

Real Time Campaigning: How will WebRTC and other tech impact elections in 10 years’ time?

Hacking together a WebRTC Pi in the sky – keevio eye

Wormholes, WebRTC and the implications of algorithmical analysis

Matrix.org: Defragmenting today’s communications

WebRTC – where are the real world applications?

Welcome to ipcortex WebRTC week on trefor.net

Check out all our WebRTC posts here

Categories
Bad Stuff Business scams voip

Mechanics behind International Shared Revenue Fraud

VoIP fraud continues to rear its head this week with a post on ISRF mechanics.

Continuing with his week as guest editor covering VoIP fraud issues David Cargill has invited industry expert Martin John from AQL to discuss IRSF mechanics – how it actually works:

As we all know International Shared Revenue Fraud (ISRF) plays a large part in the overall fraud that we see in the industry, even though services are marketed legitimately they are widely used for fraudulent purposes and the artificial inflation of traffic, whilst some of the traffic will terminate in the target country a high percentage will never reach the expected destination (commonly referred to as short transit or short stopping)

Whilst the ITU governs the allocations of Country Codes once the code is allocated the usage and numbering plan is controlled by the responsible authority in the recipient country, the ITU publishes updates on the reported use of each numbering block for each allocated Country Code (http://www.itu.int/oth/T0202.aspx?parent=T0202) however this is based on information submitted by the responsible authority and is not always an up to date source of information.

Historically Telecoms Operators interconnected directly via TDM on a bilateral basis, a settlement rate would be negotiated with a key objective being the balance of traffic to reduce any financial settlement between the parties, using this method the majority of ISRF traffic actually terminated in the country that holds the number allocation.

isrf mechanics

Smaller countries or those with financial constraints could not justify or afford this method and opted for a cascade accounting method, cascade accounting meant that the smaller operator would make an agreement with one or two larger international operators whereby the larger operators became an aggregation point for the allocated country code and in return kept a percentage of the revenue.

isrf mechanics

With cascade accounting traffic to designated number ranges could potentially be short transited, the authority responsible for the allocation and administration of the number ranges may have requested that the cascade accounting partner terminate certain prefixes to alternate carriers/partners for other services, these opportunities were very financially rewarding due to the expensive part of the network (the international circuits) not being utilised.

isrf mechanics

 

 

As the market developed and with the establishment of VoIP clearing houses/exchanges and traffic aggregators cascade accounting has become less popular, operators favour being able to interconnect to lots of different operators in one place, increase their profitability as they no longer have to give a percentage to the cascade accounting partner and lower their cost base as they would no longer need to purchase other international routes via their previous cascade accounting partner, however this simply made ISRF easier, the telecoms market is more cost driven today than it has ever been operators strive to  maintain lcr with the minimum of man power and international destinations that are outside of their main business area are commonly terminated through large traffic aggregators or clearing houses, interconnection between the aggregators and clearing houses is a common practice it is in their business interest for a call attempt to complete and convert to revenue and therefore as the financial barriers to connect to clearing houses are small the interconnection by parties that want to abuse the situation is relatively easy.

Take for example the following scenario:-

The island of High Termination Rate is assigned the country code of +997 from the ITU the and files a numbering plan. The island of High Termination Rate Telecommunication Regulatory Authority (HTRRA), announces the following:
isrf mechanics table

 

 

The national operator of the island of HighTerminationRate HTRT is a respectable and ethical company that interconnects to a large traffic aggregator and a clearing house to not only gain access to a full international A-Z for terminating traffic but also to ease interconnection with other international carriers so that the residents of The island of HighTerminationRate are globally reachable, the per minute rate is advertised as £1.00 ppm

aql4
To this point everything is legitimate however there is nothing stopping the aforementioned opportunistic man in the middle/ISRF reseller from also interconnecting to an aggregator and clearing house and advertising a rate of £0.98 ppm supporting either the full list of breakouts or “specialising” in certain areas such as HTR Mobile +99780

aql5

 

 

In the background the ISRF reseller has been busy harvesting numbers and happily upsetting the observed statistics (reduced ASR’s etc) whilst tying up network capacity to obtain a better understanding of the utilisation of the ITU allocation.  Once this understanding has been obtained numbers can be tested and resold to customers.

Some may wish to offer chat services or other services of the like whilst avoiding any national regulation and of course this then opens the door to parties that wish to generate fraudulent traffic.  To expand further after number harvesting it is discovered that anything that starts +99780752 can NOT be completed via the legitimate route offered by HTRT.  It is a range that falls within the allocation but perhaps due to demand has not been opened yet.

Any traffic generated to this range will fail on the HTRT route if in fact it even attempts the HTRT route first due to the ISRF route being marketed at a lower rate. Once that call has failed the aggregator/clearing house would normally route advance the call to the next available route where ISRF are happy to complete it.  Legitimate traffic that the ISRF route receives is simply terminated back to another carrier. Whilst this incurs a loss with restrictive routing and capacity the impact is minimal and aesthetically legitimises the service offering provided by the ISRF route.

aql6

 

 

 

 

 

 

 

Martin John is the General Manager of aql wholesale. aql, established in 1998, is a wholesale integrated Telecommunications Operator, Regulated by Ofcom. Providing services to many of the FTSE 100 and is one of the UK’s largest IP Telephony fixed line operators.  It is recognised as a significant market force in fixed and mobile services by the UK Regulator.

Check out our other VoIP fraud posts here. Below are links to other fraud related posts this week:

PABX fraud by Manuel Basilavecchia here
IRSF Fraud by Colin Yates here
CLI Spoofing detection by Matt Anthony here

Categories
Business internet social networking webrtc

Matrix.org: Defragmenting today’s communications

Matrix.org Comms Federation

In his week as guest curator Rob Pickering of ipcortex now has a post by Amandine Le Pape who discusses WebRTC federation.

I’ve held a view for a long time that the world would be a better place if there were a widely used standard for messaging federation, so that I could for example have one universal public chat address on my business card just like I have a phone number and e-mail address. I know quite a few folks disagree with this, and think that it is a “feature” rather than a bug that they have to use a myriad of apps each with their own private chat space and no interoperability, but I think this is a big usability headache.

Like most things, there is an Internet standard for messaging interop: XMPP, but it doesn’t have the wide adoption of other standards like SMTP for e-mail, or HTTP for the web. In fact it suffered a bit of a body blow when Google dropped support for messaging interop via XMPP from its front line messaging products a couple of years ago – I wrote about this at the time. Whilst XMPP is a well documented protocol, it is over complex with many extensions to do fairly basic operations. A new initiative has emerged from the folks at Matrix which aims to produce a de-facto standard protocol for messaging interoperability – I wish them well and suspect that this is probably our last chance to sort this out. Here is what Amandine Le Pape from Matrix has to say…

Take a look at your smartphone. Chances are, among the various icons on the screen, there are quite a few messaging apps and apps with a messaging capability. Whether text, chat, calling or via video, every week brings a new app to download. We use all these different applications daily – LinkedIn for colleagues, Facebook for family, WhatsApp for the sports club, Viber for some international contacts, Skype for video and that is without even touching messages sent from within other apps.

The only point where these apps and the profiles on them converge, is on your phone. We then have to juggle what app connects me to what person, or holds the information you need. Matrix.org is a new open source and non-profit project aiming to fix the problem of fragmented IP-communications between devices, people and services with a very pragmatic and novel approach. Matrix defines a persistent data layer for the Web, with open federation, strong cryptographic guarantees, eventual consistency and push semantics. Like the Web, Matrix can be used for many purposes, from Instant Messaging to IoT, via VoIP and WebRTC. With it the “missing link” of interoperable calling between WebRTC silos becomes interoperable and as simple as a single HTTP PUT to invite the callee, and a single HTTP PUT for them to answer. Meanwhile, OTT messaging apps can finally federate by synchronizing their conversations into Matrix; letting users own their history and select their preferred app and service.

As an open source project, any developer can use Matrix (it’s all on Github) to easily create and host their own feature-rich real-time communication apps that openly interoperate with one another, or add such features to an existing service whilst building on the Matrix community of users. Existing communication services can also easily join in and integrate with the Matrix ecosystem, extending their reach while participating in this collaborative effort to break down the walls between communication silos.

Matrix is an open project and will stay so because for Matrix to achieve its mission of making all communications services interoperable we believe it needs to be truly open; giving people access to take all the code we produce to use and build on top of it. We need the trust and support of those who want to use Matrix in their own applications and startups and want to see an end to all walled garden applications and closed silos.

We firmly believe in doing what is right for the consumer and the internet user. As people begin to use interoperable communications tools, service providers will have to compete on the quality of their service, security and features rather than relying on locking people into their walled garden. Can you imagine using a phone network that only allowed you to call people on the same network? We genuinely hope that one day, Facebook, Whatsapp, BBM etc will all integrate with Matrix voluntarily.

Once consumers realise they can choose to use their favourite app, from their trusted app provider, and still be able to communicate with friends using competing apps and services, they will likely demand integration and interoperability.
Matrix is here to help foster innovation throughout the Internet. We are making communications safer, more ubiquitous and innovative. Generic messaging and data synchronization across the web will never be quite the same again. The project may well provide the disruption needed to change how real-time data is shared on the Internet, and usher in a new age of services which by default collaborate rather than compete. There is no doubt that a revolution of sorts has begun and Matrix intends to fan the flames.

As a company or an individual, whether you believe that today’s communications are fragmenting and need to change or not, check out the Matrix.org website or follow us on Twitter @Matrixdotorg. We also recently launched our ‘Matrix Console’ app which is free to download from the Google Play or Apple App Store.

Amandine Le Pape is the Co-founder and Business lead for Matrix.org

Previous posts from the ipcortex WebRTC week:

WebRTC – where are the real world applications?
Welcome to ipcortex WebRTC week on trefor.net

Check out all WebRTC post on trefor.net here.

Categories
Bad Stuff Business scams security voip

Caller ID Is Broken – How Can We Fix It?

matt anthony pindropCLI spoofing doesn’t have to be as big a problem as it is.

In the third of this week’s posts on VoIP fraud guest editor David Cargill has Matt Anthony, Vice President of Marketing at Pindrop Security as a contributor.

There was once a time when people trusted the number that showed up on their Caller ID. Phone companies charged extra for the service. Even banks allowed you to activate your credit card just by calling from a registered phone number. Today, that is no longer the case.

Caller ID (CLI) and Automatic Number Identification (ANI) were originally designed as systems to be used internally by the phone companies. As such, they didn’t need any real security. As they emerged as consumer facing tools, they never developed the security features that we expect today.

The result is that spoofing Caller ID data, or ANIs, is very easy. A quick Google search turns up pages of articles on how to spoof a number. App stores are full of easy to use apps that enable spoofing. One smartphone app, Caller ID Faker, has over 1,000,000 downloads.

spook card - disguise your caller id

Adding to the problem is the fact that in general, Calling Liner ID spoofing is completely legal. Though it is always illegal to use CLI spoofing for fraud or threatening messages, it is perfectly legal to spoof a number as a friendly prank, or as a helpful business practice. (Think doctors on call who don’t want to give out their cell phone number.) While it might be fun to spoof a CLI in a prank call to your friend, too often fraudsters are the ones disguising their numbers to hide their criminal activity.

Pindrop Security tracks phone fraud activity and trends. We have found that CLI and ANI spoofing is the most common technique used by phone fraudsters. In addition, more than half of the caller ID spoofing attacks cross international boundaries, meaning they are almost impossible to track down and prosecute.

Consider the case of one attacker, known to Pindrop researchers as “Fritz.” This fraudster is likely based in Europe and works alone. Fritz is in the business of account takeover. He calls financial institution call centres, impersonating legitimate customers by spoofing ANIs, and socially engineers the bank into transferring money out of an account. In one four month period, we found that Fritz had targeted 15 accounts. We estimate that he has netted more than £650,000 a year for at least several years.

While there is no technology that can prevent CLI spoofing, it is possible to detect these calls. The key is to detect anomalies between the information being sent over the Caller ID and the actual audio characteristics of a call using phoneprintingTM, created by Pindrop Security.

Phoneprinting technology analyses the audio content of a phone call, measuring 147 characteristics of the audio signal in order to form a unique fingerprint for the call. Phoneprinting can identify the region the call originated from and determine if the call was from a landline, cell phone or specific VoIP provider. These pieces of information provide an unprecedented level of insight into caller behavior.

So, if a Caller ID says a call is coming from London, but the phoneprint of the call shows that the individual is calling from 1,000 miles away, it should be a red flag for anyone running a call centre that the caller has malicious intent.

pindrop caller id verification

 

 

 

 

 

 

 

 

One recent fraud attempt thwarted by Pindrop tools happened on a Saturday night, a time when most call centre employees are not at their most vigilant. The caller asked to transfer £63,900 from one bank to another. The Caller ID matched the phone number associated with the account, and the caller knew all the answers to the identity questions the agent asked. However, while the Caller ID said the call was coming from San Francisco, Pindrop detected that the call was actually coming from a Skype phone in Nigeria. As a result, the wire transfer was put on hold, and the bank was able to verify with the account holder that the request was fraudulent.

Pindrop phoneprinting solutions are already protecting calls to top banks, financial institutions, and retailers. The Pindrop platform is a comprehensive solution designed to protect the entire call system: inbound, outbound, live, recorded and in the IVR, customer-facing and employee-facing interactions. Pindrop uses the information from the phoneprint to create a highly accurate and highly actionable risk score for each call, which has allowed it to catch more than 80 percent of fraud calls within 30 seconds after the call has been initiated.

Historically, the phone channel has been over-trusted and under-protected, making it a major target for fraudster exploitation. Today, technology is available to detect spoofing and stop phone fraud.

Matt Anthony, Vice President of Marketing

www.pindropsecurity.com

Matt Anthony is the Vice President of Marketing at Pindrop Security. With over twenty years of experience in the technology industry, Matt is a frequent speaker at technical conferences. Prior to joining Pindrop, Matt served as Director of Marketing at Dell SecureWorks. Matt has also held marketing roles at CipherTrust, Monorail, and Dell Computer. He is a graduate of the University of Texas at Austin.

Check out our other VoIP fraud posts here. Below are links to other fraud related posts this week:

PABX fraud by Manuel Basilavecchia here
IRSF Fraud by Colin Yates here

Categories
Business scams security voip

Telecom Fraud – Investment in Prevention and Detection initiatives not always available.

colin yatesIRSF- International Revenue Share Fraud

This week we have David Cargill as guest editor. David runs the Operations Working Group at  the Internet Telephony Sevice Providers’ Association (ITSPA) and takes a special interest in VoIP Fraud. David has invited a number of experts to contribute guest posts on fraud related subjects. This ties in with the ITSPA/trefor.net Workshop on Wednesday that has VoIP fraud and WebRTC as its main themes. This is his second choice of post, in which IRSF is discussed, is written by Colin Yates, Managing Director of Yates Fraud Consulting Limited:

The telecommunications industry has a huge gap between those operators who manage fraud effectively and those who do not. Those who are effective fraud managers, whether they are a Tier 1, 2 or 3 operator, are generally those who have matured over the years with a strong mandate and support from their Executive to do the job, while being provided with the necessary budget, resources and tools to do it well. Some senior management unfortunately view fraud losses simply as a cost of business, and allocate very little budget and resource to it. In these cases fraud losses are generally not measured or reported, so will remain unknown and not reflected in quarterly, half yearly or annual financial reporting.

There are some CSP’s who have enjoyed reputations within the industry as leaders in the management of fraud, but over time these reputations have diminished and their fraud losses have increased. Some of this could be blamed on a change of senior leadership who failed to appreciate the importance of effective fraud management. This could also be a result of a fraud manager who failed to continually make it clear to the organisation how much value they were adding to the business by effectively managing fraud. An effective Fraud Manager will take whatever steps are necessary to ensure that the papers for every Board meeting will include his quarterly fraud report to clearly identify the fraud recoveries and averted losses they have achieved during the period since the last meeting.

Fraud within Telecom operators is generally measured as a percentage of total revenue, and depending on which organisation is providing the figures, this could be estimated at anywhere between 1% and 5% of total revenue. In my experience an operator with a mature fraud team with the necessary fraud detection/prevention tools, along with the support of his management team is likely to maintain their fraud losses at under 0.50%. Assuming this is a tier 2 operator with total revenues of $US1.5 billion, if the effectiveness of the fraud team was permitted to deteriorate to a point where fraud losses increased by another 0.25% of total revenue, this would add a further $US3.75 million to the annual fraud losses. To recover this revenue through adding new customers would require upwards of 10,000 new customers to be added to the business, assuming an average ARPU of around $US370 per year. Would it not make better business sense to continue to support the fraud management function with resources and tools at a cost of probably 10% of the additional fraud losses suffered.

Subscription fraud is without a doubt the biggest contributor to fraud losses across the industry. While most operators would agree that their aggregated subscription fraud loss far exceeds those suffered by any other fraud type, the drive to attract and connect new customers can make it difficult to manage. Most sales channels will require that a potential customer who meets basic identity verification checks will be provided service during that one visit to a physical or on-line store. Without investment in real time subscription fraud detection tools, this type of fraud is always going to be difficult to manage. Some of these tools are no longer expensive and can allow a CSP to take more risk when providing service to new customers.

International Revenue Share Fraud (IRSF)1 has to be regarded as the one fraud type that the industry has failed to manage effectively, primarily again because of a lack of investment in tools and resources by some to prevent and detect an attack early to minimise losses. IRSF Fraudsters can attack a business using many enablers, for example subscription fraud, roaming Fraud, PBX hacking, Mobile Malware, Wangiri Fraud and others. Some CSP’s use tools, either developed in-house or obtained from an FMS provider and do manage their IRSF risk effectively, but many others simply operate in the belief that this fraud will never impact them, so they will make no investment in a defensive strategy, and simply take the risk.  This decision is typically not taken by those accountable for managing fraud, but by those a level or two above who control the budgets. In most cases, this decision maker will have no idea what the actual risk is, and the impact of not implementing these controls may result in losses way above his delegated financial authority. It is still not unusual to hear of IRSF losses that have amounted to over $US500,000 in a 2 or 3 day period. An investment of under $US30,000 could have avoided most of these losses.

It is well documented now that around 85 to 90% of all IRSF incidents occur in the period between Friday evening and Monday morning when many CSP’s fraud monitoring staff are not in the office. Unfortunately even some of those who have made the investment in monitoring tools will continue to ‘take the risk’ over weekends and will not take that monitoring a step further to enable some automation, or diversion of outputs from their monitoring systems to a 24×7 activity within their business. In a roaming situation, NRTRDE (high roaming usage) records are delivered within 4 hours of a roaming call completing, and this includes the period right through the weekend. Having made an investment to implement this fraud control, it is hard to understand why no-one would be looking at these in real time to identify fraud, or have some automated process set up to manage an obvious fraud indicator.

Without effective monitoring tools, some operators will simply block what they consider are high risk destinations assuming that this will reduce their risk of becoming a victim to IRSF. We currently monitor destinations and numbers used for IRSF and the total Countries advertised by IPRN Providers number 221 and the test numbers we have recorded in to these countries number over 100,000. However the top 10 high risk destinations very seldom change and are as indicated in the graph below. These 10 destinations are responsible for 50% of the IPR numbers being advertised, but any of the remaining 211 country International Revenue Share numbers advertised could result in significant fraud losses being suffered.

VoIP fraud by country
Sources of telecom fraud by country

Fortunately there are more and more operators who have identified the value of 24 x 7 fraud monitoring, and have managed to make the argument for resources and tools to allow this compelling enough to obtain sufficient budget to implement this strategy.

Unfortunately this has not resulted in a reduction of the overall IRSF problem. It has simply driven the fraudsters to look for easier targets and these are currently smaller MNO’s and more recently MVNO’s. Fraudsters have come to realise that many MVNO’s do not have Fraud Management expertise in-house, or access to the information and networking industry forums that most MNO’s have available to them.

Prevention and Detection are the fundamentals of Fraud Management, which is particularly relevant for the telecommunications industry. The costs of pursuing a fraud strategy based on implementing the resources and tools required to monitor network usage are insignificant when compared to the likely losses you will suffer if you simply rely on luck. Anyone with any doubt in this area should arrange for an independent contractor to come in to their business and conduct a fraud risk review so that the full extent of the risks can be identified. A simple example of an MNO with an effective fraud monitoring process in place identifying and stopping an IRSF attack within 30 minutes, compared to an MVNO with no fraud process, allowing an IRSF attack to continue for 48 hours before detection, is demonstrated in the diagram below.

IRSF effective telecom fraud momitoring
effective telecom fraud momitoring

IRSF has now been around for at least 10 years in some form or another. Some CSP’s have lost significant amounts of money to it, and some fraudsters have generated small fortunes in fraudulent income from it. Many customers have been impacted through bill shock after their handset has been stolen or their PBX hacked, and many small countries have suffered social and economic impact as a result of their number ranges being hijacked by these fraudsters.

The argument for effective prevention and detection initiatives is compelling, but this does require some support and investment by an MNO or MVNO’s senior management team. After around 10 years of suffering from this fraud, it should be apparent that the various industry groups who have been searching for solutions are unlikely to come up with anything positive in the next year or two, so it really is up to the individual operators to take action to protect themselves.

1IRSF involves fraudsters calling international numbers that attract a high termination rate, from a stolen or fraudulently obtained connection, with an intention to inflate traffic in to those numbers and be paid a per minute fee from a number provider for each call made. Payment for these calls will eventually be required from the originating network, who will have no hope of recovering these costs.

Colin Yates is a telecommunications professional with over twenty five years’ experience, specifically in the area of fraud, investigations, RevenueAssurance and threat management. Colin specialises in the areas of Telecoms Fraud (Internal and External) and Investigations. He also has considerable experience with Personnel and Physical Security, Law Enforcement Agency Liaison,Intelligence Management, Regulatory Compliance, Revenue Assurance and Policy development.

Check out his website at www.yatesfraudconsulting.com. Also check out our other VoIP fraud posts here.

Read yesterday’s post on PABX fraud by Manuel Basilavecchia here

Categories
Business security voip

PABX fraud is on the up – by Manuel Basilavecchia of Netaxis

PABX fraud growth

This week we have David Cargill as guest editor. David runs the Operations Working Group at  the Internet Telephony Sevice Providers’ Association (ITSPA) and takes a special interest in VoIP Fraud. David has invited a number of experts to contribute guest posts on fraud related subjects. This ties in with the ITSPA/trefor.net Workshop on Wednesday that has VoIP fraud and WebRTC as its main themes. This is his first choice of post, in which PABX fraud growth and is discussed, is written by Manuel Basilavecchia – Co-owner, Sales and Marketing Director of NetAxis Solutions.

It is commonly agreed to estimate that the loss due to fraud in the telecommunication industry represents 0.5% to 5% of revenue of telecommunications operators.

Even if all of those scenarios are well known for years, many of them are still impacting the telecom industry. Of course, not only Telecom providers are impacted, as retail/corporate customers are impacted as well by telecom fraud.

In this article, we’ll focus on a specific kind of PABX fraud (and all mechanisms related) which is PABX hacking.

To make a fraud possible and generate money, a fraudster needs two things:  Traffic (generation) and a termination (Cash collection).

In order to generate the traffic the fraudster will hijack a PABX. Alternatively the fraudster will pay a third party to perform the hijacking. In that case, we’ll talk about IRSF fraud type (International Revenue Shared Fraud). Once the access to the PABX is effective, the PABX will be used as resource to generate calls to high cost destinations.  As the fraudster owns the numbers targeted by the fraud, a money flow will be established and the fraudster could retrieve the money.

At first glance, the mechanism is not that complex, but the thing is that it has worked for years and is still working nowadays.

Let’s try to figure out why

In most of the cases, hijack of the PABX is not that difficult. Indeed, very often the password by default has not been changed by the administrator. Also in case the password has been changed, a very basic password is used which is quite easy to guess by a fraudster. Alongside this, these systems are always subject to vulnerabilities which can be easily exploited by a basic hacker.

In most of the cases, that attack is made outside business hours  including weekends, assuming that the PABX activity is not monitored during these intervals.

In this way, the customer is even not aware that he has been victim of an attack.

This lack of monitoring during some times of the day/week has the consequence that very often the fraud is discovered when the customer receive his telecom supplier’s invoice.

There is also an aggravating factor which is the payment terms. Indeed, usually the billing period between retail customer and its telecom provider is monthly while the billing period for Premium rate numbers is weekly with as consequence that once the fraud is discovered, the fraudster already got the money and it is very difficult to get the money back (or withhold payment).

This is having negative consequence on the relationship between the retail or the corporate customer and the telecom provider. Indeed, as the fraud is involving international destinations, international carriers are part of the scheme.

Having several players in the scenario makes it quite complex and difficult to find a fair solution for all the parties and someone as to assume the loss generated by the fraud. Let’s consider a practical case that will illustrate all those considerations:

A fraudster buys some Premium rate numbers in a foreign country, keeping in mind the high cost per minute associated. As a second step, he will ask and pay (share revenue) somebody to generate traffic artificially towards those numbers.

Once the attacker gets access to the PABX, he will generate as much as possible traffic in the shortest time (night or week-end)

The fraudster will receive payment from the Premium rate number 7 days later.

Assuming that nobody will notice this traffic increase on customer side (same on operator side) this traffic will become visible when the customer will receive his telecom invoice; usually one month later.

Quite clearly it is too late to react and very difficult to avoid a loss. Indeed, the usual traffic flow for international traffic is the following. Traffic starts at a retail customer and is sent to his telecom operator. As it is regarding international traffic, the telecom operator will use one or several international wholesalers to terminate this traffic. Those international wholesalers could also use different suppliers to terminate the traffic. The number of intermediaries and the misalignment of the payment terms make it complex to withhold payment and very often a party will have to suffer a loss, in most cases being the retail customer of his telecom supplier

In case of fraud, the size of the operator could put him in a very difficult situation. There have been cases where the operator is forced to choose between losing the customer or have to assume the loss generated by the fraud. If the telecom supplier is not financially robust, this could have very big impact on business.

As a conclusion, to avoid risks linked to this type of fraud it is important to:

  • Take all appropriate measures to secure the PABX of the customer. This point is often difficult due to the diversity of the installed based or the lack of expertise at customer side. So a good information campaign needs to be setup.
  • Deploy a Fraud Management System that, in near real time, will look at any customer traffic patterns in order to detect abnormal activity in terms of volume or destination.

Of course, the FMS needs to be operated by people having skills in fraud detection, or better, expert consultants to detect fraud but also to avoid false positive cases and not block legitimate traffic (and revenues).

Additionally, this will provide the capabilities to the operator to mitigate the financial exposure by reacting quickly to fraud cases (reducing the impact) and by providing evidences in order to open claims towards authorities and upstream providers (Recovering losses).

Manuel Basilavecchia is Co-owner, Sales and Marketing Director of Belgium based NetAxis Solutions. Manuel Basilavecchia brings over 17 years of business strategy, innovation and technology experience to his role as co-founder. As Director of Sales and Marketing, Manuel is focused on developing NetAxis Solutions business by bringing advanced carrier-grade communications services to Service Providers and Corporations and by providing high-technology products to the industry. Manuel holds a Master in Electrical Engineering – Electronics and Physics, a Master on Medical Physics and Bioengineering, and an MBA in management.

Loads of posts on PBX fraud here. Also come back for a different VoIP fraud post each day this week.

Categories
Business voip voip hardware

Practical IP Phone Design

ip phone hot-desking ip phone roi ip phone interoperability ip phone security lesley hansen on designing an ip phonePractical Applications for Your IP Handsets

In the last of her articles on IP handset design Snom Marketing Manager Lesley Hansen talks about practical applications including ip phone hot desking.

IP phones are unique in that they were built to support IP first and telephony second. When businesses embrace the richer world of unified communications the benefits of IP phones become evident. With IP phones business users can use converged services which incorporate voice into data and video applications.  Advanced IP phones are really multimedia endpoints that bring these capabilities together with a single interface. IP phones interface with IP Telephony servers or IP PBXs and they can deliver features to your phone that are not available with more traditional office phones. Business productivity features such as Auto Attendants, Music on Hold and Automated Personal Attendant services, but also user productivity features such as caller id, voicemail, voice to email, transfer announcements and speed dial.

Beyond the elegant feature list on an IP phone there are certain practical applications that the handset needs to be designed to accommodate in order for the business to get the most from their IP handsets.

Hot Desking

In IP Telephony hot-desking can be best described as when your extension is whatever phone you’re logged onto. Hot desking means that a business can make efficient use of office space allowing workers to use available desk space rather than deploying one desk per user and having empty unused desk spaces when employees who spend time in other offices or at customer sites are not in their local office. Hot desking in an office environment can save on lighting, heating, and power and space costs and promote improved interaction between employees.  In a call centre where a desk space may be expensive because of the tailored equipment, Hot desking is an excellent way of using the resources available to best effect.

IP phone hot desking does not only save money for the business it also make the individual more productive. Any small business with multiple locations will see a great benefit in hot desking.  A person may have a number of offices and travel and work out of each of them, depending on the day of the week or week of the year.  With hot desking, they’re always connected to their voice mail, and easily accessible via their extension number.  They have all the features and functions that they are used to having on their IP phone.

Hot desking also benefits the end customer, the employee can log in on any phone in any office and be fully connected.  No more problems for the end customer searching and guessing to find out what office their contact is working out of today.

When designing an IP phone for hot desking it needs to accommodate multiple IDs simultaneously and to be able to download user profiles from the switch when a new user logs on.

Home Working

Home working is the scenario where you live and work in the same place and brings new challenges to the design of IP Telephony handsets. Enabling home working allows for a reduction in commuting charges and mobile bills. As calls on your private IP network are free you can also make savings on call costs. Home working requires an IP phone to be easy to setup and reliable to use. There is no technical resource in most homes and to keep costs down and productivity up the IP phone needs to be a plug and play device. Once a phone is plugged in needs to be fully operational with the same features and functionality as the user has when in the office. The principle behind home working is that the user is allocated a single IP extension on the IP Switch which is retained no matter whether working on a home extension or logged in to an office extension.

Moves, Adds and Changes

Moves, adds and changes (MAC) is the general term for the routine work performed on items such as Telephony handsets in an enterprise, including installations, relocations and upgrades. MACs can cost a business valuable time and can involve reconfiguration, physical relocation and testing and setup. Using an IP phone the costs for MACs can effectively be eliminated since users can log themselves onto any handset and so effectively manage the move or change themselves. Costs savings from user empowerment through IP in moves such as office relocation or re-organisations, staff rotation and data centres moves are considerable. It is important when selecting an IP phone to ensure it has been designed to easily accommodates remote deployment and remote management facilitating low cost moves, adds and changes within the business.

Support for Multiple Profiles

It is not uncommon for a business to employ people who work representing more than one role or business venture. In these situations the IP phone can be designed to allow the user to have multiple identities so that they can have calls coming in to multiple incoming numbers over multiple lines and can recognise which line the call is coming in on and answer the calls appropriately for the businesses. When making calls in this type of situation it is also important that the outgoing caller id is appropriate to the business being represented. The ability to support multiple identities is a simple feature of IP phones but one that is easiest to use when designed into the handset.

Speaker or Conference Phone

Clear communications is critical if business calls or meetings are to be productive. The audio quality achieved through a speaker-phone or a specially designed conference phone is different, they are optimised differently to handle multiple voices and background noises. Therefore understanding the use of a phone is an important consideration in phone design and selecting a phone that is optimised to the task being performed is key to experiencing good voice quality. With a High Definition voice codec in use by all conference participants, combined with decent quality microphones and speakers, you will experience much clearer audio.

This post on practical ip phone applications is the 8th and last in our series on how to design an ip phone. Other posts in the series are linked to below:

How to design an ip phone
How to design an ip phone for voice quality
IP phone design for it departments
IP Phone Security
IP Phone Interoperability
IP phone ROI
IP Phone aesthetics

Check out all our VoIP posts here.

Categories
Business voip voip hardware

IP Phone Aesthetics

ip phone roi ip phone interoperability ip phone security lesley hansen on designing an ip phoneDesigning IP Phones for Beauty and Practicality – IP phone aesthetics

In the 7th of 8 posts on how to design an IP phone Snom Marketing Manager Lesley Hansen talks ip phone aesthetics.

Design is at the service of the user and the product functionality. In order to reach a good design, we must give priority to decisions that are taken during the products development. A design that is artistically pleasing is one of the criteria that is considered by Snom when we design any new handset or conference phone.

All telephone handsets have at their base the model used by Siemens in their first handsets for traditional telephony 30 years ago. Siemens invested in the development of the technology from day one. They set great store by ergonomics, intent on making the telephone more convenient. They started with the introduction of the hand receiver, followed later on by the scoop-shaped receiver which typified the design for many years.  This investment in design and interest in the ergonomics and practicalities of handset manufacturer is an approach emulated by Snom Technology to this current day.

The handset designer is not working with a blank sheet of paper on which to fashion their creations.  Each new handset has a specification which details the features and functionality that are required in the handset. These features and functions dictate the chipset to be used and the memory and circuit board content that has to be incorporated into the unit.  The designer typically works with a telephone engineer who has an awareness of the audio rules to achieve best quality audio. For example every speaker needs a chamber and the chamber design can fundamentally affect the voice quality.

IP phone aesthetic design is a trade-off between artistic and audio quality. It is in this area more than any other that Snom pushes at the limits in IP Phone design. Snom add uniqueness to their product offering in the quality of audio achieved improving and enhancing the basic CODEC quality.

Once a drawing of the design is approved a prototype is made and the handset is tested mechanically to ensure the design is practical and efficient. There follows a series of tests and modifications aimed at achieving an optimum balance of audio quality, practical efficiency and beauty in design.

It is during this stage that unique elements can be added into the handset design to enhance it’s usability in the workplace. For example some of the Snom handsets have a unique stand that enables them to be either desk or wall mounted at the angle best suited to the user.  This makes them more comfortable in use for some workers. There are also differences between handset models based on the environment in which they are to be used.  For example a phone designed for voice use in noisy offices is designed to reduce interference from outside noise.  One intended for use in an office where users have to concentrate has a handset designed to be put down quietly without disturbing other people in the office.

Another example is that a handset designed for use by service providers and on premise installations with remote office must avoid the need for local provisioning or configuration, and one designed for use in a local office environment must include abilities to interface with other devices in the office. Mobility is the main design feature that users focus on as a differentiator.  However in a professional handset range there are numerous other features that make one handset more appropriate for use than another.

The design of the handset is critical.  If a handset feature is incorrectly optimised by the manufacturer then new software can be introduced to make the change needed to improve the sound or usability.  Although this is inconvenient to the customer, and unprofessional from the manufacturer’s perspective the costs incurred are low.

This is not an approach used at Snom but some manufacturers do release multiple software upgrades using just this model – test and change at the expense of the customer in order to keep their own costs low and speed to market rapid.

If the basic phone design changes the costs incurred for replacement of the expensive and specialist tools used to inject the plastic components are irrecoverable.  This high cost of error is one reason that Snom keep all our design and prototype manufacture in house in Berlin. Hence we have the control to ensure the design is tested in small quantities tool production before it moves to mass production elsewhere. This approach ensures we have a tight control over the quality of our handsets and are able to ensure that we produce professional and enterprise IP phones.

This post on ip phone aesthetics is the 7th in our series on how to design an ip phone. Other posts in the series are linked to below:

How to design an ip phone
How to design an ip phone for voice quality
IP phone design for it departments
IP Phone Security
IP Phone Interoperability
IP phone ROI

Check out all our VoIP posts here.

Categories
Business UC voip

6th trefor.net UC Executive Dinner sponsored by Snom

kevin murphy btuc executive dinner is another hit

Just a quick footnote re the 6th trefor.net UC Executive Dinner held on Tuesday night in London. We had 23 top industry executives signed up for the event which is by invitation only. Tuesday night’s event was held at London’s top Michelin starred Spanish restaurant Barrafina.

The speaker Kevin Murphy runs BT’s voice network and treated us to a great talk on where BT’s voice capabilites are going. This event is gaining in strength each time it is held.

On Tuesday we had C Level representation from a great mix of companies including some who had flown in especially for the occasion. Major multi nationals including BT, Ring Central and Vonage mixed with smaller business focussed UK companies together with key vendors in our space.

snom sidebar adAs well as extending a special thanks to Kevin Murphy I’d like to thank German SIP handset manufacturer Snom for their generous sponsorship. Snom were one of the first manufacturers of SIP phones and are therefore one of the oldest companies in the game.

These evenings are operated under Chatham House rules whereby nothing said on the night is attributable to any individual. This makes for a very open discussion in an environment where many of the participant are competitors. That isn’t to say this is a cartel under another name. The topics discussed are those relevant to the industry as a whole.

Check out what people say about the trefor.net Exec Dinners:

Colin Duffy – CEO,  Voipfone
The trefor.net uc executive dinners are always good for high quality gossip, industry chit chat and networking – you can guarantee learning something or meeting someone new and useful. Far more importantly though, they’re just a damn good evening out.

Tim Meredith – Director of Unified Communications and Mobile, Daisy Group PLC

I just wanted to thank you for being an excellent host and putting on a really informative (and fun) evening. I hope to attend many future evenings!

Andy Davidson – CTO Allegro Networks, Chairman LONAP, Chairman IX-Leeds, Director Euro-IX

Lively, informative, and tasty!  That’s how I’d describe each evening I’ve spent in the company of Tref and his invited guests.  You’re guaranteed several conversations with colleagues and key decision makers at organisations across the industry over a relaxed dinner at a fantastic hand-picked menu and location.

Check out our events page here.

Categories
Business security webrtc

ITSPA Spring Workshop in association with trefor.net

It’s that time of year again – the ITSPA Spring Workshop in association with trefor.net

Another hand picked packed programme with something to suit all:) This ITSPA Spring Workshop is going to cover two hot topics: WebRTC and VoIP fraud. We have an exciting competition announcement and a real live voip hacking demo to look forward to.

ITSPA Spring Workshop

Date: 29th April 2015
Time: 2.30pm – 5.00pm
Location: Charles Russell Speechlys, 6 New Street Square, London EC4A 3LX

Session 1: WebRTC

i) Announcement of the Genband Hackathon Competition in association with trefor.net
ii) WebRTC Panel session: 2 years on from our last session on WebRTC – where is the money?

Panellists:
Stuart Goble – Genband
Matthew Hodgson – Matrix
Rob Pickering – IP Cortex
Peter Dunkley – Acision

Session 2: Fraud Part 2: Keeping your business safe and how best to report telecoms fraud

i) International Revenue Share Fraud: How, why and what we can do to stop it
ii) Real-time PBX Hacking Demo
iii) Reporting Fraud to Action Fraud

Sponsored by:in association with:
Post workshop drinks, sponsored by Lonap, will take place after the workshop 
Book your tickets now by emailing: [email protected]. Tell em you know me:)

As a footnote, ITSPA, or the Internet Telephony Service Providers Association as an organisation have been getting busier and busier. There is an active calendar of events with workshops in the Spring and Autumn, a Summer Forum that is timed to coincide with the AGM, an Awards event plus the Christmas do.

These are all great opportunities to network with the ITSP industry and for companies trying to sell to this community an ideal place to get valuable visibility. ITSPA Workshops can be sponsored to get your brand seen. You should also consider running adverts on this blog during the same weeks as the events as we typically carry more VoIP specific content at these times.

If you want to know more get in touch.

ciao

Tref

Categories
Business UC voip voip hardware

Designing for the Financial Director – IP Phone ROI

ip phone roi ip phone interoperability ip phone security lesley hansen on designing an ip phoneWhy does the Finance Director care about IP Phone Design? It’s all about IP Phone ROI

In her sixth post this week the SNOM’s prolific Marketing Manager Lesley Hansen talks about IP Phone ROI (Return on Investment).

The best quality and most elegantly designed IP Phone in the world will not be widely accepted unless it meets business expectations regarding cost. Cost in its broadest sense will include cost of acquisition, cost of deployment, cost of ownership and return on investment. Any IP Phone design must consider each and every one of these aspects. It is because of the pressure on all businesses to meet financial targets that the Finance Director is a critical player in our considerations as we design and manufacturer each new IP handset.

Since much of the motivation for moving to IP telephony is cost related building an accurate business case, including capital, implementation, and operational costs, is crucial to selecting the best vendor and architecture for your organization.

Cost of Acquisition

There are hundreds if not thousands of IP phones on the market and they range in price from around £50 for standard phones to several thousand pounds for secure encrypted handsets for use by government employees.

Soft phones are the simplest and least expensive type of IP telephone since many are available free of charge. Soft phones work through specialised software installed directly onto a PC, laptop, or mobile phone handset. With a soft phone no handset is required, but for the comfort of the user and for improved voice quality soft phones are best used with a good quality headset or USB telephone.

One you start looking at an IP handsets at the bottom of the range you find the standard phone without many bells and whistles.  Typically standard features include caller ID, limited conferencing capabilities and speed dial.  As you move up in price you gain capabilities such audio capabilities and audio quality for features such as speaker phones, wider conferencing capabilities, history memory, programmable options and support for hearing aids.

Even further on you get advanced functionality such as support for voicemail and CTI options.  You also gain connectivity options as the price increases, moving from a connected IP handset with an Ethernet port to ones that supports WiFi and Gigabit Ethernet, multiple Ethernet USB connections and even Bluetooth.

At the top of the range, excluding specialist phones such as the security handset already mentioned, are complex professional handsets with high quality audio provided through noise cancelling capabilities making them ideal for the busy and noisy office. Some come with programmable options for integration into your business processes as well as colour display screens with web access.

Depending on the role of the person using the IP Phone, there will be a different set of needs and each person will be looking for something different in their handset. An executive may want the latest and greatest IP Phone, while a receptionist may only be concerned with the number of total calls they can handle at one time. Most people want the standard features in a phone such as Call Waiting, Call Transfer, Call Parking and Conferencing. The items that will most effect the cost per handset are needs such as a high quality speakerphone, a large display and the capability for extra extensions.

So the selection of the right IP Phone is likely to involve a number of different handset types,  a range of costs to meet the difference requirements of different employees and a degree of integration with your business functions. Doing your homework on what handsets are needed by the business is likely to save the company money in the long run. Providing handsets where the price reflects the importance of features to the business is paramount.

Cost of Deployment

Hosted VoIP is increasingly being adopted to avoid the excess costs and complexities of deployment of on-premise solutions. This is great from the end customer’s point of view as they get predictable costs.  For the IP phone manufacturer it simply moves the demands for easy to  deploy handset to the service provider rather than the end customer. The need is still there. The installation, provisioning and training costs for IP handset deployment varies greatly from vendor to vendor as well as from installation to installation. For example the question of how many remote deployment teams are needed and the complexity of the server/PBX installation will affect costs.

To reduce the costs of deployment Auto Provisioning can be used to provide general and specific configuration parameters (“Settings”) to the phones and to manage firmware actualization. Deployment applications enable enterprise customers and service providers to reduce deployment costs with automated remote configuration and ongoing management of the IP phones.

The Auto Provisioning application provided by Snom allows remote administration (configuration and maintenance) of an unlimited number of distinct Snom phone types. This application enables the user to unpack a Snom handset from the box, connect it to a local network and get it up and running without the need to configure anything.

The phones can be set up manually but the easiest way to provisioning the IP Handsets is to use the built-in plug and play provisioning functionality. The phone configures itself by retrieving a PBX generated phone configuration file from interoperability partners or using the phones DHCP.  The provisioning manager needs to approve the handset registration and assign an extension. The server will send a provisioning link to the phone. Once the phone receives the link, it will apply the configuration on the fly, and will be ready to use. If a firmware update is needed, a restart will be performed.

Selecting handsets designed for remote provisioning is critical in the long term cost of any IP Telephony solution.

Cost of Ownership

A lot has been written about the ongoing costs of owning an IP Telephony systems. It’s tough to get accurate operational costs before actually incurring those costs, but we do know based on experience that operational costs tend to be highest during the first two years of usage of a new technology. Once staffs gain expertise from using the technology, the operational costs drop by about 20%.  Reports indicate that without installing a solution offering ease of operation and remote management it is easy for a company to simply spend the money they have saved on Moves, Adds and Changes (MACs) by moving to IP Telephony on the management and monitoring of the new IP telephony system. External MACs for an old TDM environments use to cost £120 on average, and range from £50 to £200 each. IP MACs typically cost under £10 each.

The Graphical User Interface of an IP-PBX or Telephony Server will be much more user friendly than traditional PBXs.  This allows for easier changes and additions. Because phones are IP based, they are like PCs, and when they are moved from one connection to another they connect right back up to the PBX server.

These offer considerable savings compared to a time when a simple phone move needed to have cross connects changed and a phone technician making a billable service call. However if the IP Handset is at a remote site and local configuration or a remote restart is needed then there can still be costs incurred.  The best way to control these costs is with the selection of a handset with remote management and configuration capabilities and from a vendor who is not prone to excessive numbers of firmware updates which require handset resets or reconfiguration.

Here the recommendation is that to keep operational costs low you ensure that the phone´s interface allows remote users to simulate the usage of the phone´s keypad and special features.

IP Phone ROI

The idea of moving to IP Telephony solely to save money has slowly subsided, although it has not gone away entirely. In the early years of VOIP, companies had to find an ROI in order to justify replacing tried-and-true equipment for new technology. Now, they’re more often already in a TDM-replacement phase, so ROI becomes less important as organizations are focusing on other benefits, such as streamlined features, improved productivity, and integrated voice/data/video collaborative applications.

To be clear, there can be a net savings, and this is typically achieved after the first two years. But this net saving is easily eroded if the IP Handset selected is not suitable so that handsets have to be replaced, possibly because the wrong model for the role was selected in the first place or because the usage levels experienced in a busy office.

While the eventual costs savings for installing IP Telephony can be substantial, the start-up costs of deploying an IP telephony solution depend on a number of variables, including the size of the enterprise and the choice of vendor. To help organizations understand the total cost of ownership (TCO) of an IP telephony.

Other posts in our IP phone design week:

How to design an ip phone
How to design an ip phone for voice quality
IP phone design for it departments
IP Phone Security
IP Phone Interoperability

Check out all our VoIP posts here.

Deployment is a key contribution of the Value Added Reseller involved in the sale. Anyone interested in becoming a Snom VAR can check out their site here.

Categories
Business voip voip hardware

IP Phone Interoperability cc @snom

No man is an island – IP Phone interoperability explored

ip phone interoperability ip phone security lesley hansen on designing an ip phoneIn the fifth article of the series SNOM UK Marketing Manager Lesley Hansen talks about IP Phone interoperability.

Ensuring that you make the most out of your investment is important and is often a consideration as you shop for a new phone system. Budget-conscious business decision makers will want to protect their investment in existing hardware or applications. Forward looking companies plan for the longer term and want to ensure today’s investment remains part of tomorrows solution,. IP phone interoperability is therefore an important issue.

Gateways can be used to help businesses connect a legacy PBX, take the first step towards SIP, or even connect to a Unified Communications(UC) solution. However using a gateway is like involving an interpreter in a conversation. The information will get across but it is slower and more likely to be subject to misunderstandings.#

Optimum performance and simplicity is achieved by selecting products that have been tested and proven to interoperate together.

There is no unique definition of ip phone interoperability because the word has different meanings depending on the context. There are also different shades of interoperability. What can be interoperable in one given system implementation may not work with another, different implementation.

The glossary of telecommunications terms, from NTIA’s ITS defines interoperability as “the ability of systems, units, or forces to provide services to and accept services from other systems, units or forces and to use the services so exchanged to enable them to operate effectively together” and as “the condition achieved among communications-electronics systems or items of communications-electronics equipment when information or services can be exchanged directly and satisfactorily between them and/or their users.”  To me the interesting words here are effectively and satisfactorily.

 The more diverse networks, products and vendors exist, the greater the need to ensure that they can interoperate to ensure that end-to-end communication is possible. At the same time, the more difficult the problem becomes.

So what happened to the standards?

Standards enable interoperability in a multi-vendor, multi-network, multi-service environment. Good standards should leave little room for options and should be universal, produced in consensus with other interested bodies. Of course, this needs time, so a proper balance between quality and speed is needed otherwise a standard that takes too long to produce becomes obsolete.

In a competitive situation not all vendors will choose to comply to all parts of the standards. Moving away from a standard in small ways is what often produces competitive differentiation. It is often non-compliance with standards that secures a long term customer unable to incorporate other vendors’ products into the network. Often, particularly  with larger vendors, a divergence from a standard will over time evolve into a new standard, further confusing business user with a wide array of incompatible standards.

End points in the telephony solution are one of the low cost high volume items in the network.  As such IP Phones are one of the aspects of the IP Telephony solution where standards and interoperability should give the business choice and flexibility without loss of functionality.  Here there is little if any justification for  the use of non-standard based products.  Even standard products however can still have interoperability issues.

Is Interoperability Important to IP Handsets?

There are two possible approaches to IP handsets.  One is to regard the handsets as disposable with a write off period of 12 or 18 months. In this case durability and interoperability are probably both moot subjects as long as the handset functions as well as needed when purchased.  The handset will effectively be written off in the first year of the project and there is no need for it to be interoperable with any other part of the network.

Alternatively there are professional and enterprise handsets where the investment in the handset is recognised as being not only the cost of the hardware but the provisioning and support and maintenance costs. In this case the build quality of the handset is likely to be considerably higher and the life of the handset considerably longer. The Snom 300 series handset for example has a life expectancy in excess of 8 years, a fact that considerably improves the ROI for any IP Telephony project.

If you make the decision to invest in a short life, low cost end points then it is possible using an Audio Lab to have the solution tested with the PBX and IP network to ensure you are not sacrificing voice quality. In a fully equipped Audio Lab you can measure the quality of your VoIP phones and VoIP accessories including wired and wireless headsets, speakerphones and conference audio-devices by utilizing state-of-the-art audio quality measurement equipment and an anechoic chamber facility.

Leading measurement technology combined with the know-how and experience of the audio quality team enables comprehensive subjective and objective testing to determine audio quality parameters to maximize VoIP device potential. The measurement system should use the IP phone specifications published in the latest ETSI and TIA releases.

Establishing IP Handset Interoperability

VoIP systems employ session control and signalling protocols to control the signalling, set-up, and tear-down of calls. They transport audio streams over IP networks using special media delivery protocols that encode voice, audio with audio codecs. Various codecs exist that optimize the media stream based on application requirements and network bandwidth.

So we must look beyond the standardised elements such as session control, signalling and codes when we look for IP Handset interoperability. This is where testing comes in and why most vendors are committed to working with partners to establish and maintain the inter-operability of their products for effective and satisfactory working. Effective and satisfactory implies the need to support the features of the device without any loss of voice quality or service or any degradation to the advertised features of the products.

For example the Microsoft Unified Communications Open Interoperability Programme tests and qualifies devices, infrastructure components, online solutions, services, and solutions provided by third party companies for interoperability with Microsoft Lync Server and clients. Their qualification programs for enterprise telephony services and infrastructure ensure that customers have seamless experiences with setup, support, and use of qualified telephony infrastructure and services with Microsoft’s unified communications software.

Testing IP Handsets

Typically only products that meet rigorous and extensive testing requirements and conform to the specifications and test plans will receive qualification in a vendors interoperability programme. While the specifications are based on industry standards, the programs also define specific requirements for interoperability with third party devices and testing requirements for qualifying interoperability. To qualify as interoperable with third party PBXs or telephony servers IP handsets must meet enterprise-class standards for audio quality, reliability, and scalability. Basic interoperability testing for IP Handset with a PBX would include items such as

  • Call Origination
  • Call Termination (calls are terminated correctly)
  • Call failure handling
  • Hold – Unhold a call
  • DTMF functionality

Additional to these basic interoperability tests the following functions are recommended for IP Handset/PBX interoperability testing:

  • VoiceMail integration
  • attended/unattended transfer
  • Music on Hold
  • Busy lamp field

As a footnote the VoIP industry periodically gets together to test ip phone interoperability. This get together was originally called the SIP bakeoff until a certain bakery products manufacturer threatened legal action. These “test fests” have long since been called SIPITs, details of which can be seen here.

Other posts in our IP phone design week:

How to design an ip phone
How to design an ip phone for voice quality
IP phone design for it departments
IP Phone Security

Check out all our VoIP posts here.

Categories
Business security voip voip hardware

IP Phone Security

ip phone security lesley hansen on designing an ip phoneIP Phone Security ensures IP Telephony is not compromising the business

She’s back again. Guest editor Lesley Hansen discusses what needs to be considered in ip phone security design.

VoIP or IP phone security is a hot topic. Security attacks continue to evolve and attackers find ever more sophisticated ways of attacking systems. VoIP is only an application running on the IP network, and therefore it inherits the security issues of the IP network. This means VoIP security is only as reliable as the underlying network security and if the IP network has security vulnerabilities, these can be exploited once VoIP is implemented.

The goal of every IP network component manufacturer should be to build a product that maintains a high level of security and provides relevant data to tools to monitor the system for attacks.  Once the system in in place ongoing IP telephony security maintenance is primarily related to the IP PBX or telephony servers; keeping up-to-date with operating system and third-party service packs to eliminate well-known security holes, implementing critical support patches on servers, updating anti-virus definitions to protect against well-known worms and viruses and performing daily backups of servers with periodic data recovery tests.

But the IP handset is an important point of access into the IP network. End points such as IP handsets provide a point of vulnerability and a number of standard exist to secure the telephony network, but these are not always supported in the IP Handset, and where supported they are not always implemented by the network manager.

Avoiding Denial of Service Attacks

Denial of Service (DoS) attacks can take down telephony. A distributed DoS (DDOS) attack is a concerted and coordinated effort to flood a network with requests. Though the attacked network may not be penetrated, these attacks can “busy” a system rendering it unusable. To protect against this it is important while implementing the IP handsets to ensure that ports are not unnecessarily left open, all unnecessary ports and services should be shut down and unused services should be deactivated. This is where interoperability partners become key.

For example PBX manufacturers like 3CX and Vodia Snom 1 and Asterix PBXs support the Snom security settings from the handset – out of the box.  This means there are no configuration requirements so delivering a rapid roll out while ensuring the system is up and running with full security and minimum disruption or delays. Not all PBX manufacturers and IP handset vendors will be interoperability partners.  To ensure a wide number of PBXs can be supported and provide the business with a high degree of choice handset vendors should work with the TLS and SRTP standards for configuration setup.

TLS and SSL encrypt the data of network connections in the application layer. They use X.509 certificates and hence asymmetric cryptography to authenticate the other party with whom they are communicating, and to exchange a key. This session key is then used to encrypt data flowing between the parties.

Protect Against Unauthorised Access

When deploying an IP telephony system IT personnel and voice administrators need to take appropriate measures to prevent threats such as toll fraud. Toll fraud refers to internal or external users using the corporate phone system to place unauthorized toll calls. Toll fraud can occur with both TDM and IP-based voice systems and a standard method of protecting against it is the ability to control call type’s for example banning mobile or international calls.

This call control is sometimes handled by low cost routing within the PBX but it can also be done within the IP handset dial plans. A handset with this capability helps to protect against telephone fraud even when the PBX does not have low cost routing.

Ideally in a well-designed handset the telephone will provide security beyond that provided by the firewall. Security at the handset ensures protection from people on the inside network who have physical access to phones and can bypass the firewall. This means the handsets provide a higher level of security against phone tapping/unauthorised access. Supporting the 8021x standard helps avoids fraudulent use of the network and protects against 3rd party/un-authorised devices. Handsets that supports 8021x, where the PBX also supports the standard, will allow the device to request authentication from the switch. This ensures that if a device connecting to the switch does not have the credentials then the switch does not allow access.

Encryption Against Eavesdropping

VoIP systems that don’t use encryption make it relatively easy for an intruder to intercept calls. Any protocol analyser can pick and record the calls without being observed by the callers. In man-in-the-middle attacks, an internal user spoofs the IP address of a router or PC to spy on voice traffic as well as data entered on the phone keypad during a voice conversation, such as passwords. After copying the information, the user forwards the voice traffic to the intended destination so that neither the sender nor the recipient knows that the conversation was intercepted. Typical motives include espionage and harassment.

Eavesdropping has become easier because of widely available packet-sniffing tools. The method used to combat this is encryption. Provided that both the handset and the PBX supports the standards, encryption ensure that the audio and the signalling traffic are both protected. Products can be configured as enabled for security so that signalling is in TLS and audio in SRTP. These security encryption standards means that all communications from the handset to the PBX/Server is protected from snooping and tapping.

Greater levels of encryption are available but at a cost. At the top of the pile Secusmart in Dusseldorf provides an encryption technology currently used by the German government that can be incorporated into the IP Handset, these handsets are forbidden for sale to counties under embargo and the end users need to be checked and validated before despatching handsets. At CeBit a Snom handset with GSMK Cryptophone technology was presented, this provides an internationally accepted secure IP handset solution that sells to sells to organisations such as military, government, pharmaceutical and broadcasting where the information has such a high value that the increased cost for the handset and call manager with encryption is justified.

Once end points with the required standards are selected, for many organisations attention to detail during set up and use of passwords, plus a controlled rollout of the handsets and strictly following instructions when installing the endpoints plus using the SRTP protocol or VPN tunnels to increase network security will provide a secure solution without the additional investment in these higher levels of encryption.

Other posts in our IP phone design week:

How to design an ip phone
How to design an ip phone for voice quality
IP phone design for it departments

Check out all our VoIP posts here.