Sonus Cloud Link Connects SBCs with Skype CCE
Sonus manufactures its SBC 1000 and SBC 2000 session border controllers to help midsize businesses handle hundreds of SIP sessions in a single hardware appliance. Clients often run specific software packages, such as Microsoft’s Skype for Business, on their premises to interact with these SBC, but as the world slowly moves toward the cloud, so too must Sonus adapt to the changing landscape.
This is why Sonus will release its new Cloud Link software that integrates the SBC 1000 and 2000 with the Skype for Business Cloud Connector Edition, which itself comes as a set of virtual machines that link the Skype cloud-based private branch exchange (PBX) with a local public switched telephone network (PSTN). Cloud Link means to speed up the configurations of its hardware with the settings available in Skype CCE. Mykola Konrad, the vice president of product management and marketing, attests to the new software’s ability to make speedy changes in configuration while remaining secure and able to work with clients large and small.
“As customers move to Microsoft Office 365 Cloud PBX they need a way to connect to existing SIP and TDM providers. Most are doing this using the Microsoft Cloud Connector Edition,” Konrad said. “Sonus Cloud Link provides customers with an all-in-one solution that significantly reduces CCE provisioning times, provides unmatched scalability and delivers proven security.”
The graphical interface for Cloud Link expects to make it clear that customers can find assistance with configuration of Sonus appliances and Skype CCE within its included help documentation. It links directly to online documents that outline the installation process and configuration settings for various situations. It also imports and exports security certificates and provides an outline of common configuration settings within its setup wizard.
For most organizations, its ability to handle 500 concurrent calls should be satisfactory. It works during common operation to prevent denial of service attacks and allows for business calling to continue in the face of an attack, reporting all usage and malicious actions throughout.
Edited by Alicia Young