- 12 February 2020 15:59
Macquarie Telecom reinvents the humble desk phone with Hello
Macquarie Telecom, part of Macquarie Telecom Group (ASX: MAQ), today launched a cloud-based desk hosted voice system. Hello aims to help businesses adjust to the nbn while reducing the complexity and mitigating the security issues weaved into modern phone systems.
Most handsets pre-date the nbn, and as the rollout continues many businesses are stuck with incompatible devices and technology. Macquarie can replace them with Hello to remove legacy technology in tandem with the network upgrade.
“The last box in the IT room, the PBX, is finally moving to the cloud,” said Luke Clifton, Group Executive, Macquarie Telecom. “While cloud-based telephony is nothing new, tactically it’s been the last item to make the switch. But as the nbn rollout continues, businesses need to ensure continuity of communications and now is the time to make the transition.”
Hello comes with high-quality, secure Cisco handsets. Customers will pay a fixed fee per user per month that includes local and international calls and Macquarie will host all the necessary VoIP equipment and servers in its data centres. All services include local and international calls, an online reporting tool to monitor the network status, and all-local support through Macquarie’s HUB support centre.
“Businesses increasingly want simple cost management and ‘it just works’ functionality without hidden surprises,” said Michael Davies, Head of Revenue, Macquarie Telecom Group. “The devices themselves are ‘dumb’ – the software-defined nature of the system means the brains live in the network and organisations won’t have to regularly replace handsets.”
Macquarie believes the system’s in-built security – leveraging the company’s Australian Signals Directorate (ASD) and other cybersecurity credentials – will be a compelling offer for companies worried about vulnerabilities via their desk phones.
“The humble desk phone is no longer that – it is a fully operational computer and is subject to the same cybersecurity and data sovereignty requirements as any connected device,” said Clifton.
“The proliferation of cheap, poorly made devices and cutting corners by many providers have created fertile ground for cybercriminals to attack businesses through the office phone. We’ve mitigated that with business-grade performance, quality hardware, software and inherent security.”