Wednesday, December 13, 2017

The Benefits Of SDWAN With Case Studies

Software-Defined Wide Area Network (SDWAN) solutions are highly appealing for their efficiency, flexibility, and security benefits. Although still emerging, SDWAN solutions are integral in shaping the future of WAN management. Below are 3 case studies which help illustrate the current and future benefits of SDWAN for enterprise network management.


Bigleaf Cloud-first SD-WAN is the next generation of internet optimization – based on the natural redundancy found in leaf veins. They connect you through our plug-and-play router in your office, to their gateway clusters in the Cloud, providing end-to-end visibility and control. Their Software Defined Wide Area Network (SD-WAN) technology ensures that your business-critical applications are prioritized across your internet connections and that all traffic flows are routed over the best connection in real-time
New Seasons Market is a high-end grocer similar to Whole Foods, with locations up and down the west coast. The reason BigLeaf likes to talk about New Seasons Market is they are not unique relative to a lot of potential SDWAN users. They are a mid-market business who is going through rapid growth; they have a lean and somewhat overworked IT organization. What they are looking to do is leverage the cloud to continue to scale and gain a competitive advantage in their given market.
Each store got its internet from a local ISP and had a dial up connection designated as the backup system. Sean Teisher, VP of IT for New Seasons Market, explains that as the company began to scale the number of stores, they started to notice slower internet speeds and overall network congestion. The IT team was also looking to move critical applications to the cloud. Looking for a better alternative, New Seasons Market reached out to Bigleaf for help. For the initial deployment, New Seasons Market installed Bigleaf Networks’ plug-and-play SD-WAN routers at 10 of the company’s grocery store outlets with the plan to roll out additional routers over several months. The routers came pre-configured and sat outside the firewall, so installation was extremely simple and fast. The New Seasons Market IT team was also pleased that they got to keep their preferred firewall solution which includes, anti-virus, content filtering, intrusion detection, and VPNs for private networking, while Bigleaf was able to provide support and traffic shaping capabilities all in complete solution. Unlike other multi-WAN solutions that monitor only a tiny subset of internet paths, Bigleaf measures each internet connection from the store’s location, all the way across the internet path, to Bigleaf’s network. This provides a complete picture of the performance of each circuit and helps insulate internet experience from common ISP issues such as peering disputes, unplanned maintenance, traffic congestion, and more.
Bigleaf provides 100% uptime and reliability from their internet connections. This is the cloud migration story that a lot of mid-market users are facing today, and where Bigleaf excels. As the SD-WAN market continues to evolve, you will continue to see more and more differentiation in the market. 


SimpleWAN is a provider of cloud-based networking solutions for branch offices, service centers, stores, and franchises. They believe networking should be simple, efficient, and innovative, and they created an all-in-one solution to make IT secure, smart, and smooth.
 One of the case studies SimpleWan likes to highlight is a nationwide deployment which they started about a year and a half ago for a nationwide pizza chain. This pizza chain was relying on a slow network of MPLS and VPN; they were utilizing commodity broadband for those VPN deployments and T1s on all their sites. They had absolutely no visibility into the network for each location and very little to no IT support at each of the sites. Bringing new locations required either one lengthy MPLS install or expensive equipment because of this it took them way longer to open a new restaurant than corporate would have preferred. They also wanted to standardize the technology for all of the franchisees and make sure their security vulnerabilities were locked down. Also, their disaster recovery solution was extremely expensive and lacked flexibility. This pizza chain was trying to tie multiple providers together while having a secure WAN and ensuring that all locations had access to inventory management, online ordering applications, and point of sale. This company has made a huge transition to online ordering so much that they incentivize customers with free pizzas after so many online orders. They found running those applications over their tired MPLS network was problematic.
Being able to optimize certain applications is the highlight of going with an SD-WAN deployment. This company wanted something more holistic where they could look at the entire view of every single location, see what sites were online, and be able to communicate with unified communications between all the locations. If the calls are not able to come into the locations they will not be able to receive the order. This customer wanted one provider who could meet all of their demands, and the solutions had to be simple. When SimpleWan rolls out customers, they make sure that the store manager or somebody who has very little to no IT experience can understand the environment. In this case, the customer was able to displace not only their sole MPLS network and aging firewalls but also multiple boxes that were stacking up at every single location like caller ID boxes and Wi-Fi controllers. The customer had roughly a 37 percent reduction in MRC, and they now have the ability to manage all of their sites with a single pane of glass.
Why SimpleWAN? 
  • One way to manage all their locations
  • One magic box that takes care of all their networking
  • Flexibility to change and add to their networks
  • A trusted partner that keeps their networks running and secure


SD-WAN is broad regarding terminology, and it applies to a lot of different business in very different ways. Ecessa takes a little bit of a different approach, if Bigleaf is cloud-first, then Ecessa is premise first. What this means is that a lof of the customers they work with have been on a path to cloud leveraging; they’re starting to migrate a few critical applications to the cloud, but they still have legacy applications and components that they have to host locally. Due to this, they still need some connectivity and some resiliency to their internal networks as well. Ecessa is premise-first for companies who are migrating to the cloud but are not there yet or are never going to be completely there regarding 100 percent applications to the cloud.   
Ecessa has been working with Trans States Airline for several years now, Trans States is based out of St. Louis, and they do carrier support for United and American. As you know, the airline industry has been rife with failures from an IT perspective and outages. Ecessa has been able to help them build backups and resiliency to their infrastructure across multiple locations around the world including data center and remote locations. The most important piece for them was for Ecessa to be able to integrate into their network, which is one of the benefits of an Ecessa approach. A few of the questions Ecessa likes to ask are:
  • Does the customer have multiple sites that need that never down connectivity between locations?
  • Do they need to support a mesh network?
  • Is real-time traffic important to them?
  • Do they want to leverage their existing connectivity including their IP addresses that are coming from their ISPs?
Ecessa prides itself in being agnostic to carrier and technology; they will integrate any connectivity that people need to bring along. These are some of the really important pieces when it comes to identifying a good Ecessa opportunity. Trans States Airline had multiple MPLS they purchased that they weren’t able to use actively; they had them as emergency failover only. By integrating an Ecessa product into their different locations, they were able to help them create and active network, also helping them never lose a ping or access to their applications. They also helped them achieve a 100% uptime for the last several months.
So where does SD-WAN fit in general? Start with the concept of resiliency, be it to the cloud or be it within an organization on-premise like the type of applications Ecessa prides themselves on. This technology gives you back control, for organizations that are stuck in contracts with existing connections and you want to replace have that capability. Today you can insert an Ecessa, a Bigleaf, or a SimpleWan device and integrate additional bandwidth. There’s a lot of freedom that comes with leveraging the technology as well as building out that resiliency. For example when you think Ecessa, think flexibility. They can integrate into those existing customers, they don’t require large architectural changes, and they can fit into any network.
Free SDWAN Design Help.......
To take advantage of free assistance to engineer and design a SDWAN solution for your enterprise network...including a comparison of available providers with rate quotes...simply ask us at the following link:
It's as easy as 1, 2, 3.

Labels: , , , , ,

Saturday, December 09, 2017

Cybersecurity....Get It Wrong And You're Doomed

If your organization doesn't take Cybersecurity seriously for your network you'll end up as the next embarrassing news headline.  Here's how to get it right.

Why is cybersecurity such a big deal? That is a question that gets asked a lot, and sometimes it might be hard for people to formulate an answer around that. There’s a general lack of knowledge and awareness about the importance of cybersecurity. Think about all of the connected devices that we have today, all of these devices have potential vulnerabilities. It’s not if, but when you will be breached. It’s a misconception that people think that they are safe. A lot of this stems from companies that are in transition. We have a lot of old technology that customers are having a hard time getting rid of, while at the same time introducing new technology. It is always the weakest link that breaks the chain, so if you have one old technology sitting in your environment that is not secure, it doesn’t matter how good the rest of your secure technology is. So who’s really out there taking advantage of these cybersecurity problems?
  • Cyber criminals - Attack and steal information for profit (example: Equifax breach)
  • Hackers - Some are pros that do it for research, others are malicious
  • Hacktivists - Politically or socially motivated
  • Cyber terrorists - Not common today but could become soon
  • Nation States - Launching cyberattacks against other countries
A lot of the things we see today in the current environment can be boiled down into a few major problems. Distributed denial of service attacks is one of the major issues. They are continuing to grow in sophistication and the solution to this is a managed DDoS platform. We’ve all heard about Ransomware as well. It is now becoming harder to catch and more prevalent and causing more financial harm. There are actually several solutions to this:
  • Endpoint protection
  • Email security
  • Patch management.
Another problem is traditional malware which is the same stuff we’ve been hearing about for decades now. Endpoint security solutions are what’s responding quickly to that. Lastly, there are routes to malware sites from redirects in ads, the fix for this is a managed secure DNS solution. Below you can view TPx’s security roadmap, which addresses these problems and solutions.


There are some questions you should be asking when you’re assessing your network ecosystem security. Security audits help identify vulnerabilities in the system, so asking when the last security security audit or assessment was done is pertinent. If your organization has gone through an audit you will want to find out if they’ve developed a plan to treat the security risks. A cybersecurity report needs to be understood by the organization in order for them to begin mitigating the risks. Knowing the difference between a threat, vulnerability and a risk is very important. A threat is from an attacker that will use a vulnerability that’s not mitigated because someone forgot to identify it as a risk. As you look at limits of perimeter oriented security posture, you need to tell your organization leadership that you must have a multi-layered security approach. We don’t live in a world where perimeter-based security is effective anymore, although it is one part of an effective security strategy. Firewalls are definitely important, but today you have to have a multi-layered approach. Let's discuss some common misconceptions:
  • Compliance equals security - Many executives believe that a compliant organization equals a secure organization. They may think, “If I’m aligned with the ISO framework and compliant with regulations like PCI, SOX and GLBA, I must be secure, right?” Unfortunately, it’s not that easy. Companies that have been breached are often seen as negligent, and the government steps in with more calls to regulate. The pressure to comply with policy-based frameworks increases, and companies use those frameworks to help fund and drive improvements in security. While this is good, it teaches executives to aspire to a low bar. Just as passing a health inspection doesn’t guarantee that a restaurant will serve good food, compliance doesn’t guarantee security. It is a minimum requirement, and is not enough to protect an organization from the strategies and tactics being used by hackers today. 
  • Only a sophisticated hacker can breach your IT - High-profile cyber attacks are often thought to be sophisticated, but many are caused by attackers taking advantage of basic, often unnoticed security vulnerabilities or failures in IT operations. Additionally, the “bad guys,” whether they are nation states, cybercrime rings, or malicious insiders, are professionalizing and building success in attacking companies. They have developed an entire ecosystem, organizing around the steps they go through to break in and steal data, and buying and selling services to one another. If the malicious actor that has targeted your organization doesn’t have the skills they need to breach your network, they can easily go out and buy them.


TPx launched their Cybersecurity Operation Center (SOC) earlier this year in St. Louis, Missouri. They will also be launching a secondary site in Portland in early 2018. TPx made a heavy investment and spent many hours researching and discussing the state of the art technologies they wanted to implement, their highly trained and experienced staff is involved with their heavy investment. With over forty years of combined cybersecurity experience, TPx is concentrating in using the most modern detection techniques and threat intelligence. TPx is the nation’s premier Managed Services Carrier, delivering unified communications, managed IT, and network connectivity to 80,000 customer locations across the country. Nearly two decades of proven, industry-leading customer service focus embedded deep in their corporate DNA has powered more than 15 years of uninterrupted growth for TPx – all driven by earned referral, not advertising.

To learn more about what TPx specifically can do for your enterprise security efforts...and to learn what other options may be a good fit for your needs...simply ask us at the link below. Our assistance is free...and as easy as 1, 2, 3.

Labels: , , , , ,

Wednesday, December 06, 2017

How To Optimize Your Entire Wireless Telecommunications Infrastructure

Advantix offers premium mobile and fixed telecommunications lifecycle management solutions to a wide range of enterprises, from start-ups to publicly traded companies across multiple industries. Advantix Service offerings encompass the entire lifecycle of an enterprise's telecom assets and services.
Advantix Solutions Group is a global leader in Mobility Telecom Optimization and Management Services. Advantix delivers unparalleled solutions that empower customers to take control of their entire mobile telecommunications infrastructure. 
Advantix Solutions
Advantix Solutions' dedication to offering comprehensive, managed solutions is unique in our industry. As you will discover, they provide solutions, not software; solutions that are designed to eliminate the time you spend on wireless telecommunications management. Experience has shown that success in telecommunications management is determined as much by resources and expertise as tools. If you are evaluating a solution that emphasizes tools over resources, consider Advantix and see what sets them apart. 
** Mobile Optimization
With Proactive mobile optimization, we can identify areas of excess spending and guarantee savings
** Mobility Management / MMS 
We integrate control and simplify day-to-day administration for mobility
** Mobile Device Management
Secure and enable mobile devices, applications, content, and users
** Telecom Audit & Recovery
Identify and recover billing errors and overpayments for your communication services portfolio
** Telecom Expense Management / TEM
Enhanced control and improve efficiency of fixed voice and data services. 
** Strategic Consulting
Provide on-demand consulting solutions for the challenges of evaluating and managing your mobile and telecom infrastructure
** Corporate Performance Management / CPM
Making key business decisions and identifying growth opportunities begin with data
** Application Development
Expert developers of leading enterprise apps bring you the Advantix App development center
Advantix Takes Care Of Your Wireless Telecommunications Headache
Advantix Delivers 
Advantix offers services to fully manage the entire mobility telecommunications lifecycle. They focus on reducing the time and expenses associated with these programs so you can apply critical resources towards other key business objectives. 
By allowing Advantix to manage your telecommunications, you'll realize lower internal administrative costs, expedited support and trouble ticket resolution for users, decreased spend, and greater accountability and visibility across your organizations 
Advantages of Advantix’ Wireless Optimization and Mobility Management services: 
* Projected customer savings 25-40% with a risk-free, no-obligation wireless analysis 
* Reinvestment of customer savings into emerging telecom services 
* Reduced or eliminated time spent in administration of wireless accounts 
* Increase in mobility device counts 
* Customized reporting and consulting, configurable to meet your specific requirements 
* Ongoing management to maintain optimal service, support and savings 
* Identification and elimination of billing errors and wasteful spending 
* Contractually Guaranteed Savings
Advantix Products: 
* Wireless Optimization
* Enterprise Mobility Management
* Consolidated Billing
* Customized Reporting
* Help Desk
* RFP Management
* Data Strategy
* Carrier Contract Negotiation
* Assets & Inventory Management

To take advantage of any of the services offered by Advantix Solutions Group simply request a free rate quote here ....
Advantix Telecom Lifecycle Management
Understanding the majority of today's enterprise mobility challenges requires a firm grasp on the implications of "the consumerization of IT". There are 2 tempting but ultimately incomplete solutions for this phenomenon ... BYOD and MDM/MAM. However, there is also a legitimate Telecom Lifecycle Management solution that works.

To take advantage of Telecom Lifecycle Management services from Advantix simply request a free quote here ....

Labels: , , , , , ,

Saturday, December 02, 2017

How Strong Is YOUR Data Security?

In 2012, the U.S. stationed several new AH-64 Apache choppers in Iraq. When the Apaches arrived, some of the soldiers posed for pictures and posted them to the internet.
Unbeknownst to them, the enemy got ahold of the pictures and examined the geotags — the embedded data that showed when and where the picture was taken.
“When a new fleet of helicopters arrived with an aviation unit at a base in Iraq, some soldiers took pictures on the flight line,” he said. “From the photos that were uploaded to the Internet, the enemy was able to determine the exact location of the helicopters inside the compound and conduct a mortar attack, destroying four of the AH-64 Apaches.”
Data is being collected, analyzed, and weaponized. Business, now contingent on safe and stable networks, is at more risk than ever before. With so much information out there, it has become increasing easy for a bad actor to cause immense damage.
Gary Miller of the Denver Post wrote this:
“The U.S.’ National Cyber Security Alliance found that 60 percent of small companies are unable to sustain their businesses over six months after a cyber-attack. According to the Ponemon Institute, the average price for small businesses to clean up after their businesses have been hacked stands at $690,000; and, for middle market companies, it’s over $1 million.
Recent events have proven that nobody is safe from the threat of cybercrime – not large corporations, small businesses, startups, government agencies or even presidential candidates.
Small and mid-sized businesses are hit by 62 percent of all cyber-attacks, about 4,000 per day, according to IBM. Cybercriminals target small businesses because they are an easy, soft target to penetrate. They steal information to rob bank accounts via wire transfers; steal customers’ personal identity information; file for fraudulent tax refunds; and, commit health insurance or Medicare fraud.
Clearly, we need to better protect ourselves. How can we do that?
Personally, I have been curious. Recently, my colleague Bryce Hayes of Telarus took the opportunity to tour the TPx Security Operations Center (SOC) in St. Louis, MO to see what they do.
TPx has put together an amazing team to proactively identify, isolate risks, and respond to threats. The SOC is supported by security analysts, all hand-picked because of their military background and intelligence. Many of these staff members have top secret clearances. More importantly, these folks have been on the front lines and have seen the worst of the worst.
The TPx SOC provides 24/7/365 protection. As Bryce toured the facility, he learned the site was built, from the ground up, to become the first line of defense against the exponentially growing threats to business networks. 
Jared Martin, VP of ITx managed services for TPx, was his host. He started out with this statement: “Everyone is going to be breached. It is not if, but when. Every business needs to ask themselves two questions – First, are you minimizing your exposure? Second, are you prepared to react? Our SOC is built to help any customer do both.”
The SOC Command Center is seriously impressive. It looks like something out of a movie. The room is back-lit in blue. There are a dozen large screen TVs placed around the room. Some are tuned to CNN, the Weather Channel, and other news sources. Others show network traffic and threats currently being monitored. Due to security, all customer data was removed from the screens before Bryce could enter the room.
As expected, it’s a challenge to even get into the center. There are several physical protections – fingerprint and facial recognition, switchable glass (which clouds when current is run through it), and shielded cabling throughout. The entire center meets HIPAA, PCI and CPNI standards.
Bryce spent a few hours discussing security. A few takeaways from the meeting:
  1. Most customers don’t understand cyber security. Data shows most customers believe it is the carriers who will be attacked. As such, when a business is targeted, their first response is usually to blame the carrier. At that point, it may already be too late.
  2. Carriers will protect themselves. Often, during a DoS attack, a carrier will redirect that traffic to a specifically designated path. This is so other customers do not see a slowdown. What does this mean? Your business is purposefully quarantined. Yes, the carrier will take over and choose how to respond. What is easier to deal with? 1 angry client or 100?
  3. School districts are the #1 targets for attack. Most of these attacks are DoS by students. For whatever reason, students in Texas seem to have it out for district administrators.
  4. Most breaches are caused by employee negligence. These tend to be the most dangerous and the hardest to prevent. When you align with a security company, they can close many loops related to patching and updating. This stops attacks like Wannacry and other attacks that target specific weaknesses.
  5. Cyber insurance is a booming industry, but it is still young. What is the value of data, and, more importantly, can you afford to find out?
The business world needs to start paying serious attention to security. How can you approach your leadership about security?
One thing we know for certain, selling fear is a mistake. It’s unquantifiable. Joshua Dinneen, president and CEO of Norwell Technology Group (and a security expert himself) said it best - "The customer’s security needs can be found at the intersection of risk and budget."
A simple conversation can help you find that intersection:
  1. Who has access to your data?
  2. How is the data protected?
  3. Where is the data located?
  4. What would it cost you if your data was leaked?
Security is under appreciated, underutilized, and often ignored. It should not be. While security is a great catch phrase when discussing business continuity or disaster recovery, it is much deeper than that. It is a need that most people don’t know about until they stop to consider the alternative to security – exposure.
The good folks at TPx have built a phenomenal data center to help mitigate security risks. They offer a variety of packages ranging from basic to full-service. Their business continuity, managed security and range of other on-premise and cloud-based services are designed to protect and ensure ongoing operations from human error, inclement weather and natural disasters (and ensure the survival of your business).
If you haven’t looked at what TPx is doing, it’s a great time to reach out to your organization's leadership and encourage them to do so (or do it yourself)...unless of course you think your network security efforts are already perfect.
To learn more about what TPx specifically can do for your enterprise security efforts...and to learn what other options may be a good fit for your needs...simply ask us at the link below. Our assistance is free...and as easy as 1, 2, 3.

Labels: , , , , ,

Wednesday, November 29, 2017

The Smart Solution To Managing Your International IT Network

Whatever your IT network application and need, anywhere in the world, we have you covered.  The article below takes a deep dive into just how we can support the IT requirements of international organizations and global business matter what or where.

To take advantage of the possibilities discussed below all you have to do is ask at the following link.  It's as easy as 1, 2, 3.

International Network Solutions


International Carriers are something that we don’t talk about every day in this business, but they are becoming more important to our business and to your customer’s businesses. Today we'll go over our international portfolio and talk about some key differentiator and questions you need to thinking about when you’re talking to international clients.
The Telarus international portfolio is currently made up of around a dozen providers. All of these carriers have been split up into two different groups for today’s discussion, United States based carriers and international carriers.


When we say “United States based”,we are referring to companies with the  nexus of the ownership structure in the United States. These carriers are important because these companies will usually bill your customers, so if your customer wants their bill in the United States and in US dollars, these will be your best option. Typically one portion of the solution you’re going to sell through them is going to be tied to the United States so whether it’s a network, or a few locations for broadband access, you are going to have some type of nexus in the US when dealing with our US carriers.
  • AT&T - Serves thousands of customers on six continents, including all of the Fortune 1000.
  • Verizon - Provides businesses and governments around the world with leading IT, security, communications, network, and mobility services.
  • CenturyLink - Provides data, voice and managed services to business, government and wholesale customers in local, national and select international markets through its high-quality advanced fiber optic network and multiple data centers.
  • Level 3 -  Strong international player especially in Canada, Europe, and Asia as a result of their acquisition of Global Crossing a few years back. Global Crossing was almost entirely focused on the international market space.
  • Masergy -  Owns and operates the largest independent Software Defined Platform in the world, delivering hybrid networking, managed security and cloud communication solutions to global enterprises.
  • Cogent - A multinational, Tier 1 facilities-based ISP, consistently ranked as one of the top five Internet backbone networks in the world.
  • Zayo -   Provides lit and dark fiber bandwidth infrastructure solutions and carrier-neutral colocation. Currently providing their services in seven countries.
  • Global Capacity - Multi-site, multi-state, multi-country network solutions – Global Capacity’s One Marketplace network takes the headache out of sourcing and managing multiple suppliers across divergent geographies - delivering services with one MSA, SLA, and invoice no matter the location or access solution.


The second group is made up of carriers who are truly international, meaning they are not US based. These companies have headquarters in foreign countries with maybe a field office in the United states. They can bill in foreign currency and directly,  they can also set up a network in those countries. These carriers usually don’t buy wholesale from other places. They operate around the world and also have domestic presence in their respected countries.
  • China Telecom - If you didn’t know that Telarus had signed China Telecom it is because they haven’t been launched yet, and are currently not on your iPhone app but they will be by the end of this month. They have a huge presence in South America, and China along with the best rates.  
  • NTT Communications -  Known as the “gateway to Asia” with total ownership of submarine cable infrastructures and the lowest latency from APAC to the US. 80% of the Global Fortune 100 use NTT for their mission critical global infrastructure and IT needs.
  • TATA - If you have Data Centers or Contact Centers in India Tata is the one you’ll want to talk to. They also have a huge presence in the philippines.
  • Telia -   Also called Telia Company, Telia Carrier is a company that  provides network infrastructure and services to more than 1,200 customers in 80 different countries worldwide. Their IP network, AS1299, has grown from being the largest IP network in Europe to being the second largest IP network in North America and the second largest in the world.
  • GTT -  A global network integrator providing a broad portfolio of Wide-Area Network (WAN), Dedicated internet access and mobility services. GTT combines multiple networks and technologies such as traditional OC-x, MPLS and ethernet, to deliver cost-effective solutions. Their focus is  on voice and cloud-based services
  • Expereo - Expereo manages over 2500+ providers across 200+ countries to provide fully managed internet services with standard Ethernet handoff, static IPs, feet on the street, SD-WAN, in a single partner to help support your customers in the US or globally. They are headquartered in the netherlands.
  • Telstra -  A leading telecommunications and technology company offering a wide range of services globally, with a focus on the Asia-Pacific region. They have around 3,000 employees based in 22 countries outside of Australia providing services to hundreds of business and government customers. Telstra provides technology solutions for business and government customers, including data and IP networks, network application services such as managed networks, unified communications, cloud, industry solutions and integrated services.
These are the companies that can get you access, which means internet access, MPLS, SD-WAN, and field techs. The second group of carriers we discussed the ones who will have the most field techs, while the first group of carriers are going to be the ones that rely on their foreign partnerships to get some of this work done. It’s important for you to know that because a lot of the times when work orders are handed off from one provider to another provider it creates some issues, but when you go right to the provider who is providing the service, everything happens a lot faster. 


Below we have listed some of things you should take into consideration when you’re talking with an international client.
  • Point to Point - Is one of those locations in the United States or not? For example if you’re going from Dubai to Japan then you have to look at the second group of carriers who are the true international carriers. If at least one of those points is inside the United States then the first group of carriers who are United States based will be your best bet.
  • MPLS- If most of the locations are in the United States and just a few outside you will want to go with one of the United States based carriers. If majority of the locations are foreign and you only have one or two connections in the United States, the second group made up of truly international carriers will be your best choice. Of course that after the choice is made you will have to look into which carriers are available in the specific area your client is in. The best way to start it out is just to narrow it down by country.
  • Stand-alone Internet Access - If you’re looking for stand-alone internet access anywhere outside the United States you almost always have to go directly to the second group of international carriers. It is very rare to get stand-alone DIA because that's regulated under the local government regulations according to the particular country. Stand-alone internet access has to be done by a carrier who is native to that country or a carrier that has Nexus in that country.
  • Last Mile - There are two different ways that carries can get last mile overseas
  • A type two connection, which means they have network to network interface agreements with that company. This is very expensive and technical. Companies like Level3 and Global Capacity have a lot of NNI’s.
  • If you want to go from dozens to hundreds of options you actually have to just buy the last mile, in some cases retail which means the customer will have to go out and buy the last mile and route that back to their network. This opens them up to a lot more options.
  • In-Country DID Numbers - There are many countries that will allow DID Numbers so your client can have an in-country number, but there are also many counties that do not. There are carriers in our portfolio that don’t offer voice at all or local DID number. A good way to figure out which carriers offer DID numbers and which don’t you can look at the Hosted UC Matrixthat we talked about last week. You have to remember  even if the carrier has a green check box it doesn’t mean they offer DID Numbers to all the countries.
  • Billing - When you’re dealing with a company that does not want to pay their bill in dollars you will have to find a carrier that has a nexus in that country. Nexus meaning an operating unit that has been registered with the local government that can actually bill in native currency.
  • SD-WAN - Some of the carriers we work with don’t have their own native SD-WAN or even resell it yet. It’s important for you to understand what companies can do it and which can’t, specifically which carriers have equipment on standby so if something breaks you don’t have to FedEx a new unit out to the country.
  • Cloud and Colo Access - We talk a lot about Comcast, Level 3, CenturyLink and their ability to provide cloud connectivity directly into Azure or directly into AWS. What that is code for, is the ability to deliver connectivity directly into the data center in the United States where Amazon and Microsoft are co-locating their equipment. This applies overseas.


All previous cloud connectivity discussions have been focused just on the North America, but as you can see from the image below Amazon has cloud zones in Brazil, Europe, and now they’ve also brought in Indonesia, Australia, China, and Japan. It’s important to know what your client is doing in the public cloud, be we can also build private clouds. 
In the image below you can see the zoning for the public clouds in the Microsoft environment. You’ll see that they’ve got a pretty comparable footprint with Amazon and. Microsoft has locations in Silicon Valley, Central US, North Central US, South Central US, and East US. They also have Brazil, Ireland, Amsterdam, and a good footprint across Asia, China, Japan, Australia, Singapore.
It is very important for you to be aware that today there is more need for connectivity internationally than there ever was before because internet and cloud access is worldwide technology upon which everyone is standardizing. Knowing the different types of international carriers, and what they can and can’t offer, is a great way to differentiate yourself and help your business grow.

By Estefania Lopez, Telarus

Labels: , ,