top of page

UC Features Available to all Users

The diagram below illustrates the incredible
UC features available on every extension,
with no additional licences required.

And more...

  • Peer to Peer Audio Visual
  • Presence Adapters
  • Email and SMS Notifications
  • Click to Call
  • Chat Groups
  • Instant Messaging
  • Everything Included Per Extension
  • Optional Features

IP Fusion cloud-security features-vulnerability management

vulnerability
  management

powers risk reduction capabilities

don't let the
shared security
responsibility 
delay
your customers'
journey to Cloud

Essential Cloud Security
must not be overlooked - 
prevent, detect and respond
to threats wherever they occur
with our proactive approach

IP Fusion’s hosted telephony system uses Amazon Web Services [AWS] Sydney platform facility. AWS is well known for its formidable security features and as such host many Federal and State Government computer facilities. It is the largest and most widely used platform giving hosts peace of mind.

Unfortunately, AWS security is not enough on its own. Any computer system that is exposed
to the internet risks being maliciously attacked through repeated attempts to login to the system, often referred to as brute force attacks. Brute force attackers will repeatedly guess new username / password combinations, in an attempt to gain unauthorised access to the system.

The IP Block List feature has been added
to the E-MetroTel software to reduce the potential impact of these brute force attacks and help network operators detect and remediate security threats by temporarily blocking the connection requests originating from those IP addresses associated with repeated incorrect login attempts. This feature looks at different levels of attempted hacking such as Telephony, Secure Shell SSHD and Web Services. Suspicious IP Addresses are stored and classified by IP Addresses, Location [Country, City etc.] and what service they tried to hack. The stored information can be downloaded at any time for passive DNS analysis.

check out the ways

E-MetroTel's Premium Security
     stands out from the crowd

Choose security that evolves as rapidly as the cloud itself

Cloud security that addresses and mitigates cyber threats

A single source not a bundle to protect users and data

Comprehensive cloud application protection

Passive DNS capability for ongoing vulnerability evaluation

Rapidly detects and blocks malicious IP addresses

Encrypted messaging and file transfer stored in the cloud

Deploy with confidence and collaborate more effectively

DNS analysis can be a valuable tool in detecting, preventing, and analysing cyber-attacks. The E-MetroTel software has a firewall and analysis of passive DNS results in permanently blocking suspicious and malicious IP addresses.

E-MetroTel's supplementary
audit trail analysis tool -
an easy solution to gain
complete control in line
with business needs

The E-MetroTel software applications keep an audit trail of all attempted logins and can be viewed on the management console. A complete log of successful and unsuccessful logins along with any work completed by a successful login is stored. Unsuccessful login attempts are automatically blocked by the software for a predetermined time to allow for further analysis.

Optional Applications

The diagram right illustrates
the
enormous range of additional applications available. Each have licence fees associated with each application.

E-MetroTel UCx UC product suite
bottom of page