Webex announces comprehensive Device Management Capabilities with Phonism integration

Webex is excited to announce a comprehensive solution for 3rd party Device Management referred to as 'Partner Managed Devices.
' Partner Managed Devices allows Webex Cloud Calling offers to support a flexible Device Management strategy.
With this development, Webex enables its customers and partners to deliver a fully-managed Cisco-on-Cisco experience with deep Webex integration, as well as a self-managed DM option for non-Cisco devices via , enabling them to cater to.
For Cisco devices, Webex Control Hub includes a complete set of DM tools that allow customized device configurations, bulk provisioning, self-activation, and automatic onboarding.
For non-Cisco devices, the Partner Managed Devices DM option provides a architecture that allows customers to provision and integrating their own or a Partner's DM tool with Webex.
Phonism is a cloud-based SaaS platform that specializes in deploying, managing, securing, and migrating compliant devices at scale.
Phonism's integration to Webex allows new and existing Webex customers to support onboarding any Cisco security compliant and certified device to the Webex platform at scale and with significant customizations via the Partner Managed Devices DM option.
This opens new possibilities for Webex customers, specifically Service Providers to support multiple new devices on the Webex platform that were previously not supported, also making it easier to migrate customers from legacy on-prem UCaaS platforms onto.
The integration with Phonism empowers Webex partners and customers to streamline and centralize their VoIP phone provisioning, management, compliance, and customer experience.
Connecting these platforms provides an automatic hierarchy sync and imports devices into a feature-rich admin and user experience.
Phonism offers a compliance lock for supported devices on Webex, preventing the tampering or misconfiguration of settings and firmware.
Finally, with Phonism Technician onsite visits are greatly reduced as the self-service model eliminates most device-related support tickets.
Key benefits of using Partner Managed Devices Solution with Phonism: Enables support for security compliant and cloud certified non-Cisco Devices on Webex.
Syncs and maps Webex users and devices into Phonism.
Phonism platform supports 280+ Devices from 10+ Device Manufacturers and counting, making it easier to support a non-Cisco device on Webex.
We are excited to share the Partner Managed Devices solution with the world.
It enables partners and customers alike to support virtually 3rd party SIP Device for the Webex Calling and Wholesale offers.
About Phonism:Phonism is the market leading intelligent Device Lifecycle Management productivity platform enabling service providers, manufacturers, distributors and app developers eliminate complexities of provisioning, deploying, migrating and managing VoIP devices throughout their entire lifecycles.
We make it easy for anyone in the VoIP ecosystem to support 270+ devices from 10+ manufacturers.
Their vendor agnostic approach allows customers to expand TAM by taking advantage of Bring Your Own Device opportunities, enabling a host of previously unsupported devices the ability to now be powered by Cisco.


This Cyber News was published on feedpress.me. Publication date: Tue, 05 Dec 2023 22:13:04 +0000


Cyber News related to Webex announces comprehensive Device Management Capabilities with Phonism integration

Webex announces comprehensive Device Management Capabilities with Phonism integration - Webex is excited to announce a comprehensive solution for 3rd party Device Management referred to as 'Partner Managed Devices. ' Partner Managed Devices allows Webex Cloud Calling offers to support a flexible Device Management strategy. With this ...
1 year ago Feedpress.me
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 months ago Cybersecuritynews.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
6 months ago Cybersecuritynews.com
20 Best Inventory Management Tools in 2025 - inFlow Inventory is a comprehensive inventory management tool designed for small to medium-sized businesses, offering features like real-time stock tracking, order management, and barcode scanning to streamline operations. The tool provides advanced ...
2 months ago Cybersecuritynews.com
Webex Connect and a New Digital Experience - While creating such engaging experiences is necessary for businesses of all sizes, smaller teams in particular need to find a way to get their customers' questions answered without relying on as much manpower. The Cisco Store is one such program, and ...
1 year ago Feedpress.me
What we learned over coffee at the year's biggest healthcare event - Healthcare organizations are dedicated to providing exceptional care, prioritizing the patient's satisfaction and experience through a patient-centered approach. This approach ensures patients are firmly at the center of their care and engaged in ...
1 year ago Feedpress.me
Unified Endpoint Management: What is it and What's New? - What began as Mobile Device Management has now transitioned through Mobile Application Management and Enterprise Mobility Management to culminate in UEM. This progression underscores the industry's response to the ever-growing challenges of modern IT ...
1 year ago Securityboulevard.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
6 months ago Cybersecuritynews.com
CVE-2018-0112 - A vulnerability in Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server could allow an authenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to insufficient input ...
6 years ago
Something exciting is brewing for NRF24 - NRF'24 is also where we'll be demonstrating Webex Connect's mobile ordering coffee bar experience at Café Cisco, which showcases the richer customer communications delivered by the simplicity and intuitiveness of Webex Connect, part of Webex CPaaS ...
1 year ago Feedpress.me
CVE-2018-0264 - A vulnerability in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user. An attacker could exploit this ...
6 years ago
Top 10 NinjaOne Alternatives to Consider in 2024 - Atera: Best for IT teams needing a unified platform for network and device management, including patch management and automation. Kaseya VSA: Best for IT operations looking for comprehensive IT management including remote control, patch management, ...
1 year ago Heimdalsecurity.com
GPT in Slack With React Integration - Understanding GPT. Before delving into the intricacies of GPT Slack React integration, let's grasp the fundamentals of GPT. Developed by OpenAI, GPT is a state-of-the-art language model that utilizes deep learning to generate human-like text based on ...
1 year ago Feeds.dzone.com
Retail Tech Deep-Dive: Webex Connect - Jeremy leads sales in North and South America for the Webex cloud communications platform solution. With several leadership roles over the years, Jeremy has deep mobile industry expertise that's been leveraged across many vertical markets including ...
1 year ago Feedpress.me
15 Best Patch Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive patch management for various operating systems, applications, and third-party software.It is complex for new users and requires time and training to utilize its functionalities fully.Advanced analytics ...
7 months ago Cybersecuritynews.com
CVE-2018-0380 - Multiple vulnerabilities exist in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious .arf or .wrf ...
6 years ago
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
1 year ago Feeds.dzone.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
7 months ago Cybersecuritynews.com
15 PostgreSQL Monitoring Tools - 2025 - What is Good?What Could Be Better?Monitoring application performance, user experience, and errors.Some users find the pricing high, especially for larger environments.Continuous server, database, and infrastructure monitoring.The extensive feature ...
5 months ago Cybersecuritynews.com
10 Best Vulnerability Management Tools - 2025 - Its integration with other Tenable products and third-party tools enables a unified approach to vulnerability management, ensuring that security teams can quickly identify, prioritize, and remediate risks across their entire infrastructure. ...
3 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
20 Best Remote Monitoring Tools - 2025 - What is Good ?What Could Be Better ?Strong abilities to keep an eye on devices and systems.Some parts may take time to figure out.It gives you tools for remote control and troubleshooting.There could be more ways to change things.Lets you automate ...
6 months ago Cybersecuritynews.com
15 Best Bandwidth Monitoring Tools in 2025 - By providing real-time data on network usage, bandwidth monitoring tools enable proactive management and quick resolution of issues that could impact network performance. It provides real-time monitoring of network performance, traffic analysis, and ...
2 months ago Cybersecuritynews.com
10 Best IT Asset Management Tools - 2025 - What is Good?What Could Be Better?Atera can seamlessly service and monitor Linux, Mac, and Windows systems.Sometimes, when deploying an update, patch management will fail.Using an administrator terminal, keep an eye on IT asset activity remotely.The ...
6 months ago Cybersecuritynews.com
15 Best Docker Monitoring Tools in 2025 - What is Good ?What Could Be Better ?cAdvisor monitors containers without much overhead because to its minimal resource footprint.Real-time monitoring is its main focus, and historical data storage is limited.It simplifies troubleshooting using ...
2 months ago Cybersecuritynews.com

Cyber Trends (last 7 days)