Webex announces comprehensive Device Management Capabilities with Phonism integration

Webex is excited to announce a comprehensive solution for 3rd party Device Management referred to as 'Partner Managed Devices.
' Partner Managed Devices allows Webex Cloud Calling offers to support a flexible Device Management strategy.
With this development, Webex enables its customers and partners to deliver a fully-managed Cisco-on-Cisco experience with deep Webex integration, as well as a self-managed DM option for non-Cisco devices via , enabling them to cater to.
For Cisco devices, Webex Control Hub includes a complete set of DM tools that allow customized device configurations, bulk provisioning, self-activation, and automatic onboarding.
For non-Cisco devices, the Partner Managed Devices DM option provides a architecture that allows customers to provision and integrating their own or a Partner's DM tool with Webex.
Phonism is a cloud-based SaaS platform that specializes in deploying, managing, securing, and migrating compliant devices at scale.
Phonism's integration to Webex allows new and existing Webex customers to support onboarding any Cisco security compliant and certified device to the Webex platform at scale and with significant customizations via the Partner Managed Devices DM option.
This opens new possibilities for Webex customers, specifically Service Providers to support multiple new devices on the Webex platform that were previously not supported, also making it easier to migrate customers from legacy on-prem UCaaS platforms onto.
The integration with Phonism empowers Webex partners and customers to streamline and centralize their VoIP phone provisioning, management, compliance, and customer experience.
Connecting these platforms provides an automatic hierarchy sync and imports devices into a feature-rich admin and user experience.
Phonism offers a compliance lock for supported devices on Webex, preventing the tampering or misconfiguration of settings and firmware.
Finally, with Phonism Technician onsite visits are greatly reduced as the self-service model eliminates most device-related support tickets.
Key benefits of using Partner Managed Devices Solution with Phonism: Enables support for security compliant and cloud certified non-Cisco Devices on Webex.
Syncs and maps Webex users and devices into Phonism.
Phonism platform supports 280+ Devices from 10+ Device Manufacturers and counting, making it easier to support a non-Cisco device on Webex.
We are excited to share the Partner Managed Devices solution with the world.
It enables partners and customers alike to support virtually 3rd party SIP Device for the Webex Calling and Wholesale offers.
About Phonism:Phonism is the market leading intelligent Device Lifecycle Management productivity platform enabling service providers, manufacturers, distributors and app developers eliminate complexities of provisioning, deploying, migrating and managing VoIP devices throughout their entire lifecycles.
We make it easy for anyone in the VoIP ecosystem to support 270+ devices from 10+ manufacturers.
Their vendor agnostic approach allows customers to expand TAM by taking advantage of Bring Your Own Device opportunities, enabling a host of previously unsupported devices the ability to now be powered by Cisco.


This Cyber News was published on feedpress.me. Publication date: Tue, 05 Dec 2023 22:13:04 +0000


Cyber News related to Webex announces comprehensive Device Management Capabilities with Phonism integration

Webex announces comprehensive Device Management Capabilities with Phonism integration - Webex is excited to announce a comprehensive solution for 3rd party Device Management referred to as 'Partner Managed Devices. ' Partner Managed Devices allows Webex Cloud Calling offers to support a flexible Device Management strategy. With this ...
11 months ago Feedpress.me
Webex Connect and a New Digital Experience - While creating such engaging experiences is necessary for businesses of all sizes, smaller teams in particular need to find a way to get their customers' questions answered without relying on as much manpower. The Cisco Store is one such program, and ...
11 months ago Feedpress.me
Unified Endpoint Management: What is it and What's New? - What began as Mobile Device Management has now transitioned through Mobile Application Management and Enterprise Mobility Management to culminate in UEM. This progression underscores the industry's response to the ever-growing challenges of modern IT ...
10 months ago Securityboulevard.com
Top 10 NinjaOne Alternatives to Consider in 2024 - Atera: Best for IT teams needing a unified platform for network and device management, including patch management and automation. Kaseya VSA: Best for IT operations looking for comprehensive IT management including remote control, patch management, ...
4 months ago Heimdalsecurity.com
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
11 months ago Feeds.dzone.com
What we learned over coffee at the year's biggest healthcare event - Healthcare organizations are dedicated to providing exceptional care, prioritizing the patient's satisfaction and experience through a patient-centered approach. This approach ensures patients are firmly at the center of their care and engaged in ...
5 months ago Feedpress.me
GPT in Slack With React Integration - Understanding GPT. Before delving into the intricacies of GPT Slack React integration, let's grasp the fundamentals of GPT. Developed by OpenAI, GPT is a state-of-the-art language model that utilizes deep learning to generate human-like text based on ...
10 months ago Feeds.dzone.com
CVE-2018-0112 - A vulnerability in Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server could allow an authenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to insufficient input ...
5 years ago
Something exciting is brewing for NRF24 - NRF'24 is also where we'll be demonstrating Webex Connect's mobile ordering coffee bar experience at Café Cisco, which showcases the richer customer communications delivered by the simplicity and intuitiveness of Webex Connect, part of Webex CPaaS ...
10 months ago Feedpress.me
CVE-2018-0264 - A vulnerability in the Cisco WebEx Network Recording Player for Advanced Recording Format (ARF) files could allow an unauthenticated, remote attacker to execute arbitrary code on the system of a targeted user. An attacker could exploit this ...
5 years ago
Retail Tech Deep-Dive: Webex Connect - Jeremy leads sales in North and South America for the Webex cloud communications platform solution. With several leadership roles over the years, Jeremy has deep mobile industry expertise that's been leveraged across many vertical markets including ...
9 months ago Feedpress.me
CVE-2018-0380 - Multiple vulnerabilities exist in the Cisco Webex Network Recording Player for Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by providing a user with a malicious .arf or .wrf ...
5 years ago
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Essential Features of Cybersecurity Management Software for MSPs - Protect your clients' businesses from cyber threats with Cybersecurity Management Software. A vital tool that aids MSPs in enhancing their cybersecurity practices is Cybersecurity Management Software. In this article, we will delve into the features ...
5 months ago Hackread.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
8 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)