Banner Shadow

UCentric Voice Migration

UCentric Environment

Analytics and IOT


UCentric is all about productivity.

It’s about taking all that data that you already have within the business and getting meaningful information from it. Whether that is from simple call logging or complex data comparisons between temperature controls, smart building sensors, building access or unified communication usage. 

We’re not talking about Excel spreadsheets with thousands of rows… we prefer visualisations and automated PDF delivery.

UCentric – Data worth listening to.

UCentric Voice Migration

Gathering the data required for system migration has typically been costly, time-consuming, resource intensive and prone to error. The challenge has been compounded by difficulties accessing that data and having the expertise among the project team to acquire it from legacy PBX systems.

UCentric Voice Audit is not only the breakthrough solution to these challenges, in some cases capable of reducing network build times from weeks to an hour, its real-time collation of data from multiple sources across multiple platforms and unique cross-referencing capability makes it the complete management tool for communications managers. UCentric Voice even simplifies the management of disparate systems, technologies and metadata.

UCentric offers a complete solution for migration from legacy voice platforms to hosted voice solutions such as Cisco, Broadsoft and Lync/Skype.

Contact us for a demo

Let the MIT team give you a bespoke demo and discuss how UCentric voice migration can be used to assist you or your clients in migrating to a hosted voice solution. 

Faster migration

The mandatory freeze on changes to the network during a migration causes unnecessary business disruption, demanding the fastest possible switch-over. When data is available – which isn’t a given – it comes from multiple sources in different formats and at different times. Using traditional means to complete the task is time consuming, expensive and prone to errors. That typically means configuration of a system such as Broadsoft takes four weeks from start to finish. By using UCentric Voice, it’s possible to capture the data, configure the system and go live in an hour.

Supported platforms

UCentric supports all of the major PABX and hosted voice platforms that have been in use within the last 30 years. This includes

  • Cisco – CUCM, Call Manager Express and HCS
  • Mitel – 3300, SX2000/SX200 and 5000
  • Avaya – ACM, CM, IP Office, BCM and Definity
  • Nortel – Meridian, CS1K, CS1000, Succession and BCM
  • Siemens – ROLM, Realitis, iSDX, DX, HiPath and HiCom
  • Alcatel – OmniPCX
  • Asterisk – FreePBX / IP Cortex
  • Microsoft – Lync and Skype for Business (S4B / SfB)
  • Broadsoft – Broadworks
  • IBM – 9751
  • GPT – BTeX

IoT in the workplace

Flexible working

It’s been many years since the workday revolved around the telephone. We’ve seen the birth of SMS, email and IM, and listened with a little scepticism to the often lauded imminent arrival of “the connected office”. It seems that 2018 was the year it eventually arrived to the masses.

We are not saying that everyone works this way, but with the ubiquitous availability of public WiFi and 4G . The availability of ‘always on’ Internet access really underpins and defines how the connected office can (and should) function.

So where does IoT come into it?

When you talk of IoT, you might think of Arduino‘s, iRing doorbells, smart fridges etc. But the reality of IoT is that we are simply talking about data exchange across internet connected devices. 

Building heatmap

At it’s purest, IoT deals with low-power, low-bandwidth sensors or devices putting out simple messages and alerts. This could be a temperature sensor, a door switch or even an SNMP trap alert from your WiFi-enabled inkjet in the corner.

But another aspect of this is the way in which employees are always-connected to the business.

Traditionally this was through telephone calls, faxes and latterly email, but with the advert of flexible working, could now include VPN, RFID access cards, Instant messaging, Jabber, VoIP, Web Conference, Video Conference etc.

But there are also a huge number of systems utilised by the workforce that are not necessarily Internet-connected, or if they are, are using a propitiatory reporting interface or data format.


The question we’ve asked ourselves is “How do you measure staff performance when they are using a dozen unconnected systems.” – If you can only see 10% of the picture, how can you make accurate business decisions?

Bring it all into one place

UCentric was born of this idea – that all data sources should be able to be aggregated, normalised and reported on centrally. It should be capable of talking to “the bare metal” of any legacy system, whilst using high-level API’s available in modern internet-connected platforms. In addition, MIT are working on low-cost IoT devices to bring real benefits to the business.


One such development is a fully self-contained ANPR (Automatic Number Plate Recognition) that uses AI and Deep-learning to determine the license plate details and if the vehicle is coming or going from the customer premises. UCentric will allow you to use multiple sensors of this type around your premises (or multiple premises) to monitor all vehicle usage and attendance.

UCentric Call logging

UCentric Logo

MIT has been providing call logging solutions for over thirty years. We have unparalleled expertise in recording, collating and reporting on call data. Our UCentric Voice solution provides a fully web-based solution for logging calls. UCentric can be hosted on-premise or ‘in the cloud’ (private or public), and can be scaled from just a handful of extensions to tens of thousands.

Dashboard views

Each user has the ability to setup their own dashboard view in order to get instant statistics without any search criteria. The same dashboard can be setup in wallboard mode for use on large monitor displays.

A short video showing the widgets in action

Intuitive Reporting

UCentric doesn’t ask you to enter lots of complex search criteria, simply select the date range and click go! The reports can be viewed from any browser, and saved as either a PDF or Excel Spreadsheet for use later


UCentric People

UCentric re-imagines call logging

Traditionally call logging solutions only provide the capability to log and analyse call traffic. UCentric is able to look at multiple PABX’s, Skype-for-Business/Lync and other cloud-based solutions along with any other data sources you have available.

Each user can gain access to their own performance reports, and managers can view the performance of their entire team.

UCentric can report in real-time

All call data is captured and immediately available to report on as soon as the call completes.

Easy to use

Designed with all users in mind, the web-based reporting package is intuitive and easy-to-use.

A short video demonstrating the detailed search facility

Resilience and scaling

Based on Microsoft SQL Server and Node, UCentric scales from SME to enterprise-level organisations.


UCentric is compatible with all modern and legacy PABX’s that have a call logging output. It has been lab tested and is in daily use on every major vendor platform in existence.

Per Year
Our Standard Call Logging Solution
Up to 100 Extensions
Single PABX
Single User Web Portal
Scheduled Reports
Support: Email Only
No IoT Devices
No Environmental or Building Management Sensors
Contact Us
Per Year
Our Enhanced Call Logging Solution
Up to 200 Extensions
Up to 2 PABX's
Multi User Web Portal and Scheduled Reports
Support: Email and Telephone Support 09:00 - 17:30, Mon - Fri
3 IoT, Environment or External Data Sources
User dashboards
Contact Us

UCentric GDPR

UCentric GDPR

UCentric GDPR is a software application that allows you to perform data sweeps and searches of file systems, databases and cloud storage to highlight potentially sensitive personal information.

Files or folders stored on a PC, server or within shared network drives can all contain data that is often difficult to identify and quantify. UCentric GDPR allows searching of all of these types of file storage along with cloud storage solutions such as GoogleDrive, Microsoft OneDrive and DropBox. Microsoft SQL Server and MySQL databases can also be searched or swept to ensure data used in CRM and ITSM systems can be identified.

How can UCentric help SME’s comply?

The UCentric GDPR tool allows sweeps of your file systems and databases to highlight potentially sensitive personal information.

GDPR states that you should have technological measures in place to: Classify data, Prevent data loss, Encrypt data, Manage Explicit Consent, Limit Data Transfer and allow individuals to exercise their rights to “Access”, “Rectify” and “Erase data.

  • Classification
    • UCentric identifies the files and database entries where data is held even if you are unaware of it!
  • Encryption
    • It will sweep all relational database engines (Microsoft SQL, MySQL/InnoDB, ODBC etc.) and detail which databases are not encrypted and where lax security or unnecessary elevation of access rights is in place.
  • Explicit Consent
    • Without knowing what data you have, how can you control consent?!
  • Data Transfer
    • The tool highlights all personal data, to ensure you are always aware of data that is both being transferred and processed
  • Access, Rectify and Erase
    • Built in reporting and redaction enables an accessible, simplified process, and performs it across multiple files or databases simultaneously.

Want to learn more?

Contact us for a demo or to learn more

What is GDPR, and what’s it’s purpose?

GDPR stands for “General Data Protection Regulations” and is a regulation passed by the European Union (EU) that protects the personal data of EU citizens (also known as data subjects).


GDPR defines personal data as any information relating to a data subject which is defined as, “an identifiable natural person who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.” – In other words, a data subject is any EU citizen who has data about them collected by an organisation.

What should be protected?

GDPR requires both the protection of personal data and evidence of the protection measures a business has in place for any location (physical or digital) where personal data is collected, processed, stored, or transmitted. Under GDPR, organisations must be able to identify when personal data becomes exposed or compromised. The regulation applies to organisations regardless of whether they’re located in the EU or not.

Article 3 on Territorial Scope, GDPR applies to:

  • Any organisation in the EU, even if the processing occurs outside the EU.
  • An organisation processing EU citizen data in the context of selling goods or services or monitoring data subject behaviour in the EU. This applies even if the organisation is located outside of the EU.
  • Data controllers (defined as the entities that determine the purposes, conditions, and means of the processing of personal data) that are located outside of the EU, but where the EU law applies due to international law.

Additionally, GDPR keeps the rules around data transfers that were put in place for previous laws. Data transfers can typically occur only with nations that have adequate security protections. However, GDPR does also allow for codes of conduct and certifications that, when approved, allow for exceptions – This means that other legislation may have to be considered when creating your policy (such as Mifid II etc.)

Can I send emails to my clients without consent?

This is an interesting and often misinformed area. If you are sending information to another business (as opposed to a ‘personal’ email address), also known as B2B, then “Legitimate Interests” is one of the six lawful bases for processing personal data under the GDPR (General Data Protection Regulation). You must have a lawful basis in order to process personal data in line with the ‘lawfulness, fairness and transparency’ principle. Legitimate interests might be your own interests, or the interests of the third party receiving the data, or a combination of the two.

Quality assurance

GDPR compliance should fit neatly into any Quality Assurance system without much effort. You simply need to address the key principles of Data Classification, Data loss, Encryption, Explicit Consent, Data Transfer, Data Access, Data Correction, Data Erasure.

UCentric GDPR provides a Quality Assurance template that you can embed within an existing ISO9001/27001 framework, or use as a standalone compliance document.

Supported Vendors