UCentric is all about productivity.
It’s about taking all that data that you already have within the business and getting meaningful information from it. Whether that is from simple call logging or complex data comparisons between temperature controls, smart building sensors, building access or unified communication usage.
We’re not talking about Excel spreadsheets with thousands of rows… we prefer visualisations and automated PDF delivery.
UCentric – Data worth listening to.
Gathering the data required for system migration has typically been costly, time-consuming, resource intensive and prone to error. The challenge has been compounded by difficulties accessing that data and having the expertise among the project team to acquire it from legacy PBX systems.
UCentric Voice Audit is not only the breakthrough solution to these challenges, in some cases capable of reducing network build times from weeks to an hour, its real-time collation of data from multiple sources across multiple platforms and unique cross-referencing capability makes it the complete management tool for communications managers. UCentric Voice even simplifies the management of disparate systems, technologies and metadata.
UCentric offers a complete solution for migration from legacy voice platforms to hosted voice solutions such as Cisco, Broadsoft and Lync/Skype.
Let the MIT team give you a bespoke demo and discuss how UCentric voice migration can be used to assist you or your clients in migrating to a hosted voice solution.
The mandatory freeze on changes to the network during a migration causes unnecessary business disruption, demanding the fastest possible switch-over. When data is available – which isn’t a given – it comes from multiple sources in different formats and at different times. Using traditional means to complete the task is time consuming, expensive and prone to errors. That typically means configuration of a system such as Broadsoft takes four weeks from start to finish. By using UCentric Voice, it’s possible to capture the data, configure the system and go live in an hour.
UCentric supports all of the major PABX and hosted voice platforms that have been in use within the last 30 years. This includes
MIT has been providing call logging solutions for over thirty years. We have unparalleled expertise in recording, collating and reporting on call data. Our UCentric Voice solution provides a fully web-based solution for logging calls. UCentric can be hosted on-premise or ‘in the cloud’ (private or public), and can be scaled from just a handful of extensions to tens of thousands.
Each user has the ability to setup their own dashboard view in order to get instant statistics without any search criteria. The same dashboard can be setup in wallboard mode for use on large monitor displays.
UCentric doesn’t ask you to enter lots of complex search criteria, simply select the date range and click go! The reports can be viewed from any browser, and saved as either a PDF or Excel Spreadsheet for use later
Traditionally call logging solutions only provide the capability to log and analyse call traffic. UCentric is able to look at multiple PABX’s, Skype-for-Business/Lync and other cloud-based solutions along with any other data sources you have available.
Each user can gain access to their own performance reports, and managers can view the performance of their entire team.
All call data is captured and immediately available to report on as soon as the call completes.
Designed with all users in mind, the web-based reporting package is intuitive and easy-to-use.
Based on Microsoft SQL Server and Node, UCentric scales from SME to enterprise-level organisations.
UCentric is compatible with all modern and legacy PABX’s that have a call logging output. It has been lab tested and is in daily use on every major vendor platform in existence.
Up to 100 Extensions
Single user Web Portal
Support: Email only
Up to 200 Extensions
Up to 3 PABX’s
Up to 3 IoT devices
Multi-user Web Portal
Support: Email & Phone
Up to 10,000 Extensions
Up to 100 PABX’s
Up to 100 IoT devices
Up to 100 Building Access controls
Up to 100 Environmental sensors
Multi-Tenant, Multi-user Web Portal
Support: Email & Phone
GDPR defines personal data as any information relating to a data subject which is defined as, “an identifiable natural person who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.” – In other words, a data subject is any EU citizen who has data about them collected by an organisation.
GDPR requires both the protection of personal data and evidence of the protection measures a business has in place for any location (physical or digital) where personal data is collected, processed, stored, or transmitted. Under GDPR, organisations must be able to identify when personal data becomes exposed or compromised. The regulation applies to organisations regardless of whether they’re located in the EU or not.
Article 3 on Territorial Scope, GDPR applies to:
Additionally, GDPR keeps the rules around data transfers that were put in place for previous laws. Data transfers can typically occur only with nations that have adequate security protections. However, GDPR does also allow for codes of conduct and certifications that, when approved, allow for exceptions – This means that other legislation may have to be considered when creating your policy (such as Mifid II etc.)
This is an interesting and often misinformed area. If you are sending information to another business (as opposed to a ‘personal’ email address), also known as B2B, then “Legitimate Interests” is one of the six lawful bases for processing personal data under the GDPR (General Data Protection Regulation). You must have a lawful basis in order to process personal data in line with the ‘lawfulness, fairness and transparency’ principle. Legitimate interests might be your own interests, or the interests of the third party receiving the data, or a combination of the two.
The GDPR tool within UCentric allows you to perform a sweep of your file systems and databases to highlight potentially sensitive personal information.
GDPR states that you should have technological measures in place to: Classify data, Prevent data loss, Encrypt data, Manage Explicit Consent, Limit Data Transfer and allow individuals to exercise their rights to “Access”, “Rectify” and “Erase data.
GDPR compliance should fit neatly into any Quality Assurance system without much effort. You simply need to address the key principles of Data Classification, Data loss, Encryption, Explicit Consent, Data Transfer, Data Access, Data Correction, Data Erasure.
UCentric GDPR provides a Quality Assurance template that you can embed within an existing ISO9001/27001 framework, or use as a standalone compliance document.
This could be from Mobile or Fixed Phones, PCs, Tablets, Accounting Systems, Business Systems or Social Media.
In addition to this, prosecution evidence could include Covert Recordings, Police Data Analysis (i.e. XRY reports), Prosecution ‘Expert’ evidence.
So how do you process, analyse and generate meaningful information and reports from this data? How can you turn around that vast quantity of metadata that the CPS only provided 48hrs before the trial date?
MIT has provided Expert Services to chambers all around the UK in order to assist defence teams in understanding CPS and Police data. Our work has included;
Through this work, MIT has proven;