Slider
Welcome to MIT
Where Meta Matters
Slider
UCentric Voice Migration
Simplify migration from legacy voice platforms
Slider
UCentric Voice and People
Log all UC and TDM platforms in one place
Banner Shadow

UCentric Voice Migration

UCentric Call logging

UCentric

UCentric

UCentric is all about productivity.

It’s about taking all that data that you already have within the business and getting meaningful information from it. Whether that is from simple call logging or complex data comparisons between temperature controls, smart building sensors, building access or unified communication usage. 

We’re not talking about Excel spreadsheets with thousands of rows… we prefer visualisations and automated PDF delivery.

UCentric – Data worth listening to.

UCentric Voice Migration

Gathering the data required for system migration has typically been costly, time-consuming, resource intensive and prone to error. The challenge has been compounded by difficulties accessing that data and having the expertise among the project team to acquire it from legacy PBX systems.

UCentric Voice Audit is not only the breakthrough solution to these challenges, in some cases capable of reducing network build times from weeks to an hour, its real-time collation of data from multiple sources across multiple platforms and unique cross-referencing capability makes it the complete management tool for communications managers. UCentric Voice even simplifies the management of disparate systems, technologies and metadata.

UCentric offers a complete solution for migration from legacy voice platforms to hosted voice solutions such as Cisco, Broadsoft and Lync/Skype.

Contact us for a demo

Let the MIT team give you a bespoke demo and discuss how UCentric voice migration can be used to assist you or your clients in migrating to a hosted voice solution. 

Faster migration

The mandatory freeze on changes to the network during a migration causes unnecessary business disruption, demanding the fastest possible switch-over. When data is available – which isn’t a given – it comes from multiple sources in different formats and at different times. Using traditional means to complete the task is time consuming, expensive and prone to errors. That typically means configuration of a system such as Broadsoft takes four weeks from start to finish. By using UCentric Voice, it’s possible to capture the data, configure the system and go live in an hour.

Supported platforms

UCentric supports all of the major PABX and hosted voice platforms that have been in use within the last 30 years. This includes

  • Cisco – CUCM, Call Manager Express and HCS
  • Mitel – 3300, SX2000/SX200 and 5000
  • Avaya – ACM, CM, IP Office, BCM and Definity
  • Nortel – Meridian, CS1K, CS1000, Succession and BCM
  • Siemens – ROLM, Realitis, iSDX, DX, HiPath and HiCom
  • Alcatel – OmniPCX
  • Asterisk – FreePBX / IP Cortex
  • Microsoft – Lync and Skype for Business (S4B / SfB)
  • Broadsoft – Broadworks
  • IBM – 9751
  • GPT – BTeX

UCentric Call logging

UCentric Logo

MIT has been providing call logging solutions for over thirty years. We have unparalleled expertise in recording, collating and reporting on call data. Our UCentric Voice solution provides a fully web-based solution for logging calls. UCentric can be hosted on-premise or ‘in the cloud’ (private or public), and can be scaled from just a handful of extensions to tens of thousands.

Dashboard views

Each user has the ability to setup their own dashboard view in order to get instant statistics without any search criteria. The same dashboard can be setup in wallboard mode for use on large monitor displays.

A short video showing the widgets in action

Intuitive Reporting

UCentric doesn’t ask you to enter lots of complex search criteria, simply select the date range and click go! The reports can be viewed from any browser, and saved as either a PDF or Excel Spreadsheet for use later

.

UCentric People

UCentric re-imagines call logging

Traditionally call logging solutions only provide the capability to log and analyse call traffic. UCentric is able to look at multiple PABX’s, Skype-for-Business/Lync and other cloud-based solutions along with any other data sources you have available.

Each user can gain access to their own performance reports, and managers can view the performance of their entire team.

UCentric can report in real-time

All call data is captured and immediately available to report on as soon as the call completes.

Easy to use

Designed with all users in mind, the web-based reporting package is intuitive and easy-to-use.

A short video demonstrating the detailed search facility

Resilience and scaling

Based on Microsoft SQL Server and Node, UCentric scales from SME to enterprise-level organisations.

Compatiblility

UCentric is compatible with all modern and legacy PABX’s that have a call logging output. It has been lab tested and is in daily use on every major vendor platform in existence.

Basic

£279

per YEAR

Up to 100 Extensions
Single PABX
Single user Web Portal
Scheduled Reports

Support: Email only

Enhanced

£849

per YEAR

Up to 200 Extensions
Up to 3 PABX’s
Up to 3 IoT devices
Multi-user Web Portal
Scheduled Reports

Support: Email & Phone

Enterprise

£POA

per YEAR


Up to 10,000 Extensions
Up to 100 PABX’s
Up to 100 IoT devices
Up to 100 Building Access controls
Up to 100 Environmental sensors
Multi-Tenant, Multi-user Web Portal
Scheduled Reports

Support: Email & Phone

UCentric GDPR

What is GDPR, and what’s it’s purpose?

GDPR stands for “General Data Protection Regulations” and is a regulation passed by the European Union (EU) that protects the personal data of EU citizens (also known as data subjects).

GDPR

GDPR defines personal data as any information relating to a data subject which is defined as, “an identifiable natural person who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.” – In other words, a data subject is any EU citizen who has data about them collected by an organisation.

What should be protected?

GDPR requires both the protection of personal data and evidence of the protection measures a business has in place for any location (physical or digital) where personal data is collected, processed, stored, or transmitted. Under GDPR, organisations must be able to identify when personal data becomes exposed or compromised. The regulation applies to organisations regardless of whether they’re located in the EU or not.

Article 3 on Territorial Scope, GDPR applies to:

  • Any organisation in the EU, even if the processing occurs outside the EU.
  • An organisation processing EU citizen data in the context of selling goods or services or monitoring data subject behaviour in the EU. This applies even if the organisation is located outside of the EU.
  • Data controllers (defined as the entities that determine the purposes, conditions, and means of the processing of personal data) that are located outside of the EU, but where the EU law applies due to international law.

Additionally, GDPR keeps the rules around data transfers that were put in place for previous laws. Data transfers can typically occur only with nations that have adequate security protections. However, GDPR does also allow for codes of conduct and certifications that, when approved, allow for exceptions – This means that other legislation may have to be considered when creating your policy (such as Mifid II etc.)

Can I send emails to my clients without consent?

This is an interesting and often misinformed area. If you are sending information to another business (as opposed to a ‘personal’ email address), also known as B2B, then “Legitimate Interests” is one of the six lawful bases for processing personal data under the GDPR (General Data Protection Regulation). You must have a lawful basis in order to process personal data in line with the ‘lawfulness, fairness and transparency’ principle. Legitimate interests might be your own interests, or the interests of the third party receiving the data, or a combination of the two.

So how can UCentric help SME’s comply?

The GDPR tool within UCentric allows you to perform a sweep of your file systems and databases to highlight potentially sensitive personal information.

GDPR states that you should have technological measures in place to: Classify data, Prevent data loss, Encrypt data, Manage Explicit Consent, Limit Data Transfer and allow individuals to exercise their rights to “Access”, “Rectify” and “Erase data.

  • Classification
    • UCentric identifies the files and database entries where data is held even if you are unaware of it!
  • Encryption
    • It will sweep all relational database engines (Microsoft SQL, MySQL/InnoDB, ODBC etc.) and detail which database are unencrypted and where lax security or unnecessary elevation of access rights is in place.
  • Explicit Consent
    • Without knowing what data you have, how can you control consent?!
  • Data Transfer
    • The tool highlights all personal data, so you can be sure of what data you are transferring.
  • Access, Rectify and Erase
    • Built in reporting and redaction makes this a much simplified process, and performs it across multiple files or databases simultaneously.

Quality assurance

GDPR compliance should fit neatly into any Quality Assurance system without much effort. You simply need to address the key principles of Data Classification, Data loss, Encryption, Explicit Consent, Data Transfer, Data Access, Data Correction, Data Erasure.

UCentric GDPR provides a Quality Assurance template that you can embed within an existing ISO9001/27001 framework, or use as a standalone compliance document.

UCentric Law

Almost all trials now involve metadata

This could be from Mobile or Fixed Phones, PCs, Tablets, Accounting Systems, Business Systems or Social Media.

In addition to this, prosecution evidence could include Covert Recordings, Police Data Analysis (i.e. XRY reports), Prosecution ‘Expert’ evidence.

So how do you process, analyse and generate meaningful information and reports from this data? How can you turn around that vast quantity of metadata that the CPS only provided 48hrs before the trial date?

Our promise

  • We don’t charge for an initial assessment.
  • We provide a fixed cost for each instruction.
  • We fully observe GDPR and DPA during the analysis
  • Our staff have been SC cleared and CRB checked
  • We will fix all LAA cases to their approved rate (£72/hr as of Jan 2018)
UCentric Law - Expert Witness

MIT’s proven track record

MIT has provided Expert Services to chambers all around the UK in order to assist defence teams in understanding CPS and Police data. Our work has included;

  • Analysis and conversion of covert recordings
  • Location mapping
  • Chain-of-evidence analysis
  • Accounting systems invoice verification
  • Mobile phone analysis
  • Audio analysis of interview tapes

Through this work, MIT has proven;

  • Failures in IPSO guidelines
  • Breakdown of chain-of-evidence
  • Contradictory or flawed evidence
  • Presence of an agent provocateur
  • Failures of the Police recording equipment
  • Misinterpretation of evidence by the CPS

Supported Vendors

Logo Logo Logo Logo Logo Logo Logo Logo