USAGE MANAGER. Unique voice analytics for exceptional ROI. See your voice network details like never before.

Size: px
Start display at page:

Download "USAGE MANAGER. Unique voice analytics for exceptional ROI. See your voice network details like never before."

Transcription

1 USAGE MANAGER Unique voice analytics for exceptional ROI. See your voice network details like never before.

2 The ETM Usage Manager is a powerful Unified Communications reporting application, providing voice network analytics to enhance business operations and dramatically reduce costs through resource optimization, service performance and abuse management, security compliance reporting, and capacity planning for efficient VoIP/UC implementations. The Usage Manager enables unified, enterprise-wide CDR/call accounting for all TDM and VoIP calls no matter what mix of proprietary vendor switch types you own. Network optimization, service use, and other voice analytical reports drive a substantial, hard-dollar ROI for ETM System owners. You can easily produce both detailed staff reports for in-depth analysis functions and summary graphical reports for managerial briefings and executive decision support. Flexible scheduling and data formatting features allow you to run reports on demand or schedule them to run automatically on a daily, weekly, or monthly basis. The Usage Manager can store your reports for later viewing, or distribute them automatically via to specified recipients. The Usage Manager includes more than 70 out-of-the-box, predefined reports to immediately support a broad range of security, auditing, and operational management needs. The Usage Manager is also flexible. You can alter existing reports or craft new ones tailored to your specific operational needs. The powerful report editor provides access to more than seventy-five data fields drawn from the CDR, trunking performance, QoS, and network security events logged by the ETM System. All of this information can be formatted, grouped, or filtered in myriad ways, offering unprecedented flexibility in report design and analysis. Fully customizable billing plans and user/extension directory support allow for highly accurate cost allocation or bill verification auditing and call accounting. A centrally administered reporting engine provides enterprise-wide visibility to any number of local or remote reports users via a web-based or desktop interface.

3 Harness voice/uc billing and usage analytics to enhance operations, increase security, document compliance, and lower expenses. PROBLEM BILLING REQUIREMENTS TELECOM EXPENSES NETWORK SECURITY COMPLIANCE REPORTING PERFORMANCE & SLAs PRODUCTIVITY PLANNING USAGE MANAGER SOLUTION Track phone service use, accounting, and resource utilization through full calldetail record (CDR) reporting and call-accounting reports. Perform departmental bill-back and provider bill reconciliation. Dramatically reduce corporate telecom expenses by using resource optimization and service abuse reports to: Right-size existing trunk infrastructure and capacity plan. Baseline telecom infrastructure and utilization for most cost effective VoIP/UC migration build-out. Eliminate unused 1FBs/PBX-bypass lines. Identify orphaned, phantom, or unused phone extensions and stations. Consolidate/reduce unused fax resources. Audit efficiency of call routing plans (e.g., tie lines, local calls over LD spans, LD calls over local spans). Highlight VoIP toll bypass, tie line, and SDN cost saving opportunities. Identify toll service abuse such as non-business LD and international calling, pay-per-call services, and directory assistance calls. Strengthen corporate network security by identifying voice network vulnerabilities and attacks with detailed voice security reports showing: Inbound/outbound modem calls. ISP connections. Toll fraud attacks. Maintenance port connections. Contact center fraud patterns. Calls to/from restricted numbers. Document compliance with regulatory security and business process requirements. Highlight opportunities to improve voice-service performance and reduce service downtime with trending reports showing service outage, disruptions, and errors. Summary information can be used to proactively manage relationship with LD providers and identify SLA refund opportunities. Improve business operations with employee or departmental productivity and efficiency reports showing call volumes and other details. Analyze the types, volumes, trending, and traffic patterns of current calls on your network to light the path to a more cost efficient and right-sized future voice/uc network.

4 Out-of-box and custom reports enhance management decision making. Resource Utilization of Span Group Resource utilization reports highlight opportunities to right-size telecom infrastructure, monitor usage, and aid in VoIP capacity planning and postdeployment ROI measurement. This report highlights a span consolidation opportunity. Dedicated Fax Line Usage by Call Type All of these after-hours, long-distance (LD) voice calls on dedicated fax lines are an indication of toll fraud or line misuse at the corporation s expense. And the modem connections are a serious data security threat. Non-Business-Hours LD and International Calls by Department After tracking after-hours, LD calls across your TDM and VoIP trunks for several months, you know what legitimate level to expect from each department. This week, late-night and weekend LD in engineering went off the charts. Why? Further investigation is warranted. Also, is this the level of calling you would expect from your 24-hour customer service staff? Telecom Health & Status Reporting With detailed telco failure event and error diagnostic reports, telecom managers can quickly resolve trunk issues, isolating them to CO side or CPE side events and errors. This report shows CO side events for the month of September. Top 10 ISP Callers with Duration Seeking private, unmonitored Internet sessions, these employees are defeating the logging/filtering of the data firewall by dialing their private ISP accounts over modems connected to company phone lines. Each of these connections is an unprotected back door for hacker access to the corporate data network. This opens back doors for hackers to penetrate the corporate data network, escalates costs by consuming voice network capacity, exposes the company to viruses and the download or upload of restricted files, and decreases employee productivity. EXAMPLE REPORTS Optimization, Management & Planning Unified, enterprise-wide traffic summary, phone usage, cost allocation, and call accounting across mixed TDM & VoIP environments, with destination country/citystate information. Resource utilization of voice trunking, span groups, and fax/remote access resources to aid service level management, and capacity allocation. VoIP/UC capacity planning and ROI measurement and verification. Unused or orphaned phone extensions. Long-duration or after-hours LD or international calling per phone station or group of stations. Service performance and call-quality, including TDM circuit error conditions and VoIP jitter and packet loss information. Operational efficiency and traffic patterns to check effectiveness of dialing plans and call routing. Employee or department productivity and efficiency based on frequency, destination, and duration of phone activity. Volume and source of unanswered calls to your company or a specific desk (e.g., customer service, inside sales). Security and Risk Management Toll-fraud, DTMF-attack, and war-dialing reports (e.g., multiple short-duration incoming calls from a single location, DTMF codes of PBX hack attempts, long-duration incoming calls to voice mail, outbound calls on voic trunks, voice on fax lines, PBX activity during off-peak hours, multiple Volume, source, destination, time, and duration of unauthorized inbound and outbound modem calls, including employee calls to personal ISPs over voice trunks. Phone-based social engineering and Vishing attack patterns. Fax and VoIP spam activity. Restricted employee toll calling (billed 411, 1-900, 1-976, etc.). Incoming calls with masked Caller ID. Terminated or alerted calls by call type, source number, destination number, etc. Calls into PBX and other system maintenance ports. Authenticated maintenance calls into PBXs and other authorized modems. Forensic and internal investigation reports based on internal or external phone activity.

5 Unify billing, usage, utilization, and security compliance reporting across any enterprise mix of TDM and/or VoIP vendor switch types. FEATURE FUNCTIONALITY Over Seventy (70) Standard Report Templates Centralized Administration of Reports & Users Trunk-side CDR Capture in Real Time Powerful Custom Reports Editor Integrated Location Databases Flexible Report Formatting & Output Automated Scheduling & Distribution of Reports User-Defined Billing Plans Fully Integrated Directory Support Offering easy customization for usage and performance analysis to improve employee productivity, allocate costs, and monitor performance and security, while reducing overall telecommunications expenses. Enterprise-wide control of reports administration and user access with tiered controls for basic users or more advanced custom report editors. Inline appliances capture all CDR completely independent of PBX/IP-PBX or underlying media (TDM and VoIP), providing unrivaled accuracy and real-time performance. All inbound or outbound TDM and VoIP calls across the enterprise are logged to a central relational database for detailed and consolidated reporting and analysis. The Usage Manager s reports editor provides access to detailed CDR, diagnostic, QoS and security data fields, which can be formatted, grouped, sorted, or filtered in myriad ways, offering unprecedented flexibility in reports design and analysis. The Usage Manager includes North American and International location databases for detailed identification of called/calling party country and city-state information. Free periodic location database updates keep the data current. Report graphics, cover pages, and header information can be fully customized. Reports can be saved as HTML, PDF, RTF or CSV file formats for application-of-choice distribution or export for use with other third party applications. Reports can be run ad hoc or scheduled to run at a specified time or on a recurring basis and distributed via or stored on a local file or network location for subsequent access. Flexible flat-rate plans can be configured for any number of carriers or service contracts and used to create usage-based cost allocation and billing verification reports. The integrated Directory Manager supports detailed usage and cost allocation reporting for up to one million extensions for enterprise-class scalability and performance. User-defined directory fields allow complete customization of organizational reporting, with up to five levels for cost allocation and bill-back. SecureLogix.com

6 SecureLogix Corporation San Pedro Ave. Suite 820 San Antonio, TX securelogix.com ETM, TeleWatch Secure, TWSA, We See Your Voice, Unified Communications Policy Manager, SecureLogix, SecureLogix Corporation, as well as the ETM Emblem, SecureLogix Emblem and the SecureLogix Diamond Emblem are trademarks and/ or service marks or registered trademarks and/or service marks of SecureLogix Corporation in the U.S.A. and other countries. All other trademarks mentioned herein are believed to be trademarks of their respective owners. Copyright 2009 SecureLogix Corporation. All Rights Reserved. SecureLogix technologies are protected by one or more of the following patents: US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,700,964 B1, US 6,718,024 B1, US 6,735,291 B1, US 6,760,420 B2, US 6,760,421 B2, US 6,879,671 B1, US 7,133,511 B2, US 7,231,027 B2, US 6,226,372 B1, US 7,440,558 B2, and CA 2,354,149. U.S. and Foreign Patents Pending. Other ETM Applications Voice Firewall Performance Manager Voice IPS Call Recorder