Avaya's New ACE 3.0 for Microsoft Lync Offers the Best Integration

Provide users with a unified desktop experience by extending Avaya real-time communications to Microsoft Lync, Office 365 and other Microsoft applications. Tight integration keeps the client interface consistent and allows users to communicate from their preferred devices. Your enterprise can improve productivity while reducing costs, as Avaya client-side integration preserves existing communications investments and requires no Microsoft voice licenses or devices.

Avaya Agile Communication Environment (ACE) Microsoft Lync Integration allows users to control their Avaya or Cisco phones and view telephony presence from within the Microsoft Lync/Communicator client, Microsoft Office, and Internet Explorer. The Lync/Communicator client can be used as a soft phone to drive calls through the Avaya Aura infrastructure and both premise and cloud-based Lync integration options are supported. For off-the-shelf integration with Microsoft Dynamics and Salesforce.com, users can add the Avaya ACE CRM Integration packaged application. Like other out-of-the-box Avaya ACE packages, these are quick to deploy and can generate high financial returns for enterprises seeking to integrate Avaya and select third party communication systems with business applications.

Reduces Costs
Protect investments in Avaya infrastructure and desktop phones with Avaya ACE Microsoft Lync Integration. Avoid investments in duplicate back end infrastructures and leverage Avaya Aura® to standardize on one voice, video, and unified messaging network with single dial plan, trunk consolidation, and centralized management and applications. Eliminate costs associated with Microsoft voice licenses and related devices, as Avaya integration requires only Microsoft Lync/OCS Standard client access licensing. Deploy the application to users quickly and cost effectively.

Improves Productivity
End users access a combination of Microsoft presence, instant messaging and Avaya enterprise-grade business communications in an intuitive, unified experience. The Lync client experience remains consistent and users continue to communicate from their preferred devices. Multi-modal communication from the desktop helps end users connect, communicate and collaborate to deliver projects without delay.

Key Features
Telephony presence integrated with Microsoft Lync or Communicator clients can increase productivity by giving users improved visibility into a person’s availability (e.g. not on a phone call) and how he or she can be contacted.

Click-to-call via the Avaya ACE call menu option from Microsoft Lync or Communicator, Microsoft Office, or Internet Explorer lets users control their Avaya Aura Communication Manager, Avaya Communication Server (CS) 1000, or Cisco Unified Communications Manager desk phones from these desktop applications. Microsoft Lync-controlled access settings enable users to configure which phone numbers colleagues, customers, and partners see. Enhanced resiliency helps ensure established phone calls continue even in the event of a Microsoft Lync reboot.

Premise-based or Office 365 Microsoft Lync support means organizations may deploy Lync/Communicator clients as part of a Microsoft on-premises system or as a hosted, “cloud” based service.

Escalate from IM to a phone call capability lets users transition automatically to an Avaya or Cisco controlled phone call from a Microsoft Lync instant message.

Conversation window for mid-call control provides easy access to Avaya telephony features from the Microsoft Lync or Communicator user interface, including call forwarding, hold and retrieve, transfer, conference and a keypad for entering DTMF tones, such as when using passcodes to enter a conference call. Volume and mute controls are also presented for calls made in computer mode. Likewise, calls originating from a desk phone can be controlled via the Conversation Window.

Toast pop-up enables easy call answering or incoming call diversion to an alternate device.
Multiple call handling* enables users to maintain one active call while having one or more calls on hold. Users can swap between active and held calls, transfer active calls to an on-hold user, join active and held calls to form a conference and add further held calls into the conference call. A toast pop-up shows any calls waiting (alternative call) and allows a user to answer the alternative call and place the active call on hold.

Computer and desk phone modes let users remotely control their familiar Avaya or Cisco connected desk phones or use the PC for calls. For computer calls, Avaya provides a desktop media engine that delivers calls through Avaya Aura® using open codecs: G.711, G.722, and G.729. When on the move, users are prompted to change modes. For example, switching from a remote network (such as a home office) to a corporate location prompts a change to desk phone mode, so the user no longer risks missing the first call.



Enterprise dial plan and E.164 support enables employees to use familiar internal extension number dialing as well as national and international number dialing.

Synchronized call forwarding across the desk phone and Microsoft Lync/Communicator client helps give the user complete control of call forwarding settings and avoid unintentional overrides. For example, if a user has cancelled call forwarding on his or her desk phone, the application prevents previous settings on Microsoft Lync from inadvertently re-establishing call forwarding during sign-in.

Single sign-in means users only need to use Microsoft Lync/Communicator sign-in methods to make calls using Avaya Aura®.

Silent install lets IT install the Avaya ACE-Microsoft Lync client and Avaya UC desktop engine for computer mode calls in a single step without end user intervention.
Localization support for simplified Chinese, Japanese, Korean, English, French, German, Italian, Russian, Lat-Spanish, and Brazilian-Portuguese is also available.
Requirements
Avaya ACE™ Lync Integration requires:

• Avaya Aura Communication Manager 5.2.1, 6.x with Avaya Aura Application Enablement Services 5.2.3 or higher (phone mode and computer mode) and UC desktop licenses
     Or
• Avaya Communication Server 1000 6.0 to 7.5 with TR/87 and AST licenses (Avaya ACE 3.0 phone mode only, computer mode requires ACE 3.1)
     Or
• Avaya Communication Server 2100 release SE13 (Avaya ACE 3.0 phone mode only)
     Or
• Cisco Unified Communication Manager 6.0+ (Avaya ACE 3.0 phone mode only)
     And
• Avaya UC Engine 6.1
• Avaya ACE:
     »» ACE Core Service 3.0 or later on Linux (Red Hat 5.4 with WAS 7.x)
     »» ACE AIE 3.0 or later running on Win Server 2008 R2

NOTE: Avaya System Platform support enables a single server to support the Avaya ACE Base Server and Avaya Aura Application Enablement Services. A second server is required to deploy the Avaya ACE Application Integration Engine.

Microsoft Lync
• Microsoft Lync Server 2010 and Microsoft Lync Server 2010 Client
• Client PC on Microsoft Windows XP SP2 or later or Windows 7 SP1
• Microsoft .Net 3.5 SP1 or later

Microsoft OCS 2007 R2
• Microsoft OCS 2007 R2 and Microsoft Communicator Client R3.5.6907.196 or above
• Client PC on Microsoft Windows XP SP3 or later or Windows 7 SP1
• Microsoft .Net 3.5 SP1 or later

Microsoft Desktop
• Microsoft Internet Explorer 6.0 to 9.0
• Microsoft Office 2007 / 2010

For more information contact VOX Network Solutions at: http://www.voxns.com

Kickstart new fonts!

Google Web Fonts is proud to announce a new funding experiment, using Kickstarter - a popular way to fund creative projects.

Each month there are many typeface designs proposed to our team for publication and financial support. But we can’t support everything! Even with the best quality proposals, it can be hard to decide about those that are quite similar to ones already published. Really the best judge of which web fonts you want to use is you!

So we invited the designers of three recent proposals to try out Kickstarter and see how it works for font projects. There are some fun rewards for pledging a contribution so click through to see the details!

Folk





First is Marcello Magalhaes’ Folk, which transforms the vernacular lettering of Sao Paulo into a font. Already popular as web font, it has been used by The Independent Film Channel and Mozilla - but it only includes an uppercase set of glyphs, and not all the symbols and accents that Google Web Fonts requires. For this project, Marcello will complete the font to the Basic Latin character set, and has designed a poster to go with the new release.

Fast Brush Script





Fast Brush Script is the working name for a font by Pablo Impallari. Pablo's first font, Lobster, is one of the most popular Google Web Fonts, having been served over 2 billion times.

Pablo is offering a very unusual reward - choosing the name! Normally the name of a font is sacred to the designer, but Pablo is opening up the opportunity for corporate patronage of his work. The development name 'Fast Brush Script' reflects the core concept of the typeface. This font is currently in an early development stage with the lowercase letters now fully prototyped, as you can see above, and you can download the current develop version from the Kickstarter project page.

Montserrat





Montserrat is an extremely high quality sans serif text typeface by Julieta Ulanovsky. Advancing substantially during her studies at the prestigious University of Buenos Aires' Masters degree in Typeface Design, the design revives the historical type of the Montserrat neighbourhood where Julieta lives and works.

This genre of type has been a popular trend in recent years and this typeface in particular stands out with its excellent quality. Setting it apart are the set of alternative caps, which add a little fun to a very functional text typeface.



The Google Web Fonts team has already contributed directly to these Kickstarter projects, and we hope you will also become a backer for all three projects as well - let's hope the type designers will be paid far beyond their minimum funding goals!



Update: When fonts are made available in Google Web Fonts, all their source files are also available from the 'Google Font Directory' Google Code Project in a Mercurial version control system, under a free, libre and open source license - typically the SIL Open Font License.

Posted by Dave Crossland, Font Consultant, Google Web Fonts

Scary Fonts For Halloween

Halloween is here - what a fun time of year! The pumpkins are carved and the seeds are roasting in the oven, a chill is in the air, and all the little monsters are busy planning their best tricks and hoping for excellent treats. With all the trick or treating & costume planning, why not add some Halloween spirit to your website as well? We're happy to publish 4 new, fun, and scary fonts this week that are sure to provide a spoooooky feel for your website!



We would love to see how creative you can get with these fonts - please let us know where you are using them in the comments of this post, and we'll send out a Google Web Fonts T-shirt for our favorite!



Creepster by Sideshow





Its ghastly! Its gory! Its gruesomely gleeful! It's Creepster Caps, the blood-curdling new font from Squid and Sideshow. This fright-filled font has so many alternates its like stitching together your own monster every time you use it. Creepster Caps: perfect for all of your grisly graphic needs!



Eater Caps by Typomondo





Eater Caps is a display font infected by the darkest of rare disease that slowly spreads at night while the webfont user sleeps.



Nosifer Caps by Typomondo





Nobody knows where Nosifer Caps comes from. It emanates a dark stench as it drips from the internet.



Butcherman Caps by Typomondo





Butcherman Caps is a zombified display font, hacked and chopped and left for dead, yet still crawling!



Posted by Posted by Dave Crossland, Font Consultant, Google Web Fonts

What is Avaya's Social Media Manager Solution?

Many tools are available for monitoring social media conversations. But you still need to sift through the thousands of posts provided by these listening engines to discern the really important conversations — ones that are actionable in a measurable way. Without such a capability today, you have a significant blind spot in your customer intelligence. Or, if you’re having your teams manually review those thousands of posts, you’re wasting valuable resources.

Avaya Social Media Manager addresses this challenge head-on. With it, you can connect seamlessly to social media channels and detect social media conversations that relate to your products, services, customers and prospects. But what really sets Social Media Manager apart is:
• You can filter, distill and analyze social media posts, identifying those that are most important and actionable.
• Those messages are automatically distributed to the contact center agent or specialist anywhere in your organization who is best qualified to respond.
• And, best of all, those mentions and responses are tracked and reported on through your Avaya Aura® Contact Center reporting tools.

With these capabilities, you reduce the risk of missing vital customer posts. You maintain a more consistent customer experience through all customer touch points — voice, e-mail, Web or video chat, and social media channels. And, you can identify new revenue-generating opportunities while measuring the impact of social media on your organization. Social Media Manager effectively becomes a focal point for all your social customer interactions, helping you elevate the customer experience across the board and quickly identify sales and service opportunities.

Social Media Manager effectively becomes a focal point for all your social customer interactions, helping you elevate the customer experience across the board and quickly identify sales and service opportunities.

Ready to make customer service a competitive edge by managing your social media opportunities in an entirely new way? We offer more than just software. Understanding both the business and technical aspects of social media is critical to your success, and we can help.
Contact us today:
VOX Network Solutions - www.voxns.com or @voxns
Avaya Social Media Manager Demo:

Avaya & Sipera SBC's - What You Need to Know

Avaya Acquires Sipera - This Enables Avaya to Accelerate Development of Integrated SIP-based Security Capabilities for Unified Communications and Contact Center Environments.

 
Avaya’s Sipera solutions provide enterprises and service providers with comprehensive VoIP/UC security solutions that protect, control and enable real-time unified communications. The Sipera IPCS products combine VPN, Firewall/SBC, Intrusion Prevention, Anti-Spam, Compliance and Troubleshooting functionality for VoIP systems in a single device. This securely enables IP PBXs, VoIP remote users, SIP trunks, data/voice VLANs, hosted VoIP services and IMS or UMA-based networks. Comprised of top vulnerability research experts, the Sipera VIPER Lab concentrates its efforts towards identifying VoIP vulnerabilities, while Sipera LAVA tools verify networks' readiness to resist attacks.

 


 
"Sipera's broad portfolio of open, enterprise-focused security technologies strongly align with our own Avaya Aura unified communications architecture. Together, we will help customers simplify deployment, management and maintenance of secure, multi-vendor UC and contact center environments while providing them with greater flexibility to support remote and mobile employees using the device that best suits their needs."
Dr. Alan Baratz, Senior Vice President and President, Global Communications Solutions, Avaya

 
"Integration of our solutions with Avaya Aura is a significant milestone in the evolution of unified communications. With the combined offerings, users enjoy rich, responsive communication experiences that span multiple channels, applications, devices and networks. These communications incorporate security and compliance features that ensure mission-critical information and resources are safeguarded. Together, our solutions simplify and streamline deployment and management of enterprise UC, improving communications flexibility, accelerating user adoption, and maximizing return on investment."
Jim Timmer, COO, Sipera

 

The Sipera IPCS solutions are already Avaya compliant with key components of the Unified Communications for Teleworkers solutions from Avaya. The Sipera IPCS product suite's integration with Avaya SIP-enabled telephones helps businesses comprehensively secure VoIP/UC remote and mobile workers by offering threat prevention, policy compliance and secure access in a single, real-time appliance.

Looking for the Avaya-Sipera Application Notes for integration? 
  •      Application Notes for Configuring the Sipera Systems IPCS 310 in an Avaya SIP Telephony Environment - Issue 1.0 - Apr 06
  •      Application Notes for Configuring Sipera IPCS 310 with Avaya SIP Enablement Services and Avaya Communication Manager to Support Remote Users with NAT Traversal - Issue 1.0 - June 07
  •      Application Notes for Configuring Sipera IPCS 310 with Avaya SIP Enablement Services and Avaya Communication Manager to Support SIP Trunking with NAT Traversal - Issue 1.0 - July 07
  •      Application Notes for Configuring Sipera IPCS 310 with Avaya SIP Enablement Services and Avaya Communication Manager to Support SIP Trunking - Issue 1.0 - Oct 08
  •      Application Notes for Configuring Sipera IPCS 310 with Avaya SIP Enablement Services and Avaya Communication Manager to Support Remote Users with NAT Traversal - Issue 1.0 - Dec 08
  •      Application Notes for Configuring Sipera IPCS 310 with Avaya SIP Enablement Services and Avaya Communication Manager to Support Remote Users with NAT Traversal - Issue 1.0 - Apr 09
  •      Application notes for SIPERA UC-Sec 4.0 Remote User Enablement Solution with Avaya Multimedia Communication System 5100 release 4.0 - Issue 1.0 - Apr 10
  •      Application Notes for Configuring Sipera Systems UC-Sec Secure Access Proxy with Avaya Aura Session Manager and Avaya Aura Communication Manager to Support Core Enterprise Users - Issue 1.0 - Mar 2011
  •      Application Notes for Configuring Sipera Systems UC-Sec Secure Access Proxy with Avaya Aura Session Manager and Avaya Aura Communication Manager to Support Remote Users with and without NAT Traversal - Issue 1.0 - Mar 2011
 Contact us for more information or to receive the free Sipera for Avaya Application Notes:
     http://www.voxns.com or @voxns
 

What is Avaya Support Advantage and the New Avaya Maintenance Program?

The Avaya Support Advantage portfolio provides service options designed to maintain and support net new sales and upgrades of Avaya Enterprise Solutions. It includes support for Enterprise Customers' IP Telephony, Contact Center and Unified Communications solutions. This portfolio of services is tailored to meet a wide range of customer needs, by providing a solution-centric approach and delivering increased value in a flexible and modular support model. These new offers introduce a simplified quoting and pricing methodology based on license/server/gateway SKU's.

Support Advantage consists of the following offers:

  • Essential Support: 24x7 remote software and hardware support, access to service packs and access to web services.
  • Essential Co-Delivery: is available to channel partners who meet certification requirements as defined by the Avaya Connect program.
  • Preferred Support: Includes the entitlements of Essential plus EXPERT Systems(SM) monitoring, off board alarming and centralized management for remote access policies.
  • Parts Next Business Day (NBD): Replacement of parts on a next business day basis. Customer must purchase Parts NBD with Essential, Essential Co-Delivery or Preferred if an Onsite option is not selected. Additional delivery options for parts available, including 8x5x4 and 24x7x4 expedited deliveries (where available).
  • Onsite Support: Provides onsite technical support and parts replacement. Customers must purchase Essential, Essential Co-Delivery (through a Partner) or Preferred Support before purchasing Onsite Support.
  • Upgrade Advantage: provides customers with a subscription for major software upgrades which results in substantial savings and investment protection.
  • Advanced Services: an array of advanced service that can be added on with either Essential or Preferred Support. Examples include: Enhanced Monitoring, Software Release Maintenance and Product Correct Support. Please see the appropriate offer pages on the Enterprise Portal for details, availability and prerequisites.
To find out if Avaya Support Advantage is for you or what options you have, check out the new Avaya Maintenance Program at http://www.AvayaMaintenance.com.

NEW Avaya Maintenance Program Launched!

Looking for options when it comes to your Avaya Maintenance agreements?  You're not alone.  Here's a new program that provides customers with at least two quote plans to compare at one place. 

See more details at:  http://www.AvayaMaintenance.com

Save Big Money in Three Easy Steps:
  1. Get Easy Quotes - It only takes a few minutes to get started.
  2. Compare the NumbersSee two quote plans in one place.
  3. Choose & Save - Pick the best option and start saving.













It's a free service and there is no obligation to get pricing.


Why Your Future is About Getting There Yesterday

Today, time-to-market really means time-to-success — Which is exactly why you should look to VOX to accelerate your ability to leverage the latest innovations.

While we pride ourselves on offering excellent, leading-edge products and services, it's the quality of the long-term relationships we form that really sets us apart in the industry. We know that our business is dependent upon how our people deal with your people. It's just that simple.
At VOX, we're in the business of taking our clients to the next level of voice and data solutions, and transforming network products, services, and support into tangible, tailored, and seamless business-critical solutions.

Find out more at: http://www.voxns.com or @voxns

Data Backup - Can you continue to ignore it?

Data Backup. The 400lb gorilla in your IT strategy that nobody wants to talk about. Data backup is one of the single most critical aspects of any IT strategy and it is often overlooked, ignored, misunderstood and mismanaged. Perhaps most businesses don't pay attention to it because it isn't something we use on a daily basis. When the e-mail goes down or when we can't access a critical application we notice immediately, but backing that data up is something a lot of people just assume is being done properly. Sadly, we see businesses every week that have major backup and recovery problems. The hidden costs for managing a tape or hard disk based backup solution are unbelievably high. Backup is critical and it is not an overstatement to say that a successfully recovered backup could save your business.

What you need to know about your data backup and recovery strategy

  • It’s not about the Backup. It’s about the RECOVERY - You can backup every spec of information on your computer but if you can't recover it then you may as well have not backed it up in the first place. Regular testing of your backups to recover files is critical. We suggest testing miscellaneous files every 30 days and full server/system recoveries twice a year (you are doing full server backups right?)
  • Affordability - The IT world is growing and evolving quicker than any other industry. New technologies are constantly coming out that may lower operational costs or open up formerly cost prohibitive techniques. We suggest an annual review of your IT strategy as a whole, including your backup and recovery process.
  • Lose the Tape Drives - If ever there was an outdated technology that deserves to be put out to pasture it's tape drives. We see 3-4 times the number of problems with tape based backups as compared to alternative solutions and consequently, a much higher cost to maintain a tape based system. The tapes themselves have a relatively short shelf life (6-12 months) and are affected by environmental conditions like heat, humidity and magnetic interference.
  • Local as well as remote backup - The best backup and recovery strategies include the use of local backup for quick, easy recovery as well as offsite or remote backup in the event of a catastrophe. Offsite and secure copies of your data should be readily accessible in the event of a disaster situation or in the event a critical server failure.
  • Are you backing up everything you need and is it recoverable - Too often we are called to restore data only to find out that it is not recoverable because backup procedures were not followed; often because of lack of training or expertise. This is especially prevalent with SQL (and other) data base products as well as Exchange and other email systems. These systems typically require specialized backup procedures in order to ensure complete backup and recoverability of data.
  • What if a server goes down - For some of us, each hour of down time comes at a high cost. In some backup plans, even in the best of circumstances, the company can expect a day or more down with the solutions they have in place. Technologies such as server virtualization can often be used to get your systems back up and running in a few hours or less, as opposed to a day or more. Some companies even feel the need to implement a spare server on site.
  • Data Retention and Archiving - How long are you retaining your data for and how many copies of that data? We've seen some companies that implement a backup solution that simply overwrites the previous backup but what if you need an older copy of a file? Proper solutions should maintain numerous instances of your data and allow you to select which specific instance of a file or files you would like to restore. Additionally, many businesses require archiving of older data as well. Certain businesses may be required to retrieve data that is 10 or more years old. Understanding the rules and regulations that may affect your data retention policies is critical.
  • Is once a day enough - Many businesses follow a very traditional procedure of "nightly backups". For some businesses this may be perfectly acceptable but what happens in the event of a power outage or a failed backup? Is a full day's worth of data loss going to affect your business? Many new technologies can allow for files to be backed up within minutes of changes taking place to them, assuring your business of up to the minute data backup.
  • Backed up data needs to be secure (encrypted) - Maybe your business is regulated by various government policies that mandate your data be secure and encrypted or perhaps you're simply concerned that the private information on your system be kept private (and you should be!). In the event of a lost or stolen tape or drive, it is imperative that the information on that medium stays safe and secure, especially if your backup data contains information which is considered protected (i.e., name and social security number or patient health information
  • Write it down - Any process or procedure is only as good as the paper it is written on. Your backup and recovery policy needs to be clearly documented included a list of who is responsible for everything from backing the data up, monitoring the backup to ensure that it is taking place and testing the recovery process on a regularly scheduled basis.

If all of this sounds like a lot of information, it is. The fact of the matter is that implementing a proper backup strategy requires planning, expertise, monitoring and testing. If you are unable or unwilling to commit the resources to do it properly then consider having someone do it for you. Most Managed Service Providers (MSP's) can handle the entire process including providing offsite storage, encryption and more. Typically the monthly cost for this type of service are probably less than you would pay an employee to handle all of these tasks and you have the peace of mind of knowing that the procedures are being performed by trained experts. Most MSPs can provide weekly and monthly reports and reviews that document their monitoring, backup and recovery tests performed.

If you would like to know more about data backup procedures and Managed services in general give us a call at 888.748.BLUE (2583) or visit us at www.shopblueline.com.







Patch Management - Who's Minding Your Network?

A patch is a piece of software designed to fix problems with, or update a computer program, operating system or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the overall usability and performance. Though meant to fix problems, poorly designed or improperly managed patches can sometimes introduce new problems.

Patch management is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. The key works here are Process, Strategy and Plan. Without all of these in place you aren't performing patch management, you are simply installing (or not installing) patches without knowing what effect they will have on your network. A typical patch management strategy should look like this:

  • Detect. Use tools to scan your systems for missing security patches. The detection should be automated and will trigger the patch management process.
  • Assess. If necessary updates are not installed, determine the severity of the issue(s) addressed by the patch and the mitigating factors that may influence your decision. By balancing the severity of the issue and mitigating factors, you can determine if the vulnerabilities are a threat to your current environment.
  • Acquire. If the vulnerability is not addressed by the security measures already in place, download the patch for testing.
  • Test. Install the patch on a test system to verify the ramifications of the update against your production configuration.
  • Deploy. Deploy the patch to production computers. Make sure your applications are not affected. Employ your rollback or backup restore plan if needed.
  • Maintain. Subscribe to notifications that alert you to vulnerabilities as they are reported. Begin the patch management process again.

Unfortunately most businesses and even many IT Service Providers have no formal process for patch management.

A critical step in our process when we evaluate a company's IT infrastructure is a complete Network Assessment. One of the things we look at during this assessment is how the patches are being managed. The two most common methods we see are "download and install automatically" and "do not download or install patches and updates." Sometimes it is hard to determine which of the two methods is worse! 

Potential clients will often tell us they don't download the updates/patches because "everything worked fine when the server/workstations were setup so we don't want any changes". New bugs, threats and vulnerabilities are discovered everyday and applying patches and updates to protect against these is critical. Ignoring them and allowing your system to go unpatched is a recipe for disaster. We also have potential clients that simply allow updates to be installed at random, as they are made available. Doing this on a live system can often result in problems when patches do not install properly or worse, when a patch or update is not compatible with an application that you may be running or when servers reboot overnight during an update and fail to come back online in the morning.

Patch management is one of the most critical and most overlooked and misunderstood aspects of maintaining a stable network environment. Most Managed Service providers offer a basic patch management program as a stand alone option (as well as bundled with more complete services) that is very affordable. When properly performed, patch management will provide you with a safe, secure and stable network environment. We encourage all of our clients and potential clients to periodically evaluate their patch management process and make changes where they are needed.