Why Telecom Professionals Choose Xorcom IP-PBX Systems

Paul Concannon, Telecoms Engineer, Odyssey Systems

Paul Concannon, Telecoms Engineer, Odyssey Systems

The professionalism of Xorcom partners is a big part of our success, as evidenced by the glowing testimonial below about one of Xorcom’s veteran master distributors:

I have worked with David [Duffett – of Telespeak] many times over the last few years, resolving Integration queries using the Xorcom Asterisk IP-PBX for our Network. They have proven to be a great asset both in reliability (essential for an enterprise system) and the fact that the systems are totally flexible in their configuration for the required solution. David is an absolute marvel. His knowledge of Asterisk is vast and every query is resolved quickly and professionally, not just a theoretical but a hands on practical approach, which is easy to follow.

The quality of support and speed of response to queries is second to none and I would wholeheartedly recommend David and TeleSpeak when looking for a flexible and adaptive Telecom solution.

If you have something to say about our products or our partners please let us hear it (for better, or for worse!). Listening to our customers and partners keeps us focused and motivated!

Is Your IP-PBX Damaging Your Firm’s Reputation?

When a new IP-PBX was installed a few years ago at Stewart’s Auto Sales (SAS) in Kingston, Jamaica, a number of usability and voice quality issues arose. The Company management realized that these problems were having a negative impact on productivity, were frustrating SAS operators, and were harming SAS’ hard-earned reputation for first-class customer service. After reviewing its options for an alternative system they chose Xorcom.

Want to learn more? Read the full story here.

Open Source IP-PBX and Proprietary Systems: Factors to Consider When Choosing Your Telephony Solution

3d man thinking and junction

How to choose which type of PBX is right for your business?

Before deciding on which specific phone system will best meet your company’s needs, you need to decide which type of platform is right for you. This involves looking at the pros and cons of the two options to be considered: Proprietary systems and those based on an open source platform.

Read our “Open source IP-PBX vs Proprietary Systems” white paper, where we cover such issues as:

  • What are “proprietary systems”?
  • What is “open source software”?
  • A point-by-point comparison between proprietary and open source systems

Download the white paper here.


Dangerous Demo at AstriCon 2015

In the video below you’ll see that we accepted James Body’s challenge to submit our project (inspired by our French partners at IP Connect) at the annual “Dangerous Demos” competition at AstriCon:

Thanks, as always, goes to David Duffett for his cooperation and fine acting skills. But don’t lose sight of the main message here — Xorcom IP-PBX offer a lot more than just the opportunity to cut telephone costs in your organization.

To learn more about utilizing the relay ports on Xorcom’s products, check out our Application Notes.

The Importance of VoIP and Unified Communications

Ruth Bridger, the VP of Marketing at Xorcom, was a recent guest on the TechnologyAdvice Expert Interview Series. The series, which is hosted by TechnologyAdvice’s Josh Bland, explores a variety of business and technology landscapes through conversations with industry leaders.

In this episode we discuss security against cyber attacks on the IP-PBX, hospitality for VoIP, as well as ITEXPO.

Below are the three biggest takeaways from the conversation.

  1. Security and convenience are top-of-mind in unified communications.
Toll fraud and other security breaches are a major concern to VoIP customers, but are well handled with Xorcom's systems.

Toll fraud and other security breaches are a major concern to VoIP customers, but are well handled with Xorcom’s systems.

Security is big just because you can incur so much loss if your IP-PBX is not protected. But I don’t like to only talk about the negative side of VoIP communications. On the positive side, systems are getting more and more sophisticated, and this is great.

On the subject of unified communications, you have Wi-Fi, you have smartphones that you can set up as extensions in your phone system, so that you can get the best use out of any communications device by connecting it to one system, even remotely. You’ll have access to all of your contacts. You’ll be able to make and receive phone calls at the preferred rates that you get from your system by going over the Internet when possible.

The move towards convenience, towards integration of all the ways that you want to communicate in one specific system, no matter where you are, it’s just a great headache reliever. And for employees, the actual users —  it’s so cool.

  1. What’s important in a communication system can vary from industry to industry, but the flexibility of new technology helps address these needs quickly.

What business can exist without a phone system? It just can’t be – your customers and employees count on being able to communicate with each other by phone, even during off-hours (by leaving voicemail). If you’re a travel agency, you have very specific concerns that relate to the way you do business. If you’re a hotel, or a bank, or a school district you’ve got a different list of criteria. What’s important for you in your phone system varies from industry to industry.

Now, what’s interesting is that when you have something like a VoIP system, and it has unified communications, it can address the concerns of each and every industry.

But again, it’s a question of, “What do I activate on my system? Do I need the smartphone integration, or is that something that I want to block?” It’s just pure flexibility. It’s the same system, but when you implement it at a customer site, you choose which features you want to activate. This is one of the most obvious benefits of Voice over IP. The Xorcom system takes this flexibility one step further — there are no per-user license fees. So you can have this endless functionality without incurring additional costs. You can setup unlimited Interactive Voice Response and you can have unlimited numbers of extensions of queues and call routes that you set up in the system.

  1. ITEXPO is the place to be.
Come visit Xorcom at ITEXPO in Anaheim, Oct. 6-8.

Click the image for a free Expo-only pass

We are veterans of ITEXPO. Xorcom has been a supporter and an exhibitor at these events for a long time. It is so valuable to have face time with everyone in our field. Not only do you find potential customers, but your partners and existing customers come by the booth and chat and find out what’s going on in the industry. They always have great keynote speakers.

Since we sell through a worldwide channel of master distributors and re-sellers we’re always looking for additional partners to promote our products in their local regions. This year ITEXPO is co-located with the ChannelVision Expo. So for us, that’s a great resource we want to tap into. We want to see if there are any channel partners that would like to hook up with us and promote Xorcom in their areas.

This podcast was created and published by TechnologyAdvice. Interview conducted by Josh Bland.

Evite el Riesgo – El CompletePBX es su Mejor Defensa Contra Ataques Cibernéticos

Ataque Cibernético — usuarios maliciosos que logran un acceso no autorizado a sistemas basados en Internet — no es un fenómeno nuevo. Sin embargo, se está incrementando a un ritmo tan rápido, sobre todo en el mundo de la Telefonía en Internet (VoIP y troncalización SIP), que no puede ser ignorado. Revise estas publicaciones recientes que detallan una realidad perturbadora que deben enfrentar hoy las empresas.

Qué puede hacer Ud. para evitar un Ataque Cibernético a su Sistema de Telefonía?

El sistema telefónico corporativo CompletePBX™ de Xorcom con su máxima seguridad, puede mantener segura a su red de comunicaciones frente a todas los tipos de ataques cibernéticos. Creemos que la mejor política de protección al PBX IP es la que se pone en práctica desde el primer día. Como resultado, CompletePBX viene pre-configurado con múltiples salvaguardias contra abusos en cuatro diferentes niveles:

  1. Camuflaje – Nuestros sistemas CompletePBX se mimetizan para evitar la atención de factores maliciosos que saben cómo identificar los sistemas de VoIP en la Internet.
  2. Vigilancia – Nuestra característica de detección de intrusiones está constantemente en alerta, reconociendo las amenazas potenciales y desviándolas antes de que lleguen al PBX.
  3. Defensa – Si alguna entidad no autorizada intenta ingresar al PBX, nuestro software integrado de control de sesiones de borde de red (session border controller), la bloqueará antes de que pueda causar cualquier daño.
  4. Alerta –Cualquier ataque en curso genera un e-mail inmediato al administrador del sistema.


CompletePBX Opera en Modo Oculto

Mediante el uso de métodos de identificación no estándares, los sistemas CompletePBX están verdaderamente camuflados en Internet, reduciendo significativamente la probabilidad de ataques cibernéticos.

Configuraciones Seguras de VoIP

De forma predeterminada, el CompletePBX denegará las solicitudes SIP no deseadas sin revelar el motivo del rechazo. De esa forma, dificulta enormemente la posibilidad de que atacantes de fuerza bruta adivinen el nombre y contraseña SIP del usuario.


Detección y Prevención de Intrusos

El CompletePBX posee funciones integradas de detección de intentos de acceso no autorizados al sistema, en base a una configuración de permisos establecidos por el administrador del PBX. Una intrusión potencial es un número de intentos de acceder sin éxito al sistema durante un plazo determinado de tiempo, según lo definido por el usuario.

Después de detectarse una posible infiltración, la dirección IP del intruso será bloqueada para cualquier  acceso posterior al sistema por el período definido de prohibición, y una alerta será enviada al correo electrónico del administrador.


CompleteSBC™: Aplicación Integrada Controlador de Sesiones de Borde de Red (SBC)

Operadores y usarios por igual apreciarán la capacidad de CompleteSBC, un Controlador de Sesiones de Borde de Red (SBC) basado en software  que sella efectivamente el PBX-IP, para proteger y defender el CompletePBX de un uso indebido.

Un sofisticado conjunto de reglas predefinidas, pero personalizables, con el soporte de una interfaz de administración intuitiva (GUI), permite una fácil configuración de sus múltiples funciones. El CompleteSBC actúa como un “firewall SIP” para control de acceso.

Una versión de prueba del CompleteSBC, que permite múltiples sesiones con duración limitada de la llamada, está integrada en todos los sistemas CompletePBX. La compra de  licencias electrónicas activará canales de comunicación sin límite máximo de duración en las llamadas.

Firewall Integrado

El punto en el que un sistema se abre para que pueda ser administrado de forma remota es casi siempre el momento en que la seguridad se ve comprometida. Nuestra recomendación es bloquear el sistema del mundo exterior, instalando el CompletePBX en una LAN protegida por un firewall/enrutador NAT. Como un medio adicional de protección, CompletePBX cuenta con su propio firewall. Las reglas predeterminadas en el firewall integrado pueden ser modificadas para adaptarse a aplicaciones específicas y relevantes para sus actividades.

La Configuración Inicial está Bloqueada por Defecto

El CompletePBX está pre configurado para utilizar políticas restrictivas de seguridad. Por ejemplo, en la configuración predeterminada el CompletePBX no acepta llamadas SIP de terminales que no estén ubicados en la LAN. Los clientes que deseen que el PBX pueda recibir llamadas entrantes desde Internet deben explícitamente habilitar este funcionamiento en la configuración del CompleteSBC/Firewall.

Evaluación de Seguridad de la Contraseña

La configuración de contraseñas seguras es imperativa para las extensiones SIP e IAX2, así como para las funciones de Acceso Directo al Sistema Interno (Direct Inward System Access – DISA) y de Call Back. Además, la definición de contraseñas para todas las rutas de salida utilizadas para llamadas internacionales detiene significativamente a los intrusos que intentan realizar llamadas fraudulentas. En el CompletePBX, un algoritmo especial detecta contraseñas problemáticas potenciales y emite una advertencia al administrador.

Acceso Remoto Seguro a través de Rapid Tunneling™

El permiso de acceso remoto a los usuarios autorizados, como administradores del sistema o el personal de apoyo técnico trabajando a distancia, es un desafío superado mediante la función Rapid Tunneling de Xorcom. El túnel de acceso seguro (SSH) es utilizado para acceder a la interfaz Web CompletePBX de forma segura y controlada.

Protección para rotación de personal de nivel de administradores del sistema

El CompletePBX cuenta con diferentes niveles de acceso definidos por el usuario; las cuentas del administrador pueden tener su acceso restringido a un rango específico de extensiones o un conjunto específico de características en el PBX. Mediante la creación de distintos usarios de administración del sistema CompletePBX, los cambios de personal requieren simplemente la remoción de la cuenta específica para asegurarse de que ya no tiene acceso.


CompleteAlert™: Sistema Integrado de Alarma en Tiempo Real

Una actividad no autorizada en el sistema telefónico genera inmediatamente alertas en tiempo real, en forma de mensajes de correo electrónico al administrador del sistema.





No asuma riesgos costosos.

El CompletePBX ofrece la mejor protección contra ataques cibernéticos en la industria.

Contacte a Xorcom para una consulta sobre seguridad (sin cargo).

¡Elegir el PBX-IP incorrecto puede costarle $$$$$ en fraude telefónico… desde el primer día!


Sepa Cómo  Evitar el Riesgo de un Ataque Cibernético


Un número creciente de empresas está aprendiendo a valorar las ventajas de las comunicaciones VoIP: reducción considerable de gastos en llamadas de larga distancia, comunicaciones unificadas, el uso óptimo de los recursos de la red… y la lista sigue y sigue. Por otro lado, los hackers se están volviendo cada vez más sofisticados, convirtiendo el fraude telefónico en una industria multimillonaria. Ese mismo estudio, en el cual se entrevistó a expertos en fraude y seguridad especializados en la industria de telecomunicaciones, indica que las pérdidas por fraude están creciendo a un ritmo más rápido que los ingresos globales de telecomunicaciones.*

¿Quién es Responsable de proteger los Sistemas Telefónicos?

Informes sobre ataques cibernéticos aparecen regularmente en los medios de comunicación. Por ejemplo, según se informa en un reciente artículo del New York Times, una firma de arquitectura de Georgia es ahora responsable por llamadas de alto costo realizadas de forma fraudulenta por la suma de $166,000 en un solo fin de semana.. El bufete de abogados de la empresa presentó una denuncia ante la Comisión Federal de Comunicaciones (FCC) de los Estados Unidos, pero el abogado del caso señaló que “hay una serie de decisiones antiguas de la FCC de los años que datan de la de 1990, que indican que un cliente es 100% responsable por llamadas fraudulentas en su PBX “.

Sin embargo, el fraude afecta también de forma negativa a las operadoras de telecomunicaciones, así como a sus clientes. Las pérdidas aumentan los costos de operación de los carriers de comunicación ‘y perjudican su reputación. Varios países ya tienen nuevos requisitos regulatorios en vigencia, que adjudican una responsabilidad, al menos parcial, del fraude telefónico, a las operadoras de telecomunicaciones.

Contactado para investigar una violación reciente a un servicio de PBX hospedado, Leonid Fainshtein CTO de Xorcom confirmó que el ataque ocurrió cuando un hacker entró en la puerta trasera de un portal, erróneamente dejada el operador del servicio. La noticia llegó al cliente sólo cuando recibió su factura mensual, con un costo ochenta veces mayor que el habitual. De acuerdo con el Director General, el principal prestador de servicios no sólo había olvidado de notificar al usuario que había ocurrido algo extraño en su sistema, sino que también transfirió la responsabilidad a una sub-operadora, y aún no está claro de quién es la responsabilidad de mantener la seguridad de la red de la empresa.

¿Cómo se puede evitar el pago de 80 veces su factura normal de teléfonodebido a un fraude telefónico?

Primero, es importante entender qué tipo de abuso es predominante en la actualidad. El fraude telefónico se produce al infiltrarse a un PBX-IP y utilizándolo para realizar llamadas salientes que son vendidas como minutos a otros clientes – con la empresa dueña del PBX IP pagando la cuenta (como en los casos citados anteriormente). Otro abuso implica en penetrar en el PBX-IP para obtener información acerca de la red, con el objetivo de hackear la red de datos de la empresa con propósitos de espionaje u otros tipos de daños industriales. Pocas horas de acceso no autorizado pueden costar fácilmente a su empresa muchas veces más que el precio de todo el sistema de telefonía.

El sistema corporativo de telefonía  CompletePBX™ de Xorcom, de máxima seguridad, puede mantener su red de comunicaciones segura contra todos estos tipos de ataques cibernéticos. 

Para obtener más información, haga clic aquí.


Branching into 21st Century Telephony | Talk Business Magazine

Contemporary telephone systems play a far more crucial and creative role in businesses than previously thanks to advances in technology and the impact of t

Source: Branching into 21st Century Telephony | Talk Business Magazine

Choosing the Wrong IP-PBX Can Cost You $$$$$ in Toll Fraud


Learn How to Avoid the Risk of Cyber-Attack

toll-fraud-perpetratorIncreasing numbers of enterprises are learning to appreciate the advantages of VoIP communications: greatly reduced long distance charges, unified communications, optimal use of network resources…the list goes on and on. On the other hand, hackers are becoming ever more sophisticated, turning toll fraud into a multi-billion dollar a year industry. That same study, which interviewed fraud and security experts focused on the telecom industry, reports that fraud losses are growing at a faster pace than global telecom revenues.*

Who is Responsible for Securing Telephone Systems?

Reports of cyber-attack show up in the media on a regular basis.  For example, as reported in a recent New York Times article, an architecture firm in Georgia is now answerable for $166,000 in calls made in a single weekend after a premium-rate service-fraud attack. The company’s law firm filed a complaint with the United States Federal Communications Commission (FCC) but the lawyer on the case noted “There are a number of ancient FCC decisions dating back to the early 1990s that say that if a customer has fraudulent calls, the customer is 100 percent liable.”

However, fraud negatively affects telco carriers as well as their customers. The losses increase the communications carriers’ operating costs and damage their reputation. Several countries already have new regulatory requirements in place which put at least partial responsibility for toll fraud on the telco carrier.

Called to investigate a recent breach to a hosted PBX service, Xorcom CTO Leonid Fainshtein confirmed the attack occurred when a hacker entered a portal back-door, erroneously left open by the company’s telecommunications carrier. The news reached the company only when they received their monthly invoice, with charges of over eighty times their usual bill. According to the CEO, their main service provider had not only neglected to notify the company of strange goings-on with their system, but they also passed the buck onto a subcarrier, and it is still unclear onto whom the responsibility falls to keep the company’s network safe.

How can you avoid paying 80 times your regular phone bill in toll fraud?

First, it is important to understand what kind of abuse is prevalent in today’s world. Toll fraud occurs by gaining access to the IP-PBX and utilizing it for outbound calls sold as minutes to customers—with the enterprise footing the bill (as in the cases cited above). Other abuse involves penetrating the IP-PBX to learn more about the network, with the aim of hacking into the enterprise’s data network for the purpose of espionage or other types of industrial damage. A few hours of unauthorized access can easily cost your company more than the price of the entire phone system – many times over.

Xorcom’s CompletePBX™ maximum-security business telephony system can keep your communications network safe against all these types of cyber-attack. For more information, click here.


Avoid the Risk – CompletePBX is Your Best Defense Against Cyber-Attacks

Cyber-attack — malicious users gaining unauthorized access to Internet-based systems — is not a new phenomenon. However, the rate that it is spreading, especially to the world of Internet Telephony (VoIP and SIP trunking), cannot be ignored. Check out this recent post which details some of the disturbing facts that face enterprises today.

What Can You Do to Avoid the Risk of Cyber-Attack on Your Phone System?

Xorcom’s CompletePBX™ maximum-security business telephony system can keep your communications network safe against all these types of cyber-attack. We believe that the best IP-PBX protection policy is the one in place from day one. As a result, CompletePBX comes preconfigured with multiple safeguards against abuse on four different levels:

  1. Camouflage – Our CompletePBX systems disguise themselves to avoid the attention of malicious users who know how to identify VoIP systems on the Internet.
  2. Vigilance – Our intrusion detection feature is constantly on the watch, recognizing potential threats and diverting them before they reach the PBX.
  3. Defense – If any unauthorized entity does manage to get to the PBX, our integrated session border controller software will block it before it can do any damage.
  4. Alert –Any attack in progress generates an immediate e-mail message directly to your system administrator.


CompletePBX Operates in Stealth Mode

camouflageBy using non-standard identification methods, CompletePBX systems are essentially camouflaged on the Internet, significantly reducing the probability of cyber-attacks.

Secure SIP Settings

By default, CompletePBX will reject unwanted SIP requests without disclosing the reason for rejection. This greatly hampers brute-force attackers from guessing the SIP username and passwords.


Intrusion Detection and Prevention

vigilanceCompletePBX features built-in detection of unauthorized attempts to access the system based on permission parameters set up by the system administrator. A potential intrusion is defined as a user-defined number of unsuccessful attempts to access the system within a specific timeframe.

After a potential intruder has been detected, the intruder’s IP address will be blocked from further access to the system for the defined ban period, and an email alert will be sent to the administrator.


CompleteSBC™: Integrated Session Border Controller (SBC) Application

defenseCarriers and customers alike will appreciate the ability of CompleteSBC, a software-based Session Border Controller (SBC) that effectively seals off the IP-PBX, to protect and defend the CompletePBX IP-PBX from misuse.

A sophisticated set of predefined yet customizable rules, supported by an intuitive GUI interface, enables easy configuration of its many features. CompleteSBC acts as a “SIP firewall” for access control.

A trial version of the CompleteSBC, supporting multiple calls with limited call duration, is integrated into every CompletePBX system. Purchasing an electronic license will activate additional channels, and remove the call duration limitation.

Built-In Firewall

The point at which a system is opened up so it can be remotely administered is almost always the point of compromise in an intrusion. Our recommendation (and the system’s default configuration) is to lock down the system from the outside world, installing CompletePBX on a LAN protected by a firewall/NAT router. As an additional means of protection, CompletePBX features its own built-in firewall. The default rules in the built-in firewall can be modified to accommodate specific applications relevant to your business.

Initial Configuration Is Locked by Default

CompletePBX is preconfigured to use restrictive security policies. For example, in the default configuration CompletePBX does not accept SIP calls from endpoints not located on the LAN. Customers who want the PBX to be able to receive inbound calls from Internet sources must explicitly enable this behavior in the CompleteSBC/firewall configuration.

Password Strength Assessment

Setting strong passwords is imperative for SIP and IAX2 extensions, as well as for Direct Inward System Access (DISA) and call-back functions. In addition, defining passwords for all outbound routes used for international calls significantly deters intruders from making malicious calls. In CompletePBX, a special algorithm detects potentially problematic passwords and issues a warning to the administrator.

Secure Remote Access via Rapid Tunneling™

Allowing remote access to authorized users such as system administrators or technical support staff working offsite is a challenge met via Xorcom’s Rapid Tunneling feature. Secure Shell (SSH) tunneling is used to access the CompletePBX Web interface in a secure and controlled fashion.

Administrator Accounts for Employee Turnover Protection

CompletePBX features different levels of user-configurable administrator access; administrator accounts can have their access restricted to a specific extension range or a specific set of features in the PBX. By creating separate administrator accounts for all CompletePBX system administrators, staffing changes simply require user account removal to ensure they no longer have access.


CompleteAlert™: Built-in Real-Time Alarm System

alertUnauthorized activity on the phone system immediately generates real-time alerts, in the form of e-mail messages sent directly to the system administrator.

Don’t take the costly risk.

CompletePBX provides the best protection against cyber-attacks in the industry.

Contact Xorcom for a free security consultation: