TEM Matters: The MTS Blog

5 Steps - How to Avoid Wireless Cramming

Posted by John Venditti on Jul 8, 2014 2:30:00 AM

Here we go again. It seems every few months we hear about wireless vendors charging users or enterprises for services they either didn't order, didn't know about or thought they had canceled but still kept being billed. You might know this as "cramming" but in the TEM world we call this "easily avoidable".

Read More

Topics: wireless, WEM, invoice management, telecom audit, invoice audit

Do You Have a Call Accounting Solution for Microsoft Lync?

Posted by John Venditti on Jul 6, 2014 8:11:00 PM

Do you have a Call Accounting solution for Microsoft Lync? As a TEM/EMM and Call Accounting solution provider, we get several of these inquiries every week. Companies that have or are planning to deploy microsoft Lync as part of their overall unified communications strategy are looking for a call accounting solution that can handle Lync. Its not just the SMB market either; we're seeing large enterprises adopting Microsoft Lync. Even our partners are seeing a large increase in Microsoft Lync deployments among their customer base and from what we can tell it shows no signs of slowing.

Read More

Topics: call accounting, microsoft lync, unified communication

MTS Selected as a 2014 MVNOs World Congress Best MVNE Award Finalist

Posted by John Venditti on Mar 29, 2014 5:52:00 PM

The MVNO World Congress is hosting the 2014 MVNO Industry Awards and MTS’s MVNE Solution for MVNOs made the shortlist of finalists for the 2014 Best MVNE Award.

Read More

Topics: MVNE, MVNO

TEM Suite Receives 2014 INTERNET TELEPHONY Product of the Year Award

Posted by John Venditti on Feb 13, 2014 5:35:00 PM

Read More

Topics: TEM, EMM

How to Find Immediate Telecom Savings

Posted by John Venditti on Jul 16, 2013 9:44:00 PM

  ... And Long-Term Telecom Cost Reduction


As a telecom expense and enterprise mobility management company, our job is to help companies manage and maximize the ROI on their telecom investments. One of the ways we do that is to find ways to reduce costs and now that we're at the midpoint of most corporate budgets, the question that always comes up is "How do I find some immediate savings and telecom cost reduction this fiscal year?"

There are a lot of different answers to this question, but in general, one of the fastest, and sometimes easiest, ways to find immediate savings that have an immediate budget impact is through a TEM Billing Audit

Read More

Topics: TEM, invoice management, invoice audit, historical telecom billing audit

Why You Need a Wireless Help Desk

Posted by John Venditti on Oct 18, 2012 10:03:00 AM

There’s little doubt that the prevalence of mobile marketing is in direct proportion to the sheer number of mobile devices in the business world today; it has completely shifted the way enterprises interact with the consumer, their trade partners and their employees. Because popular application program interfaces (APIs) use mobile device apps as their preferred mode of communication, this has unleashed a sort of mobile revolution that has extended to fields as disparate as healthcare and plastics manufacturing.

Mobile devices offer your business ways to connect with customers, partners and employees more closely and with greater variety than ever before; and, as you would expect, this kind of vigorous liaison increases security risks – sometimes drastically if you lack a mobile device management plan that stresses compliance from your employees.

More directly, mobile devices have a general tendency to decrease your business’ wireless device security because of all the additional access points they provide when they log on to company servers or third party systems. In addition, employees, customers and partners can download any app from and app store that could contain malware that violates your security protocols or creates other security issues. Because of the exploitative nature of malicious programs, you can see how undesirable all these remote, unsupervised access points would be in a healthcare environment concerned with legally-protected patient information. Subpar wireless device security can expose you to lawsuits and professional embarrassment; in fact, any enterprise with a BYOD (Bring Your Own Device) policy can suffer from not having such precautions as a robustly enforced mobile GRC policy in place.

The core problem facing companies caught in the tide of the mobile revolution is the reality of increased access to sensitive data or systems and the ability to download third party software that is not approved by the enterprise. With more Smartphones and Tablets in your office, it becomes simply a numbers-game of when an attack will happen – not if. Identity theft has always been a rampant problem; but never more so than in this age of mobile devices. You can erect a strict policy of password protection and personal ID numbers for your employees; to better identify when and where any problem devices took place.

An even more robust solution – which should actually be done in tandem with the security measures taken above – is investing in a wireless help desk. This is no different than outsourcing any of your other IT concerns to subject matter experts whose direct experience usually supersedes even your most technically capable in-house personnel.

More importantly; a wireless help desk saves you labor costs, despite being more capable. To have your mobile device management centralized frees up you to focus on your core business, without using valuable internal resources troubleshooting security breaches. With the current economic quagmire; merely having a mobile GRC policy in place is only be the first step on your way to the kind of full mobile device management and wireless device security that a capable wireless help desk can provide.

Read More

Topics: WEM, mobile, wireless policy, mobile device security, mdm

MDM Crucial for Minimizing Security Risks for Enterprise Tablets

Posted by John Venditti on Aug 22, 2012 4:28:00 PM

Thanks to the growing proliferation of tablets, smartphones and other mobile devices in critical enterprise environments, maintaining a secure environment for sensitive corporate data has become one of the most pressing challenges for an IT / telecom team to tackle. While tablets are a convenient way for employees to access corporate e-mail, corporate networks and corporate data while on the road, they also pose several security risks:

Read More

Topics: WEM, mobile device security, mdm, mam

Why Perform Historical Telecom Billing Audits?

Posted by John Venditti on Jul 11, 2012 10:12:00 PM

The primary reason a company would want to have an historical telecom billing audit performed is because it’s a great way for a company to lower their telecom costs without having to allocate any budget dollars to fund the audit. Since most audits are performed on a contingency basis, the project fees are a percentage of the savings recovered and costs avoided.  It’s a no risk, high return project where the savings recovered can actually be used to fund other cost savings projects or to avoid potential budget cuts.

Read More

Topics: telecom expense management, TEM, invoice management, telecom audit, historical telecom billing audit

MTS in Orlando at the AOTMP 2012 show from February 13 - 16

Posted by John Venditti on Feb 12, 2012 10:42:00 AM

Visit MTS at the AOTMP 2012 Fixed & Mobile Telecom Management Conference at the Orlando Airport Marriott, Orlando, FL. from February 13-16, 2012. MTS will be located at booth #15 where we will highlight our award winning TEM Suite Telecom Expense Management and Wireless Mobility Management solution. We will also be sponsoring the Wednesday poolside lunch where the weather is suppose to be sunny and in the high seventies.

Read More

Topics: TEM, WEM

Bring Your Own Device (BYOD) Programs and Enterprise Security Risks

Posted by John Venditti on Feb 9, 2012 7:26:00 AM

Lessening the cost of mobile devices and providing flexibility for employees, Bring-Your-Own-Device (BYOD) programs have been shown to work for many enterprises. The concern with these programs is that these employee furnished devices can require additional wireless help desk support and more robust mobile security policies.

Read More

Topics: WEM, mobility, wireless policy, mobile device security, mdm

Follow MTS

Subscribe to Email Updates