• Blog



Bicom Systems invites Service Providers to join the UCaaS market at special lunch event this fall

Written by admin on . Posted in Press Releases

Bicom Systems invites Service Providers to join the UCaaS market at special lunch event this fall

TelcoFest will bring Bicom Systems through 15 cities across the U.S. in September and October with lunch presentations on how to join the Cloud and UC markets.

HOLLYWOOD, FL – 29 August 2017

Bicom Systems is inviting business owners and senior commercial decision makers from Telecommunications and IT firms to attend special lunch events in 15 cities across the country. At the events, Bicom Systems will present the newest Cloud UC technologies, services, and strategies to build or grow an ITSP. Learn more or register for the events.

According to data from Stephen Corrigan, the event presenter, the UCaaS market is projected to grow in North America at a compound annual growth rate (CAGR) of between 25 to 30 percent until 2020 with a total user base growing from 11.6M (2016) to over 27M by 2020.

Bicom Systems, with over 15 years of delivering success, seeks to lower the barriers of entry to the UCaaS and Cloud markets by equipping partners with all of the pieces needed to start and grow a business.

Stephen Wingfield of Bicom Systems extends his invitation to the events, saying “Join us for lunch, it’s on us, and we’ll share our insider information on the latest UC and cloud technologies. Let’s talk about how to build your business and your brand – your way.” He adds that lunch attendees will have access to a special deal on a Cloud UC Solution Package.

Find an event near you and register.

About Bicom Systems

Bicom Systems is the world’s first and most mature Professional Open Standards Turnkey Telephony Platform. Since 2003, Bicom Systems has deployed flexible, reliable, and scalable New Generation Communication Systems to SMBs, enterprises, and governments worldwide by unifying the most advanced of latest technologies. For more information, please visit our website or contact us today.


Bicom Systems Releases VMware PBX Image

Written by Laura Espinosa on . Posted in Press Releases

vmware pbx

MIAMI, FL – FEBRUARY 3, 2017 – Bicom Systems recently released a VMware PBX image on the VMware Solution Exchange, making it possible to test PBXware on a VM workstation.

PBXware is a turnkey IP-PBX communications platform with unmatched scalability, flexibility, and reliability. Already available in a CD and USB version, Bicom Systems added the VMware option for advanced testing. Dedicated Bicom Systems developers created the image and tested it extensively before submitting to the VMware Solution Exchange. It was approved in less than a day. The downloaded image can be used with a VMware Workstation or VMware Player PRO and Vsphere client.

Learn more about how the VMware PBX Image was created or download it now.

About Bicom Systems

Bicom Systems is the world’s first and most mature Professional Open Standards Turnkey Telephony Platform. Since 2003, Bicom Systems has deployed flexible, reliable, and scalable New Generation Communication Systems to SMBs, enterprises, and governments worldwide by unifying the most advanced of latest technologies. For more information, please visit our website or contact us today.

obama communication

Was Obama’s last Call with PBXware?

Written by Stephen Wingfield on . Posted in Press Releases


Headline News! Washington D.C. (11 January 2017) – The true status of recent electoral polls suggested a failure in the accuracy of information routing.

Why remains of mystery, though some speculate that dropped packets on inferior phone systems are the culprit.

We recently obtained some evidence from what appears to be Bicom Systems investigating the White House’s telephone system followed by arms crossed and lips tight.

Nobody knows!

At this point, not Bicom Systems, Donald J. Trump nor the White House would comment…..perhaps their phone lines are down as well or maybe they’re just waxing lyrical?

We tried to poll opinion. Would PBXware be installed before the New Administration of Donald J. Trump takes office?



Bicom Systems is the world’s first and most mature Professional Open Standards Turnkey Telephony Platform. Since 2003, Bicom Systems has deployed flexible, reliable, and scalable New Generation Communication Systems to SMBs, enterprises, and governments worldwide by unifying the most advanced of latest technologies. For more information, please visit our website or contact us today.

www.bicomsystems.com | sales@bicomsystems.com


Bicom Systems Around the World

Written by Stephen Wingfield on . Posted in Press Releases


There seems to be a trend of customers sharing Bicom Systems credentials around the world. Here’s the latest from Ireland:

Anyone else got any happy pictures to share? 

More posts like this one:

  • Bicom Systems & Nova IX Technologies To Sponsor Cyclists in South Africa
  • Bicom in the Maldives
nova ix technologies

Bicom Systems & Nova IX Technologies To Sponsor Cyclists in South Africa

Written by Laura Espinosa on . Posted in Press Releases

south africa

Bicom Systems is excited to announce that we, in partnership with Nova IX Technologies, are sponsoring cyclists that will travel the beautiful roads of South Africa. More information and photos to come soon!

In the meantime, what do you think of the uniforms?


More posts like this one:

  • Elektrijada Students & Bicom Systems

  • Bicom Systems Works WITH You


Yealink T2X Compatibility

Written by Laura Espinosa on . Posted in IP Phone, Phone Systems, Press Releases, Unified Communications, VoIP, Yealink

Bicom Systems is pleased to announce that the new Yealink T2X telephones are fully compatible with our system.

We now support the T2X telephones in all of the ways that older telephones are supported. This includes auto-provisioning.

The new telephones can now be found in the PBXware GUI as new UADs.

Supported telephones are: T21P, T21P E2, T23G, T27P, T29G, and T19 coming soon!

Please contact us with any questions at support@bicomsystems.com


IS Technologies

Written by Laura Espinosa on . Posted in Case Studies, Hosted PBX, Multi-Tenant PBX, Press Releases, Unified Communications, VoIP

IS Technologies

Bicom Systems is excited to begin working with IS Technologies to better serve SMBs in Alabama.

Similar to many others in the industry, IS Technologies got its start with hybrid PBX systems but quickly began to grow and expanded into a hosted/cloud PBX solution.

The need for a new platform led IS Technologies to Bicom Systems which was a perfect fit.

Read more in our IS Technologies Case Study.



Written by Laura Espinosa on . Posted in Case Studies, Custom Work, Partners, PBX, PBXware, Press Releases, Unified Communications, VoIP

Bicom Systems is excited to announce its partnership with WiLogic in California to offer a more advanced and feature-rich VoIP phone system to their customers.

After experiencing rapid growth, WiLogic found themselves in need of a more powerful platform to satisfy customer demands. They found their solution in PBXware.

Since then, WiLogic has obtained and retained more customers than ever thanks to a plethora of VoIP telephony features.

To read more about this business partnership, read our WiLogic Case Study.


Bicom Systems is in the Press!

Written by Laura Espinosa on . Posted in PBX System, Phone Company, Phone Systems, Press Releases

BREAKING NEWS – Bicom Systems was recently discovered by a large publishing company that seeks out ‘excellence’ in business to share across the world. Among their many publications, Business Excellence features a Telecoms magazine, published online and a well known resource in the international telephony industry. After trying and loving PBXware, Business Excellence was compelled to write an article all about Bicom Systems. We are honored and excited to share that article with you.

business excellence

For a direct link to our article, click here. Or visit the BE Telecoms online magazine.

We’d love to hear from you – leave a comment below with your thoughts on the article or questions on how to get a brand new phone system of your own!


Bicom Systems Announces Strategic Partnership with VOIP INNOVATIONS

Written by Laura Espinosa on . Posted in Call Center PBX, IP Telephony, Multi-Tenant PBX, PBX System, PBXware, Press Releases, VoIP, VoIP Innovations, VoIP Providers

voip innovations

PITTSBURGH (7 August 2013) – Bicom Systems is pleased to announce its partnership with VoIP Innovations in order to combine our expertise and better serve the market with a synergy of telecommunication services.

VoIP Innovations, a Wholesale VoIP Provider based in Pittsburgh, “aggregates services from the nation’s largest telecom providers to give our customers the low Wholesale VoIP rates and network footprint needed to be competitive.” With more than 20 years of experience, VoIP Innovations is a leader in the market and serves customers around the world.


New Inquiries for VoIP MultiTenant PBX and Switches

Written by Stephen Wingfield on . Posted in IP Phone, PBX System, Phone Systems, Press Releases, VoIP, VoIP Phone, VoIP Phone System, VoIP Software

Of recent times the messages we have been receiving from new prospects have been becoming ever clearer. If you are considering to join us in the great movement to liberate the world from Traditional Phone Systems or simply to put together your own VoIP offering you may find some comfort that you are far from alone.

Here’s a few and I’ll add as more come in:

I looked at your software a few years ago and thought I’d take another look since you now have an office in the US.

We currently sell VoIP using another problems software interface for Asterisk and its time for a change / upgrade. My contact info is listed below.


George, CO


We currently use VoipNow from 4PSA. We are looking at alternative options for our Business VoIP offering. We currently run 60 simultaneous calls over 2000 sip trunks and growing by 15% per month. Can you provide a scalable redundant solution for our needs?

Dave, Europe


We are working with 2.5.X version of 4psa’s VoipNOW and our frustration is generated by:

  • Too many asterisk crashes (yes, also in 2.5 version, not only in 3.0 version)

  • A lot of bugs of 2.5 version reported a lot of time ago (some of them more than one year and a half) and not solved. The bugs are recognized by them and given a BUG number.

  • They do not solve bugs in 2.5 and are forcing you to move to VN3. But VN3 has a lot of problems: stability, quality and our main problem: NEW API IS NOT COMPATIBLE WITH PREVIOUS ONE.

So we have invested a lot integrating our applications with the API and also the new API lack of some features that the old API had.

I requested to incorporate old features without success (they said yes, but after several months we continue in the same state).

We are searching for Multi-Tenant PBX with a strong API in order to integrate our applications.

Please, send me information about how to integrate our applications with your software.



Read more about 4PSA and our upgrade offer: How to upgrade from 4PSA VoipNow?


How to Encrypt Call Recordings?

Written by Stephen Wingfield on . Posted in PBX System, Press Releases

Call Recordings can be encrypted in two ways with PBXware depending on the desired outcome of security.

There are basically 2 ways of achieving this, each with its own advantages and drawbacks:

Transparent encryption of the file system where the recordings are located.

– This would be done outside of PBXware, the recordings would be sent to their destination where they would be encrypted.

– Problem is that the key would have to be on a non-encrypted location(usb drive for example) which would be used to mount the encrypted folder.

– This would be useful only if the HD would be stolen.

PGP file encryption

– Each file would be encrypted individually, then sent to its destination.

– Uses separate encoding/decoding keys,

– Each file would need to be decrypted before listening/opening, and the recording options on the reports page in PBXware would not work because of that.

– Not an easy setup.


Latin America Trade Mission

Written by Laura Espinosa on . Posted in Press Releases, Softphone

The UK Trade & Investment department of the UK Embassy in the Dominican Republic, along with Bicom Systems, hosted the first ever Latin America Trade Mission in Santo Domingo last month.

From September 25th to 27th local businessman were introduced to ten different British companies that have a presence in the Dominican Republic and would like to create partnerships with businesses there. They were given the opportunity to make new business contacts and learn about business in the UK and other parts of the world.

Bicom Systems shared our products, services, and case studies, and was most excited to officially launch the newest edition of gloCOM Global Communicator! We look forward to working more closely with the Dominican Republic in the future.



Written by Stephen Wingfield on . Posted in Phone Company, Phone Systems, Press Releases

Bicom Systems Ltd.

Rockware Business Centre,

Rockware Ave,




+44 20 3399 8899

Thursday, 3 October 2013

To Whom It May Concern:


Dear Sirs,

We have opened no accounts recently of this date with new suppliers and any demands associated with the address 3801 S Ocean Drive were not made by the company or its representatives.

In no manner may we be considered responsible for the actions of an unauthorised third-party.

Some clues to any fraud are incorrect phone number and incorrect domain name.

Signed in affidavit of truth,

Stephen Wingfield



Keeping Up With the Market

Written by Laura Espinosa on . Posted in Hosted PBX, IP Phone, IP Telephony, PBX System, Phone Systems, Press Releases, Softphone

As new technology hits the market every year, month, even day, older office equipment and tools are becoming a thing of the past. Things like desk phones, tape recorders, and fax machines are sitting on shelves accumulating dust.

According to a survey done be LinkedIn, the top ten items that are becoming a thing of the past are:

  1. Tape recorders (79%)

  2. Fax machines (71%)

  3. The Rolodex (58%)

  4. Standard working hours (57%)

  5. Desk phones (35%)

  6. Desktop computers (34%)

  7. Formal business attire like suits, ties, pantyhose, etc. (27%)

  8. The corner office for managers/executives (21%)

  9. Cubicles (19%)

  10. USB thumb drives (17%)

Source: http://press.linkedin.com/node/1229

As bulky equipment and old tools disappear from the work field, you can turn to Bicom Systems to get up-to-date solutions and keep up with the rest.

We offer things like PBXware – an open standards turnkey telephony platform that can operate as a hosted solution entirely in the cloud, gloCOM – a desktop application that unites and enhances communication and can be used on nearly any electronic device, and many other options found on our website.

Don’t continue using antiquated items and falling behind the competition, contact Bicom Systems today to begin using the most modern technology on the market.

voip security

APIO SIP security analysis

Written by Laura Espinosa on . Posted in IP Phone, PBX System, Phone Systems, Press Releases, VoIP, VoIP Phone, VoIP Phone System

Network Topology

As you can see in the above schematic diagram, the network has a star structure. Remote locations are directly connected to one central location. Remote Call Shops are connected to a central location over the Lottery network infrastructure. Aside from the call shop network infrastructure, there is also a lottery network infrastructure at remote locations. These two networks are not separated at the moment. Phones and PCs will be installed at each remote location for use in billing and administration. Remote locations are connected to the network using Cisco 1940 series router.

Our recommendation is to build a central location around the following 4 major components:

– SWITCHware / Multi-Tenant PBXware

– SIPProxy / SBC

– Border Firewall

– Monitoring subsystem

Every one of these components is important, but SWITCHware is the “heart” of the system.

SWITCHware provides SIP security options.

– SIPProt is a SIP security module that can be installed on SWITCHware and provide some security options for SWITCHware. SIPProt has been designed to provide protection in case of SIP attack attempts.

– IP address registration

The next most important part of the infrastructure we suggest to be installed on the central location is SIP proxy. SIP proxy has few major roles:

– Call routing

– SIP protection

The firewall is an important part of the infrastructure. It is the first line of network defend. The most important task of the firewall is to control traffic according to the configured ACL (Access Control Lists).

Possible SIP security scenarios

Here is a list of situations in which SIP security can be compromised:

– SIP DOS attack from internal and external network

– Stolen SIP authentication details

– Network threats from public / Lottery network

– Network security threats to Lottery network

SIP DOS attack from internal and external network

Major consequence of the SIP attack attempts can be that your SIP service is unavailable for your phones from Call shops. The source of this kind of threat can be a PC in your network (Lottery network) or from an external network. (See picture)

Because this is a serious problem, we have two places where we can defend our network from this kind of threat.

SIP DOS attack problem solution The first place is SIP proxy and the second place is SWITCHware. On SIP proxy it is possible to configure it to answer only known (our remote) IP addresses. In this case, attacks will not find any SIP service on our side.

In case that attacker has somehow found the IP address of our SIP server, we have a second line of defense, which is SWITCHware. On SWITCHware it is possible to install SIPProt, our SIP protection module. SIPProt is able to recognize and block SIP attacks. As a mechanism to recognize SIP attacks, SIPProt uses the following techniques:

– Pattern recognition

– Brute force detection

To be able to prevent “false alarms” and to avoid situations where a “friendly” IP is blocked, SIPProt uses white lists. Also, a black list is supported which will allow permanently blocked IPs.

SIPProt will log any attack attempt in the appropriate log file and generate the appropriate email notifications.

So using the above two SIP protection mechanisms we are able to protect your SIP services from SIP attacks no matter from which side attacks come, whether internal or external networks.

Stolen SIP authentication details / phones

There are a few possibilities for someone who wants to steal sensitive SIP authentication information:

– To steal phone from a call shop

– Sniff SIP traffic

– Pick up information from the provisioning server These are most common situations in which your SIP security is endangered.

Situation when phone is stolen from Call shop The first major problem that you may have when a phone is stolen from the call shop is the possibility to make calls without your control. If the stolen phone is connected to another part of the public network, is there a possibility to make calls from it?

This situation is not such a big problem because of two facts: If the call shop uses static IP to connect to the public network, only that IP will be enabled, based on appropriate extension configuration. So, if someone connects the phone to some other network with another IP, SWITCHware will deny all these SIP registrations. The other consideration is: If the phone is stolen it is possible to take SIP authentication information from it. It is very difficult to read SIP authentication information (password) even if you know login information for the phone web GUI. Also, the phone is not enabled to place calls before the operator has allowed it through the application. So even if the phone is registered from some other location, calls are disabled until the operator allows it.

Solution for stolen phone situation

Use static IPs for remote call shops on the public side Change SIP credentials every time the phone is rebooted This will guarantee that if the phone is stolen, the next time powers on Configured daily / monthly limit on every extension Even if someone successfully registers the stolen phone on SWITCHware, every extension will have configured a limit per day / month, so the potential financial risk will be limited.

Sniff SIP traffic There is a real possibility for SIP traffic be sniffed on the network in two places: On the LAN network on the remote side (Call shop network) On the public network, along the public provider’s infrastructure.

In this situation, when an intruder is able to pickup SIP traffic, a SIP registration request that contains authentication details, can also be sniffed. SIP registration requests contain an authentication secret that is encrypted using an MD5 algorithm. This means that intruder will not be able just like that to pickup registration secret from sniffed SIP traffic.

Solution to prevent the risk of SIP traffic sniffing To avoid this kind of problem, our recommendation is to use a SIP TLS protocol. Unlike ordinary SIP protocol which uses “plain text”, SIP TLS exchange encrypts messages during communication. SIP TLS is supported with SIP proxy and SBC setup.

Stolen files from the provisioning server Auto provision of configuration files will allow the phone to pick up configuration and read configuration from a file. So the phone can be automatically configured. But this brings some security risks. Theoretically, if someone has some information, he will be able to pick up the configuration files and use the authentication information to register a phone and place uncontrolled calls. Fortunately, this is not so easy. To be able to do that, the intruder has to know the following information: Authentication details of the auto provisioning server (https service) MAC address of phone The MAC address of the phone is not so difficult to get, but the auto provisioning server login details are not so easy to obtain. If https service is used for auto provisioning, all data in communication between the phone and the server will be encrypted.

Solution for prevent risk of stolen auto provisioning files There are a few things which will have to be done to avoid this kind of threat: Dynamically generate auto provisioning authentication information for every phone (different authentication details for every phone). This will make it very difficult to break in to the auto provisioning server. The auto provisioning file has to be encrypted, every file will be generated with a different encryption key. So if someone breaks in to the auto provisioning server he will be able to pick up encrypted files. Every file will have a different decryption key.

Network threats from public / lottery network

As a transport network between call shops and the central location, you use part of the lottery network infrastructure. The lottery network uses the public network to connect to remote locations. This means that voice traffic will pass through the lottery network infrastructure and also through the public network. Because of this, the central location has to be protected from possible intrusions and attacks. The best way to do that is to use a firewall to protect the central location, as is shown on the topology schematic diagram.

Solution to prevent the risk of network threats from the public / lottery network To provide additional protection, the firewall has to provide the following functions: IP filtering, allow only public IPs to belong to remote call shops. This means that you have to provide static IPs on remote locations. Traffic from all other IPs will be denied. Port filtering, allow only VoIP traffic and management traffic from remote Call shops to a central location internal network Allow traffic management only from “known” IPs. Using the above recommendations, the central location will be safe from possible intrusions and attacks from the public network. On the remote call shop side, the local private IP will be NATed to the public IP. This situation will provide some kind of security because there is no need to open any port from the public side to the local side of the network. So local IPs will not be directly visible to the public network. But because the Lottery network devices and your network devices (phones, admin PC) will be in same local network, this can be a potential security problem. Because of that you have to try to separate these two parts of local network. Our recommendation is to use different IP subnets connected to different local network ports of a local router and if it is possible to use different VLANs.

Network threats from our network to the lottery network

The main consideration when talking about the possibility to prevent intruders from our network to the lottery network infrastructure is the fact that we share the same network infrastructure. So the only way to provide security to the lottery network is to separate these two networks.

Solution for provide protection to the lottery network So on the remote location, the networks have to be separated in the following way: Separation of network segments on network layer 2. This can be provided using VLAN segments on local networks. Separation of network on network layer 3 using different IP subnets. Appropriate ACL on router that will block traffic between these IPs subnets.

This situation is shown in the following pictures:

Different VLANs will allow the separation of traffic on network layer 2, which means that the only way to have traffic between two segments is over the router. Of course this kind of traffic will be blocked on the router so these two network segments will be totally separated.


To provide a high level of network security, our recommendation is to provide the following: Build network topology according to the topology shown in the picture from the beginning of the document. This means that the central location has to be built from the following components:

– Firewall

– SIP proxy

– SWITCHware with SIPProt installed

Use static IPs on call shop remote locations. This is important because in the case that the central location will be appropriately protected from intrusions from unknown public IPs. And this will be implemented on the firewall. Also, by using static IPs we will be able to allow SIP registrations only from known IPs. This will be configured on SIP proxy and SWITCHware. So if a phone is stolen, you do not to need worry about possible financial loss. Call administration/billing for every remote Call shop will be allowed only from known IPs. Use SIP TLS protocol (not needed if each location has a static IP). Use encrypted auto provisioning files. Use different encryption keys for every phone. Generate GUI / SIP URL provisioning and SIP authentication credentials dynamically and different for every phone. SNMP network monitoring. We can provide you with this. SIP/RTP monitoring. We can install our voipMON solution. Use daily / monthly call spending limits. Separate the lottery network and your network on a remote location. This will prevent the lottery network from being a potential threat to your network security. Also, this will protect the lottery’s network from potential threats from your network. Make sure to have dedicated staff for all of the above.


SIPProt vs. Fail2Ban Comparison

Written by Laura Espinosa on . Posted in Press Releases

  • SIPProt analyzes live SIP traffic, Fail2Ban analyzes log files.

  • SIPProt, unlike Fail2Ban, directly analyzes SIP traffic. In case an attack is recognized, Sipprot blocks the IP from where the attack is coming for a given period of time.

  • SIPProt works with live traffic. Fail2Ban uses an Asterisk log file to detect attacks.

  • In the case of a massive brute force attack, Asterisk will be busy responding to incoming SIP traffic which will probably result in massive CPU usage. In this situation Fail2Ban will block the attack only after Asterisk writes a message in the log file. So the attack will not be detected and blocked the moment it starts. During this period Asterisk will probably be unavailable for regular SIP clients. Because SIPProt analyzes live SIP traffic, SIPProt is able to block the attack immediately when detected. SIPProt will not wait for Asterisk to block the attack.

Internet Recommendations

Written by Laura Espinosa on . Posted in Press Releases

The Internet is one of the most important tools in our industry. Everything we do depends on a reliable, fast internet connection. It is often taken for granted and we don’t give much thought to our internet service provider. Can you imagine if someone pulled the plug on your internet connection? What if the connection was shaky and unreliable – what would that mean for your business?

Because Internet is so important to our Industry, we’d like to compile a list of reliable, trusted, speedy Internet companies. This will be useful not only to us, but also to share with clients looking for the right provider.

So we ask you – our customers & partners – who would you recommend as an internet service provider? You are the best sources of recommendations. Your successful or failed experiences can help us and others to select the right service provider from the start.

We’d love to hear your feedback on specific companies that you have tried out. What about companies like O2? Or other companies that you have tested?

Leave your comments below with your thoughts on those or other companies. What are the most important aspects to consider in an ISP – reliability, speed, cost? What features have you found to be indispensable? Which haven’t been entirely necessary?

We look forward to hearing from you in the comments below! Once we have enough responses we’ll come back and compile the list of recommended internet service providers as well as companies to avoid.


What happens after METASWITCH?

Written by Stephen Wingfield on . Posted in Competitors, Press Releases

Metaswitch has, in many ways, helped build many of today’s Rural ISPs that have supported ‘Jack & Diane … in the Heartland’. There is no doubt that it has proven a rock solid and reliable platform to date.

The question must follow though – what next?

I have been looking through their web site trying to find answers. I do not see many, if any.

As the ditty chimes, “Long after thrill of dialtone is gone … Oh yeah the light goes on.” Unfortunately that’s where the vinyl gets stuck.

What happens after Metaswitch is installed and the customer is making calls? There are no options visible for desktop integration, CRM integration, or mobile integration. There are no options for “more”.

So what to do next?

Go and invest a similar amount of capital again for the next twenty years before having paid off the last? Clearly NOT!

Do please check out our PBXware; it’s easily integratable and packed with features. So much so that even NEC now use it.

The roadmap goes forward to a full integration of Mobile. Not just dialtone & presence, but really much further.

Even if you have only ‘one’ customer now that needs something a little different, we’d be glad to help.

Look forward to hearing from you.


Yealink Completes Interoperability Testing with Bicom Systems

Written by Laura Espinosa on . Posted in Competitors, IP Phone, Phone Systems, Press Releases

Bicom Systems is excited to announce our partnership with Yealink, the professional designer and manufacturer of IP Phone and IP Video Phone.

After working closely with Yealink to develop customer solutions, we decided to celebrate our success with a joint Press Release announcing the partnership.

For more information, visit our Yealink Press Release.

Also see: Our Verdict on Yealink Phones & our Yealink Products


Partnership in Africa

Written by Laura Espinosa on . Posted in Call Center PBX, IP Phone, PBX System, PBXware, Phone Systems, Press Releases, Telephone Systems, VoIP, VoIP Phone, VoIP Phone System

Here at Bicom Systems we like to give our partners “free press” whenever we can. One of the ways we do that is through case studies. You can browse our gallery of case study on our website.

Today I’d like to take a few minutes to highlight one of our clients in Africa. Back in October we partnered with Necor Zambia Limited to serve the Electoral Commission of Zambia during a heated and important election.

After winning the bid to provide communication services to the Electoral Commission, Necor knew that they had to provide a higher quality of service than ever seen before in Zambia. They turned to Bicom Systems to help them in that task.

Bicom Systems offered a solution through our PBXware Call Center PBX edition with two M2000 appliances in mirrored failover. Each M2000 appliance had Sangoma A200 and A101 cards inserted.

(A special thanks to Sangoma for their help in dealing with the unusual configuration of Zamtel – the incumbent service provider).

Yealink T20P telephones were installed to complete the solution.

(Another special thanks to Yealink for being an important resource).

After a successful installation and traning, the product was delievered to the Electoral Commission of Zambia, surpassing their expectations and pulling the entire communiciations industry of Zambia forward with it. The election went smoothly thanks to a strong telephone systems that could withstand the dramatic increase in calls.

This is a huge success for both Bicom Systems and for NECOR, who has expanded greatly since partnering with Bicom Systems. With this successful partnership created, the sky is the limit, so to speak, for both Bicom Systems and NECOR Zambia Limited.

For more information, read the complete case study.

For other posts on our work in Zambia, see Zambia Presidential Election won with PBXware and Zamtel Call Center Consultation.


Bicom System’s Supporting of Partners in the Field – Example 1: Snetcom

Written by Stephen Wingfield on . Posted in Case Studies, PBX System, Press Releases

Day to day, the greatest satisfaction has to be said to come from working with partners to see their businesses grow. Which over time has also seen our business grow.

There’s always been a slight angst though of how to reciprocate the good faith that partners have placed in Bicom Systems. Fortunately with the time that comes from running our business long enough to put in place resource, there are an increasing number of answers coming to bear.