Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Considering Skype For The Enterprise: Page 2 of 2

Skype also added ways of tying into existing telephony infrastructure. Businesses can connect PBXs to Skype through Skype trunks with Skype Connect (or what's been referred to as Skype for SIP). Skype Connect already has over 2,400 active global customers and has already been certified by Avaya, Cisco, SIPfoundry and ShoreTel, among others, as interoperable with their products. Skype for Asterisk allows for Skype integration into the Asterisk environments. At the same time, Skype is building out the necessary support services for delivering enterprises-grade services. Sales teams have been improved and there's talk about paid, 24x7 support.

So should you consider Skype for your Business? Certainly, if you're considering a new deployment, but even in existing deployments Skype has lots going for it. Keep in mind, however, that while Skype has gone to great lengths to improve  the availability of its network and to make it easier to diagnose problems with the client, all softphone quality remains unpredictable, highly susceptible to the processes running in the client and network traffic conditions. Skype already has consumer-grade telephones that can utilize its network. It should consider providing the same for business-grade telephones.

Directory integration will also remain an issue. Enterprises today have their personnel and extension information already stored in a directory, such as LDAP. Tapping into those databases will make Skype significantly easier to roll out within the organization. Finally, compliance remains a problem. Right now, there are no integrated compliance mechanisms with Skype. You can't, for example, log chats in Skype for Business in a centralized location. Similarly, calls are encrypted, which makes call logging a problem.