Browse Definitions :
Definition

cloud telephony (cloud calling)

Contributor(s): Laura Fitzgibbons

Cloud telephony, also known as cloud calling, is a type of Unified Communications as a Service (UCaaS) that offers voice communication services through a third party host. UCaaS replaces the need for conventional enterprise telephone systems, such as PBX. Cloud telephony services can be web- or applications-based.

Cloud telephony solutions are hosted on cloud servers maintained and updated by the provider with access granted on a subscription or as-needed basis. Therefore, customers do not need to pay for upkeep or unnecessary resources that may be associated. Common features of these solutions include:

  • On-demand self-service.
  • Included PBX technology functionality of call recording, conferencing and forwarding.
  • Integration with existing call center and CRM
  • Broad network access.
  • Resource pooling.

Some popular examples of cloud calling software include Vonage, Google Voice and Google Hangouts. Due to its cloud based nature, this type of calling can be implemented quickly from various individual accounts. Cloud calling technology also sets the stage for additional features for businesses such as voice and keyword analysis, interactive voice response and customer support AI.

Most larger companies that provide cloud calling operate out of a large cloud call center or several smaller centers where major cloud telephony companies run their service. Major cloud telephony providers include Google, Vonage, RingCentral, Nextiva and Ringanywhere.

Cloud telephony vs VoIP

Unlike commonly used VoIP systems, cloud calling is generally more affordable, less of a burden on a company's hardware and is more scalable for growing organizations. In addition, the fact that the connection is hosted over a cloud means that the quality of connections tends to be stronger. Most cloud calling services have built-in failover modes that make sure a backup is available if there is a problem with a connection.

Benefits of cloud calling

In business, companies often replace their conventional phone services with VoIP (voice over IP) through the cloud to make it easier for employees to connect quickly from anywhere. When compared to traditional phone services, other benefits include:

  • Lower cost and maintenance.
  • Higher accessibility and reliability.
  • Simpler to implement and scale.
  • Easier to keep updated.
  • Minimized downtime.
  • No need for additional infrastructure.
  • Increased transparency of usage and communications-related statistics.
This was last updated in February 2019

Continue Reading About cloud telephony (cloud calling)

Join the conversation

4 comments

Send me notifications when other members comment.

Please create a username to comment.

What is the most notable difference when you make calls via the cloud?
Cancel
Call quality depends on providers network and host's network also.
DTMF issues are also there.
Cancel
I use CallHippo their service is excellent and I love their product.they also got me a  NewYork virtual phone number so when I make calls to my clients in the USA it looks like a local call.I have the virtual phone number for <a href="https://callhippo.com/signup/new-york-virtual-phone-number/929-area-code">Manhattan, Brooklyn, and Bronx</a>
Cancel
I have been looking for the full information about Cloud Telephony but I didn't get proper info before visiting here. But after reading this blog, I have understood properly what is Cloud Telephony. Thank You so Much for giving this information. 
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close