Snom 360 IP-Phone has been designed for maximum performance in today's business environment. Functions to control the sound and phone calls are directly accessible through the designated key. Context-sensitive menu of telephone brings additional comfort and functionality: just what might be needed for the user in the next second, always available with a press of a button!
Graphic 128x64 pixel backlit display can be rotated to the desired angle for easy reading.
Twelve soft keys can be used to customize the functionality of the phone system and can be adjusted according to the user. Indicator for each function will be indicating whether to call your co-workers, or any other people on the Internet. All this takes place through the SIP protocol exchange, making your investment really safe.
Power over Ethernet (PoE) function ensures secure energy supply for IP-phone, even in situations where the other devices in the office remain unpowered. Power over Ethernet is very convenient for users of phones as it significantly reduces the number of unnecessary cables under the table.
You want to keep your negotiations confidential? The principles of the phone consist of securing the data transmitted between users. You always want to control who, besides you, is involved in the conversation. SIP protocol uses widely known mechanism borrowed from HTTP, and provides security for data exchange. Secure RTP uses 128-bit encryption keys and secure encryption algorithms to protect your information. Snom 360 IP-Phone includes support for both SIP-Secure, and SRTP, for maximum protection of your negotiations, while remaining within the open standards of equipment interoperability. You can be sure that your phone will be safe for the negotiations - even if your system is not based on a single hardware vendor, but supports open standards.
If you want more security, you can use the certificates on the phone, proving that no one stoles your identity. The use of 1024-bit asymmetric keys -ensures an inaccessible security of your information, and hackers, of course, will face the toughest of times.
|© 2002-2018||Follow us @providerslist|