Agito Eases Central Control with RoamAnywhere

1
2
3
4
5
6
7
8
9
10
11
12
1 of 13

Agito Eases Central Control with RoamAnywhere

Agito Eases Central Control with RoamAnywhereby Andrew Garcia

2 of 13

Client Install

Agito Networks' RoamAnywhere client can be installed on smart phones running Windows Mobile (left) or Symbian OS (right). The software installer automatically identifies the type of device and installs the appropriate client software.

3 of 13

Client Config

The client software for both platforms needs to be pointed towards Agito's Mobility Router and configured with the user's credentials.

4 of 13

Extensions

The RoamAnywhere client maintains both the corporate and mobile personalities.

5 of 13

Forwarding

Users on both platforms can easily set call forwarding and voice mail rules from the device.

6 of 13

Directory Lookup

Unlike the software for use with the Symbian OS, which has a separate dialer application, Agito's Windows Mobile functions are painted directly into the native dial application. Here we perform a lookup from the corporate directory.

7 of 13

Calibration

To guide the network as to where to trigger roaming between Wi-Fi and cell networks, administrators take signal fingerprints at egress points in the building.

8 of 13

Dashboard

System administrators log in to the dashboard to get a high-level view of system performance and utilization metrics.

9 of 13

Usage Views

Administrators can also view more detailed information about cell versus Wi-Fi calls, aggregate usage and call failures for preset time intervals.

10 of 13

Call Reports

The Agito RoamAnywhere console also provides detailed call reports outlining roam events and call participants.

11 of 13

Locations

Agito administrators define office locations, allowing them to tailor signal strength thresholds in order to fine-tune roaming performance according to the needs of each location.

12 of 13

Secure Remote Voice

Administrators centrally control security. Among the options, administrators can enforce that encryption be used on calls from remote Wi-Fi networks.

13 of 13

No Title

Top White Papers and Webcasts