PanTerra's SmartBox Takes Aim at Dropbox, WebEx, AT&T, Others

By Kelly Teal Comments

**Editor's Note: Click here for our recently compiled list of new products and services that partners can sell.**

PanTerra Networks, known for its unified communications focus, has launched a collaboration platform that aims to replace mid-market enterprises' disparate file-sharing and conferencing systems.

In other words, PanTerra has Dropbox, Box, WebEx, Citrix, AT&T and other suppliers in its sights with the Jan 21. release of SmartBox. And it aims to grab market share with the help of its partner channel.

"Dealing with multiple cloud services vendors is a real challenge," said PanTerra CEO Arthur Chang.

One company may offer around-the-clock support, for example, while another hosts message board chats. Plus, users often have to re-enter login information to access each separate system.

"Everyone just wants IT services to deliver easily," Chang said.

To that point, PanTerra created SmartBox, a file/store/synch/share product with built-in unified communications services, including video, fax, recording, email, IM and chat. It replaces FTP and VPN, according to PanTerra. Enterprises may add hosted PBX capabilities if they like, but it's not required. They also can opt just to buy the file/synch/share functionality — think of it as Skype meets Box, said Chang.

SmartBox allows users to share individual folders, no matter the level, independently. Most cloud services don't facilitate that, Chang said. In addition, SmartBox lets users see who they shared content with, view those peoples' presence status and initiate phone, video, conference or IM activity with a click, and even share a voice mail outside of the company, said Chang. There is no need to re-enter email or contact information throughout that process.

Along the way, PanTerra has installed security protections. Those include passwords and share times that expire after a specific number of days, months or years. There's also mandatory two-phase authentication for all accesses. In other words, a user doesn't simply log in, there's also device authentication.

"If somebody were to steal log-in credentials, they could not access content unless through the authenticated device," said Chang.

« Previous12Next »
comments powered by Disqus