Hosted VoIP – Why Cloud Based VoIP?


There are multiple layers of redundancy. One, multiple, or all can be used depending on the situation.

• Predetermined failover number for each phone
• Predetermined failover number for each main line
• A mobile app for your cell phone integrates with your desk phone
• A desktop app for your computer can be used as a softphone which integrates with your desk phone
• The ability to take your desk phone to another physical location
• Unify all your locations and have them operating independant of each other


There are more options for service than premise telephone solutions. This can end up saving you money. One, multiple, or all can be used depending on the situation.

• You can program and install yourself which is free
• You can have the service provider program and help you install for free
• Use AACOM to take care of programming and installation for a low upfront cost
• Use AACOM’s Basic Service Agreement to make programming changes for a low fixed monthly cost


Cloud telephone systems have an abundance of standard and optional features that are automatically or easily updated.

• Your cloud phone system is always updated and has the ability to get the newest standard features.  Some come inherent in the system or some canbe optional for a monthly cost, without having to upgrade parts or replace your premise telephone system
• Users have the ability to either use their desk phone, the desktop app for your computer as a softphone, the mobile app for your cell phone, or one/multiple/all can be used, depending on your situation
• Recording, voicemail to text, voicemail to email, analytics, call center, auto attendant, and music on hold are just a few of the features in a cloud system
• The ability to All Page to every phone on the system, regardless of their physical location
• Ability to have shared line appearances, similar to old style key systems


In many cases you can upgrade to a cloud VoIP telephone system for similar or less than you are paying now!

• Fixed monthly costs for unlimited local and long distance calling
• No service costs for moving employees’ phones, if the office is properly wired
• No service costs for programming changes, as they can be done by yourself, or with the help of the service provider’s free support
• You can purchase the equipment yourself to save money, if you know what to get and have a reputable source
• Dedicated or shared line pricing is available
• AACOM can install, program, & train you for a low upfront cost.  This is optional
• AACOM offers basic service agreements for a low monthly cost.  AACOM can make changes, answer questions, or remotely help you, if you feel more comfortable with AACOM as your local vendor


With a cloud telephone system you are making a solid investment for the future.

• The phone you purchase are standard SIP/VoIP telephones and can be used for most cloud providers
• The phones are not proprietary, which locks you into that manufacturer or provider
• You will not need to upgrade your system if premise phone system manufacturers stop supporting their old telephone system
• You will not need to purchase a new system when a premise system stops functioning at your location
• You are not locked into one cloud provider or local vendor, so there is movabiity. (pending any contractual obligations)
• A cloud solution is scalable.  Easily add more lines or phones.  Your telephone system grows as your company grows

Enterprise-class security

Our business is predicated on our ability to offer a more secure environment than our customers could deploy themselves on-premises.

Multi-tenant platform security

Intermedia uses multiple redundant, enterprise-class firewall systems to prevent unwarranted intrusions.

Intrusion protection systems

Intermedia runs multiple intrusion protection systems (IPS) (both host and network) to detect and deter malicious network traffic and
computer usage.

Redundant datacenters

East/West Coast redundant datacenters assures reliability and decreases latency.

Physical security

Our datacenters are closely monitored and guarded 24/7/365 with sophisticated pan/tilt closed-circuit TVs. Secure access is strictly enforced. Security guards are stationed at the entrance to each site.

Employee security

Every Intermedia employee undergoes a rigorous background check. Employee access to passwords, encryption keys and electronic credentials is strictly controlled. Access to servers is restricted to authorized engineers and monitored regularly.

Redundant internet service providers

Each datacenter is serviced by multiple Tier-1 internet providers to mitigate the potential impact of a Denial of Service (DoS) attack.

Authentication and access

Intermedia’s stringent policies and procedures authenticate a caller’s identify during support and service calls. Our online control panel gives you full control over access to services and administrative functions.

Dedicated security staff and monitoring

Intermedia employs dedicated, full-time security staff who are certified in all disciplines of information security.


Intermedia is registered and certified with the US Department of Commerce for privacy under the Safe Harbor program.

Voice encryption

During phone conversations Intermedia provides Secure Voice (SRTP).

99.999% financially backed SLA

Intermedia believes in giving our customers the best service possible. So we provide your business with a financially backed 99.999% (five
nines) uptime service level agreement. A 99.999% uptime SLA means that you should expect less than six minutes of downtime over the course of a year- and, if we should fail to deliver, we’ll compensate you for it.

SOC 2 Certification

Intermedia has a SOC 2 audit report from an independent auditor who has validated that, in their opinion, our controls and processes were effective in assuring security during the evaluation period.

PCI compliance

Our payment processing system has passed the strict testing procedures necessary to be compliant with the PCI Data Security Standards (PCI

Intermedia’s SOC 3 Security and Availability Report

Intermedia has a SOC 3 audit report from an independent auditor who has validated that, in their opinion, our controls and processes were effective in assuring security during the evaluation period.

SSAE 16 Type II-audited datacenters

Intermedia’s datacenters are audited to the SSAE 16 Type II standard, which validates the provider’s commitment to the trust principles of security, availability, processing integrity, confidentiality, and privacy.

Financial regulatory compliance

For customers in regulated businesses, Intermedia facilitates compliance with FINRA, SEC, SOX, and many other regulations.

HIPAA compliance

Intermedia services are designed to meet the privacy and security requirements for Protected Health Information (PHI). Our policies, procedures, technologies and services are audited by a third-party to validate conformance with HIPAA privacy and security requirements, and Intermedia will execute a HIPAA Business Associate Agreement with Covered Entities.


Our payment processing system has passed the strict testing procedures necessary to be compliant with the PCI Data Security Standards (PCI DSS).

Privacy protection and data protection frameworks

Intermedia maintains a comprehensive privacy policy. In addition, we are registered with the US Department of Commerce as compliant with USEU and US-Swiss Safe Harbor frameworks, which were created to bridge the gap between US and EU/Swiss data protection and privacy standards. All our EU and US customers benefit from this level of protection.

Contact Us

We're here to help