There is a lot of noise and confusion about hosted phone systems, work at home options and collaboration options in the current pandemic environment.

Nutec has been providing hosted and OPEX solutions for our customers that deliver on these options and opportunities.

Nutec Hosted Voice, powered by Wildix.

Now with Nutec hosted voice and collaboration, powered by Wildix, we are continuing to bring a personalized approach to cloud voice solutions.

The Custom Solution YOU Need

Nutec provides a customized hosted voice solution on a private cloud solution at public cloud pricing. Therefore, your business gets what you want and need. You do not have to settle for what the cloud crowd is pushing.

Local Support and No-Surprise Billing

We provide you with the advantages of the cloud along with local support, training and on-site support. Nutec hosted voice gives your business consistent monthly (OPEX) pricing eliminating big-ticket sales cycles and unexpected capital expenses.

The fastest way to work from anywhere

Nutec Smart Working solutions provide you with the advantages of Work at Work, Work at Home and Work Anywhere. If you have internet, you can have a great phone experience.

Wildix by Nutec provides your business with the best Browser-Based Unified Communication and Collaboration Solutions. Custom designed and flexible and ready for your staff today.


Submitted by Trevor Naish


The value of things we take for granted is only discovered when we lose them. 

Among these things, health perhaps comes first.

That is why it is in times of coronavirus emergencies that we discover the importance of paying attention to our bodies and to others.

“I’m fine? I’m sick? Maybe it’s the case that I won’t go to work today if I’m not feeling well, to protect my colleagues. ”

Not being able to go to the office has opened our eyes to the need to have working methods disconnected from physical places, in two words, Smart Working.

Office productivity can’t stop if people can’t access their desks for some reason. It is now anachronistic to link the business to the four walls of the workplace.

This emergency is paradoxically instructive for the business world, from large to small and medium-sized companies: workers must continue to produce, even if the roads to the office are closed due to weather adversities.

Smart work is not a new thing but there are still very few companies that put it into practice. However, hundreds of studies have shown that individual employee productivity increases by 20% when they have the opportunity to work from home. Not to mention the significant drop in sick leave, facilities in the management of parental leave and maternity leave; smart work as a more effective non-economic incentive to conquer and retain talent.

The technology offers all the tools to share chats, phone calls, documents and video conferences in a 100% secure way, thanks to intuitive solutions and inexperienced digital interfaces.

So work smarter and stay healthy!

Please contact us today for details on how you can take advantage of our help!

Telephone systems Edmonton

Identity and access management (IAM) refers to the policies and tools used by IT departments to ensure that people and entities have the appropriate level of access to the organization’s technical resources. IAM systems are technology solutions to securely manage digital identities and their access to various applications and systems.

IAM systems provide administrators with the tools and technologies to change a user’s role, track user activities, create reports on those activities, and enforce policies on an ongoing basis. These systems are designed to provide a means of administering user access across an entire enterprise and to ensure compliance with corporate policies and government regulations.

Identity and management technologies include (but aren’t limited to) password-management tools, provisioning software, security-policy enforcement applications, reporting and monitoring apps and identity repositories. Identity management systems are available for on-premises systems, such as Microsoft SharePoint, as well as for cloud-based systems, such as Microsoft Office 365.

IAM systems can be cloud-based (often called IDaaS) or on-prem. The first IAM systems were on-prem, i.e. physically located within the organization’s firewall and managed by the organization. Today, more and more organizations are moving to cloud IAM systems, with McKinsey reporting that only 38 percent of the enterprises they interviewed expect to be on-prem in three years.  In three years, 60 percent will rely on a third-party IAM service that supports multiple public-cloud environments and unifies access across on-prem and public-cloud resources.

The move to cloud IAM is being driven by cost savings and reliability. Using a third-party cloud IAM means savings in infrastructure and maintenance. It also reduces the risk of downtime as cloud vendors provide distributed and redundant systems with high up-time and short SLAs.

In today’s complex compute environments, along with heightened security threats, a strong user name and password doesn’t cut it anymore. Today, identity management systems often incorporate elements of biometrics, machine learning and artificial intelligence, and risk-based authentication.

At the user level, recent user authentication methods are helping to better protect identities. For example, the popularity of Touch ID-enabled iPhones has familiarized many people with using their fingerprints as an authentication method. Newer Windows 10 computers offer fingerprint sensors or iris scanning for biometric user authentication. The next iPhone, due out later this year, is rumored to include iris scanning or facial recognition to authenticate users instead of fingerprint scanning.

IAM is a central practice to protecting sensitive business data and systems. Implemented well, IAM provides confidence that only authorized, authenticated users are able to interact with the systems and data they need to effectively perform their job roles.

While any IAM implementation will start with an audit of an organization’s needs (defining roles, access requirements, etc.) and creation of a policy, there are many different IAM tools and solutions that can help you execute on an IAM program. Any tools you select should meet the use cases for your environment.

Also consider prioritizing those tools that can provide highly automated workflows to simplify IAM administration, and identity management tools that integrate well with other systems and security technologies (such as PAM). The more seamless the tool fits within your own environment and with other security tools, the more likely you are to close security gaps and improve business operations.

For more information on Identity and Access Management please contact us today:

Telephone systems Edmonton

Contributed by Erick Preza


Assist your patients in field hospitals and shorten the response time

to patient requests for noncritical or emergency assistance.

Take advantage of wireless technology in order to keep patients in touch at any time with the medical staff.

Enable patients to ask for help at any time with the touch of a wireless pendant. An alarm is generated to notify medical staff immediately.

Escalate alarms to the appropriate medical personnel to assist patients as quickly as possible.


  • Nurse Activity Logging
  • Zone Login in for Nurses
  • Competence/Skills based Alert Routing
  • Real-time Alarm Monitoring
  • Powerful Excel Reports
  • Mobile app for Android and Apple mobile devices
  • Cross-Platform Web Console for Supervisors on Windows, Android, Apple iOS and Mac OS X

We are here to help!

Please contact us today for details on how you can take advantage of our help!

Telephone systems Edmonton