master illume series

Master illume Series (Q3 – FY2022)

Drive end user experiences and efficiencies with real time connectivity insights by becoming an illumenated master. Darryl Turner, built most of the platform and will help you make the most out of the latest illume features, dashboards, and the wholesale re-billing engine in this 45 minute recorded webinar.

Recorded webinar timestamps

  • 2:18 Tickets – How to create, view, and edit tickets, as well as see who’s on the ticket
  • 6:50 Account Detail – How to view all activity statements in one easy place
  • 9:20 Pulse – Your services in an easily understandable dashboard (A superpower for technical users)
  • 11:05 Resources – Rate cards, support resources, contracts, guides – all the documents you need in one place
  • 15:58 Reports – Your go-to place for real-time and historical insights into your services
  • 24:12 Voice Accounts – Manage your voice services with voice channel utilisation graphs,
  • 26:57 Notifications – Set up email and/or SMS alerts so you never miss a service update
  • 31:15 Wholesale voice rebilling tool – Simplify wholesale voice billing, manage your customers, set your custom tariffs, and more

Recent Posts

3CX Small Business – Multi-Tenant

For small businesses, 3CX SMB is the smart choice – a fully-managed, cost-effective PBX that covers all the essentials like voicemail, call queues, and digital receptionists. Perfect for teams of up to 10 users who don’t need advanced features or deep integrations.

Read More »

Lightwire Threat Feed Service

Under our new Lightwire Threat Feed Service (LTFS), we’ve kicked off by adding two key services from the National Cyber Security Centre (NCSC); Malware Free Networks (MFN) and the Phishing Disruption Service (PDS).

Read More »

Pulse Detect – Public Port Scanning

Pulse Detect provides clear visibility into publicly available vulnerability data associated with your infrastructure — including open ports and known Common Vulnerabilities and Exposures (CVEs) linked to your public IPs. This is the same type of information cyber adversaries actively seek out.

Read More »

Listen to the podcast