Brokerweb V‑3

A Cus­tomer por­tal for busi­ness and private

Send pre­mi­um invoic­es and oth­er doc­u­ments eas­i­ly, elec­tron­i­cal­ly and securely.

Bro­ker­web is a cus­tomer por­tal sim­i­lar to e‑banking. It pro­vides cus­tomers with all the lat­est impor­tant infor­ma­tion at all times, deliv­ers doc­u­ments and offers var­i­ous ser­vices such as enquiries, claims noti­fi­ca­tions and more. In con­trast to e‑mail cor­re­spon­dence, the exchange of data and doc­u­ments is secure and com­plies with cur­rent data pro­tec­tion regulations.

In addi­tion to these tech­ni­cal fea­tures, the indi­vid­u­al­i­ty of the bro­ker and thus cus­tomer loy­al­ty has also been increased. To this end, Bro­ker­Web can be con­fig­ured at var­i­ous lev­els. Rapid con­tact with the respon­si­ble advi­sor is just as impor­tant as sim­ple han­dling for the cus­tomer. Var­i­ous clients can be mapped in Bro­ker­Web by WMC. In addi­tion, dif­fer­ent rights can be assigned to dif­fer­ent peo­ple. With chat func­tion since spring 2024.

The por­tal is respon­sive and can there­fore be used on all end devices such as PC, Mac, tablet or smart­phone. Its ease of use makes it a prac­ti­cal tool for both busi­ness and pri­vate cus­tomers when it comes to insur­ance and bro­ker ser­vices. It is also very impor­tant that the require­ments of the new Data Pro­tec­tion Act (nDSG), which came into force on 1 Sep­tem­ber 2023, are met.

Login: demo-de
Pass­word: demo-de

 
 
Sam­ple pages  (click to enlarge)

Fea­tures

Data pro­tec­tion
nDSG require­ments are fulfilled.

Home page    (Fig­ure 1)
- Main nav­i­ga­tion
- Quick selec­tion con­fig­urable
- Super­vi­sor con­tact details
- Infor­ma­tion from the bro­ker
- User pro­file settings

Pol­i­cy overview    (Fig­ure 2)
- Glob­al or by sec­tor
- Search, selec­tions
- Print
- Doc­u­ments
- Jump address to pol­i­cy details
- Jump address to dam­age
- Jump address to fur­ther files

Pol­i­cy details    (Fig­ure 3)
- All infor­ma­tion about the pol­i­cy
- includ­ing doc­u­ments
- Dam­age overview
- Overview of invoic­es
- Overview of doc­u­ments, files

…and many oth­er functions

Making digitalisation work…

For dig­i­tal­i­sa­tion to work, smooth inter­ac­tion is required of many play­ers such as stan­dard­i­s­a­tion body (IG B2B) plat­form providers (Eco­Hub, Sobra­do), insur­ers, bro­kers, pol­i­cy­hold­ers, banks, soft­ware part­ners (Sobra­do, bro­ker­busi­ness, ch, one Bro­ker, 3C Vor­sorge­por­tal), providers of third-par­ty soft­ware (account­ing pro­grams, tele­pho­ny, messaging).

With a dig­i­tal bro­ker solu­tion, it is not enough to cre­ate a pro­gramme that can only map cus­tomer, pol­i­cy and claims data. It requires coor­di­na­tion and a lot of devel­op­ment work togeth­er with the oth­er play­ers. And final­ly, every­thing has to be thor­ough­ly test­ed. And yet, giv­en the large num­ber of play­ers, there are always cas­es that have not been con­sid­ered or where some­thing has changed at short notice. Dig­i­tal­i­sa­tion is there­fore a dynam­ic process and not the estab­lish­ment of sta­t­ic connections.

rStar by WMC is the bro­ker soft­ware that sup­ports most core process­es and thus under­lines dig­i­tal lead­er­ship. (Accord­ing to the IG B2B pub­li­ca­tion of 24/03/2022)

WMC is tak­ing on a pio­neer­ing role here, with inten­sive col­lab­o­ra­tion with oth­er play­ers play­ing a major role in the over­all devel­op­ments. The prox­im­i­ty to these part­ners is a com­mit­ment to cre­at­ing seam­less process­es for the broker.

Dig­i­tal Insur­ance Bro­ker­age
by Bro­ker­Star

Bro­ker­Star offers end-to-end dig­i­tal­i­sa­tion
across pro­grammes and organ­i­sa­tions in order to
work of the future to all those involved.

Bro­ker­Star takes applic­a­ble stan­dards into account
as well as mar­ket con­di­tions and cus­tomer requirements.

The new BrokerStar

A new era begins

Bro­ker­Star, the solu­tion from start-up to enter­prise broker.

New Bro­ker­Star V‑3

  • New­er, more con­sis­tent design
  • Many new functions
  • Unfilled fields are not displayed
  • high­er inte­gratin from Sobrado
  • More detailed pre­mi­um statement
  • New autho­ri­sa­tion system
  • Improve­ment of com­mis­sion system
  • Fore­cast Tool
  • Per­for­mance improvement
  • ful­ly com­pli­ant with nDSG

 

High­lights

  • Max­i­mum secu­ri­ty and data protection
  • New cus­tomer portal
  • Secure mail dispatch
  • Mail syn­chro­ni­sa­tion and telephony
  • Inte­gra­tion of Sobrado
  • Mul­ti-client capability
  • Improve­ments in reporting
  • Mem­ber of IG B2B and SIBA
  • Par­tic­i­pa­tion in Eco­Hub AG
 
Bro­ker­Star light
 
  • The sim­ple basic solution 
  • con­tains all Bro­ker­Star basic functions
  • Cost-effec­tive all-inclu­sive prices
  • Upgrade to stan­dard pos­si­ble at any time
  • Restric­tion: no addi­tion­al options
  • Fixed sup­port model

          cli­quer pour voir les différences

Excit­ing modules

Addi­tion­al mod­ules for BrokerStar

Secure exchange with Bro­ker­Web

The Bro­ker­Web cus­tomer por­tal enables the exchange of infor­ma­tion, doc­u­ments and data between bro­ker and cus­tomer in the same way as e‑banking. Trans­mis­sion takes place via a secure con­nec­tion that does not allow exter­nal access.  
to Bro­ker­Web

Intel­li­gent analyses

The term report­ing cov­ers all types of analy­ses, whether as a list or a graph­ic and regard­less of the for­mat, and in the fol­low­ing arti­cle we explain how the report­ing sys­tem in Bro­ker­Star is struc­tured. 
to Report­ing

Mak­ing calls with Bro­ker­Star

Not only does dialling a tele­phone num­ber in the pro­gramme auto­mat­i­cal­ly cre­ate the con­nec­tion. For incom­ing calls, the sys­tem also recog­nis­es a saved num­ber and auto­mat­i­cal­ly opens the cor­re­spond­ing cus­tomer win­dow. The solu­tion cur­rent­ly works exclu­sive­ly with the pop­u­lar 3CX tele­phone sys­tem. The low costs make this use­ful option a high­light. 
to tele­phone

Auto­mat­ic invoice dispatch

Since 2025, only the IG B2B stan­dards 5.2 and 5.4 have been valid. The XML must con­tain the invoice PDF. After check­ing, this can be elec­tron­i­cal­ly stamped and auto­mat­i­cal­ly for­ward­ed. Invoic­es cre­at­ed by the bro­ker are also saved auto­mat­i­cal­ly and sent auto­mat­i­cal­ly by email, via the cus­tomer por­tal or by post.
to invoice process

Broker processes without media discontinuity

New buzz­words often cause con­fu­sion. What is dig­i­tal­i­sa­tion, what are seam­less processes?

The point is sim­ply that data only needs to be entered once and that this data can also be exchanged between dif­fer­ent pro­grams and also between dif­fer­ent organ­i­sa­tions. For exam­ple, why should I enter a customer’s tele­phone num­ber in address man­age­ment, in the tele­phone direc­to­ry, in Out­look and per­haps also in the account­ing programme?

Unfor­tu­nate­ly, dif­fer­ent tech­nolo­gies of the indi­vid­ual pro­grammes and dif­fer­ent struc­tures of the data records hin­der the flow of data. What is pos­si­ble today with e‑banking, name­ly mak­ing a trans­fer from any account to anoth­er account, is still in its infan­cy in the insur­ance world.

WMC is there­fore pur­su­ing pre­cise­ly this vision of over­com­ing all obsta­cles and pro­vid­ing bro­kers with the best pos­si­ble sup­port in their dai­ly work. The chain with the many sub-steps in and around Bro­ker­Star includes not only the exchange with insur­ance com­pa­nies and cus­tomers, but also the inclu­sion of the broker’s inter­nal work.

Dig­i­tal Insur­ance Bro­ker­age
by Bro­ker­Star

Bro­ker­Star offers end-to-end dig­i­tal­i­sa­tion
across pro­grammes and organ­i­sa­tions in order to
work of the future to all those involved.

Bro­ker­Star takes applic­a­ble stan­dards into account
as well as mar­ket con­di­tions and cus­tomer requirements.

Fur­ther infor­ma­tion on dig­i­tal processes:

Secure mail dispatch

Brief­But­ler — the dual solution

Secure mail dis­patch
In addi­tion to the secure dis­patch of poli­cies, invoic­es, payslips, invi­ta­tions or dai­ly mail, using the Brief­But­ler soft­ware opens up many more options for you to make your dis­patch process even more effi­cient and sim­ple and to per­fect­ly tai­lor it to your recip­i­ents. Brief­But­ler is data pro­tec­tion-com­pli­ant and is more than just SecureMail.

Dual solu­tion

Dual means twofold or two pos­si­bil­i­ties. And this is exact­ly what Brief­But­ler offers. Mes­sages and doc­u­ments can be sent elec­tron­i­cal­ly via a secure chan­nel or by post via Swiss print­ing and dis­patch ser­vice providers.

Elec­tron­ic dispatch

Fast dig­i­tal dis­patch — data pro­tec­tion com­pli­ant — 365 days / 24 hours. Secure login code for recip­i­ents by e‑mail or SMS. Trace­abil­i­ty of deliv­ery and open­ing. No sub­scrip­tion fees. Best price on the mar­ket for secure mes­sag­ing (Secure­Mail).

Dis­patch by let­ter post

Do you have recip­i­ents who do not want elec­tron­ic deliv­ery? No prob­lem. You can for­ward the message/documents to the Mail Pro­cess­ing Cen­tre. This cen­tre will take care of print­ing, envelop­ing and sending

      Ser­vice included.

  • Send­ing doc­u­ments and messages 
  • Data pro­tec­tion com­pli­ant accord­ing to nDSG / DSVGO
  • Cer­ti­fied accord­ing to ISO 9001, 14001, 27001
  • Dis­patch from Bro­ker­Star, iOffice
  • Send­ing from Word and Outlook
  • Inter­face API to oth­er programmes
  • Dis­patch either elec­tron­i­cal­ly or by post
  • Selec­table secu­ri­ty level
  • Sig­na­ture optional
  • Costs from CHF 0.41 per consignment
  • Billing only after actu­al dispatch
  • Most favourable price on the market

Messages with personal data

Dis­patch of per­son­al data by e‑mail

Emails are part of every­day life today. Many con­tain per­son­al data, often par­tic­u­lar­ly sen­si­tive data. As a rule, e‑mails are sent unen­crypt­ed. How­ev­er, send­ing an unen­crypt­ed e‑mail is less secure than send­ing a post­card because:

  • emails can be inter­cept­ed, read or mod­i­fied with lit­tle tech­ni­cal knowledge;
  • emails can be eas­i­ly searched for key terms;
  • Inter­net providers based in Switzer­land are oblig­ed to retain e‑mails for six months and to dis­close them to the author­i­ties if necessary.

pro­vi­sions of the Data Pro­tec­tion Act (nDSG).

It is impor­tant to know whether it is “ordi­nary” per­son­al data, par­tic­u­lar­ly sen­si­tive per­son­al data or per­son­al­i­ty pro­files. The sender is respon­si­ble for the data pro­tec­tion-com­pli­ant pro­cess­ing of the per­son­al data and com­pli­ance with the data pro­tec­tion pro­vi­sions and is oblig­ed to pro­vide evi­dence. The sender is oblig­ed to take all mea­sures to pro­tect the data against loss, theft and unau­tho­rised access or pro­cess­ing. When send­ing per­son­al data in sen­si­tive areas such as health­care, the per­son­al data in ques­tion is always par­tic­u­lar­ly wor­thy of pro­tec­tion, as the mere fact that some­one is a client/patient of the organ­i­sa­tion in ques­tion is par­tic­u­lar­ly wor­thy of protection.

The fol­low­ing prin­ci­ples apply to the use of e‑mail

  • Use as lit­tle per­son­al data as pos­si­ble. (data minimisation).
  • The data proces­sor is respon­si­ble for the law­ful, appro­pri­ate and pro­por­tion­ate han­dling (e.g. access autho­ri­sa­tion, updat­ing or deletion).

Since mis­di­rect­ed e‑mails pose a con­sid­er­able risk, address­es must be cho­sen care­ful­ly. Automa­tisms or “con­ve­nience func­tions” should be avoid­ed wher­ev­er possible.

  • No par­tic­u­lar­ly sen­si­tive per­son­al data or pro­files should be processed or stored on pri­vate devices.
  • Not every­thing that is tech­ni­cal­ly pos­si­ble is also permitted.
  • E‑mails should not con­tain any infor­ma­tion about pass­words, accounts, cred­it cards or oth­er access data such as user IDs.
  • No large amounts of data should be scattered.
  • Only select and use known distributors.

Emails from data sub­jects are gen­er­al­ly per­mit­ted. If you receive an email from a per­son, you may reply by email on the basis of their tac­it con­sent. An excep­tion to this is replies that con­tain par­tic­u­lar­ly sen­si­tive per­son­al data. Encryp­tion or sim­i­lar is rec­om­mend­ed here.

Alter­na­tives to unen­crypt­ed emails

  • Stor­age on data serv­er e.g. Bro­ker­Web or Brief­But­ler (via a link in the message).
  • Encryp­tion at doc­u­ment level
  • Use of an encrypt­ed mail ser­vice e.g. Seppmail

Please note that the use of social media and instant mes­sag­ing e.g. What­sapp or SMS for the trans­mis­sion of per­son­al data must be avoid­ed. What­sapp or SMS for the trans­mis­sion of per­son­al data must be avoid­ed. The postal ser­vice is par­tic­u­lar­ly rec­om­mend­ed for very sen­si­tive data.

Secure exchange with BrokerWeb

 

The Bro­ker­Web cus­tomer por­tal enables the exchange of infor­ma­tion, doc­u­ments and data between bro­ker and cus­tomer in the same way as e‑banking. Trans­mis­sion takes place via a secure con­nec­tion that does not allow exter­nal access.

Mail syn­chro­ni­sa­tion with BrokerStar

 

The Mail Sync mod­ule in Bro­ker­Star con­tains two func­tions that work with Out­look and oth­er mail pro­grammes such as GMail.

The E‑mail sync allows you to send and receive mails from Bro­ker­Star. Mails are then stored in Bro­ker­Star and in the mail pro­gramme The Appoint­ment sync syn­chro­nis­es appoint­ments, tasks and address­es from Bro­ker­Star into the mail program.

Mail dis­patch with BriefButler 

Brief­But­ler is a ser­vice soft­ware that deliv­ers doc­u­ments from Bro­ker­Star, Word and oth­er pro­grammes to the recip­i­ent either via a secure por­tal or by let­ter post with­out print­ing. The recip­i­ent does not need any sep­a­rate soft­ware for decryp­tion. Data pro­tec­tion-com­pli­ant and inex­pen­sive per con­sign­ment from CHF 0.41.

BrokerStar and SIBA

SIBA recent­ly decid­ed to open up its mem­ber­ship to relat­ed indus­tries. WMC IT Solu­tions is delight­ed to now be able to trans­form the pre­vi­ous­ly infor­mal col­lab­o­ra­tion into an offi­cial sta­tus.

WMC will sup­port SIBA’s goals of high qual­i­ty bro­ker ser­vices and make it eas­i­er for bro­kers to work with dig­i­tal process chains. 

WMC has been a mem­ber of IG B2B from the very begin­ning and is the only soft­ware man­u­fac­tur­er to be a share­hold­er in Eco­Hub AG. This is linked to the com­mit­ment not only to imple­ment all avail­able stan­dards from the out­set, but also to dri­ve for­ward dig­i­tal­i­sa­tion in the insur­ance industry.

Greet­ings
Samuel Knoepfel,
Man­ag­ing Direc­tor SIBA

Data security, data protection (nDSG)

Data secu­ri­ty and data pro­tec­tion are play­ing an increas­ing­ly impor­tant role. A cyber attack or data breach usu­al­ly has seri­ous consequences.

It is there­fore more impor­tant than ever to pro­tect, back up and store data secure­ly. On 1 Sep­tem­ber 2023 the new Swiss Data Pro­tec­tion Act (nDSG) came into force, which also result­ed in adjust­ments to data stor­age. Bro­ker­Star and Bro­ker­Web are pre­pared for this.

Data secu­ri­ty deals with the gen­er­al pro­tec­tion of data and doc­u­ments. Thus, secu­ri­ty in any form falls under the term data secu­ri­ty, as does per­son­al data. The Data pro­tec­tion on the oth­er hand, relates exclu­sive­ly to the stor­age and use of per­son­al data, at least as far as the legal pro­vi­sions are concerned.

Data secu­ri­ty and data pro­tec­tion there­fore pur­sue the goal of secur­ing data of all kinds against threats, manip­u­la­tion, unau­tho­rised access or knowl­edge. Ana­logue and dig­i­tal mea­sures can be tak­en to achieve this. First of all, there are tech­ni­cal and organ­i­sa­tion­al mea­sures, which are also used in the con­text of data protection.

In the dig­i­tal sec­tor, the imple­men­ta­tion of IT secu­ri­ty solu­tions in the form of virus scan­ners, fire­walls etc. con­tributes to the secu­ri­ty of data. Phys­i­cal mea­sures, on the oth­er hand, include access con­trols, fire­proof fil­ing cab­i­nets or safes for sen­si­tive and con­fi­den­tial doc­u­ments. Data back­ups, such as the cre­ation of back­up copies on a sep­a­rate stor­age medi­um, are also essen­tial. A sol­id net­work infra­struc­ture and reg­u­lar updates are the basic pre­req­ui­sites for achiev­ing data secu­ri­ty goals. Data pro­tec­tion, on the oth­er hand, is essen­tial­ly about how per­son­al data is used and stored.

It is there­fore impor­tant to take organ­i­sa­tion­al and per­son­nel pol­i­cy pre­cau­tions to ensure a high stan­dard of secu­ri­ty with­in the com­pa­ny. Employ­ee train­ing and fur­ther edu­ca­tion, as well as the deploy­ment of spe­cial­ists such as IT secu­ri­ty offi­cers and data pro­tec­tion offi­cers, con­tribute to data secu­ri­ty and are some­times manda­to­ry for com­pli­ance rea­sons. IT secu­ri­ty and data pro­tec­tion offi­cers are ded­i­cat­ed to analysing poten­tial secu­ri­ty gaps in your com­pa­ny and cre­at­ing appro­pri­ate mea­sures to achieve the data secu­ri­ty objective.

The terms are there­fore not only close­ly linked, but also influ­ence each oth­er. For exam­ple, com­plete data secu­ri­ty can­not be achieved with­out data pro­tec­tion mea­sures, as oth­er­wise per­son­al data may not be ade­quate­ly pro­tect­ed. On the oth­er hand, com­pre­hen­sive data secu­ri­ty mea­sures are a pre­req­ui­site for effec­tive data pro­tec­tion in accor­dance with legal require­ments and best practice.

The fol­low­ing aspects of the new Data Pro­tec­tion Act are important:

  • Keep track of exact­ly what data is being processed and for what pur­pose. You can pro­vide infor­ma­tion about this at any time and avoid unpleas­ant surprises.
  • Crit­i­cal­ly review the col­lec­tion of per­son­al data. What is effec­tive­ly nec­es­sary for you?
  • Reduce the query cri­te­ria for your cus­tomers to a minimum.
  • Restrict inter­nal data access in the com­pa­ny to as few peo­ple as possible.
  • Check your pri­va­cy pol­i­cy in detail and amend it if necessary.
  • Check and improve the tech­ni­cal default set­tings and user-friendliness.
  • Train your employ­ees to sen­si­tise them to the impor­tance of the topic.

Details on the new data pro­tec­tion law can be found here  and on the offi­cial site of the fed­er­al government

Sources, Profi Engi­neer­ing, 2021, SME dig­i­tal­i­sa­tion 2022, Data pro­tec­tion part­ner 2022, www.admin.ch

Tem­plates and doc­u­ments   (Sources: SIBA, IG B2B, WMC)

Data processing 

Portal utilisation 

Secure Mail 

IG B2B nDSG 

Ten cool functions

1

Work­ing in mul­ti­ple win­dows (brows­er tab). Edit sev­er­al at the same time by jump­ing from one win­dow to anoth­er. Indi­vid­u­al­i­sa­tion Many set­tings such as view, fil­ters, etc. Page adapts to the device (respon­sive).

2

The four lan­guages Ger­man / French / Ital­ian / Eng­lish can be set indi­vid­u­al­ly for each user as well as for each cus­tomer and com­bined as desired. 

3

Auto­mat­ic Syn­chro­ni­sa­tion with mail pro­grams (e.g. Microsoft 365) for cal­en­dars, tasks, con­tacts and incom­ing and out­go­ing mail. Not to for­get the Tele­pho­ny inte­gra­tion incom­ing and outgoing.

4

The extend­ed File man­ag­er allows you to save poli­cies, invoic­es, quotes and any doc­u­ments and cre­ate cus­tomised file struc­tures as in Explor­er. Doc­u­ments can also be made acces­si­ble to customers.

5

Access at any time from all over the world with any device, with any brows­er in any oper­at­ing sys­tem via a secure data con­nec­tion. No instal­la­tion on the device necessary.

6

The com­plete­ly new Bro­ker­Web Cus­tomer por­tal offers a cus­tomer jour­ney with exchange of infor­ma­tion, doc­u­ments, process­es and reports con­ve­nient­ly in both direc­tions. Sup­ports the design of the bro­ker and is expandable.

7

Mul­ti-fac­tor authen­ti­ca­tion (MFA) ensures a secure login. For access to Bro­ker­Star and Bro­ker­Web, this is con­fig­ured for each cus­tomer with a sin­gle click. Secu­ri­ty and data pro­tec­tion (nDSG 2023) at the high­est level.

8

Inter­faces enable the con­nec­tion to third-par­ty pro­grammes. These are avail­able as stan­dard for many appli­ca­tions. (Sobra­do, 3C, One Bro­ker, bro­ker­busi­ness, Aba­cus, Sage …)

9

Process­es with­out media dis­con­ti­nu­ity, Work­flow is the name giv­en to auto­mat­ed work­flows that exe­cute a series of actions with­out man­u­al inter­ven­tion, e.g. invoice process, man­date, poli­cies, etc. Work­flow sup­port in the stan­dard system.

10

The five-stage Report­ing allows cus­tomised auto­mat­ed reports, charts, dash­boards and cock­pits in addi­tion to the stan­dard eval­u­a­tions as a com­pre­hen­sive Man­age­ment Infor­ma­tion Sys­tem. Also direct­ly in BrokerWeb.

 

Making calls with BrokerStar / iOffice

The com­plete solu­tion
In addi­tion to the WMC soft­ware, as a cus­tomer you need a tele­phone con­nec­tion and a 3CX tele­phone sys­tem. This can be pro­vid­ed by you or by a tele­phone provider. WMC offers the entire solu­tion from a sin­gle source. In addi­tion to the con­ve­nience and great reli­a­bil­i­ty, you ben­e­fit from sig­nif­i­cant­ly reduced tele­phone costs. The co-oper­a­tion with sip­call and WMC have been in exis­tence for around 20 years.

Call­ing with Bro­ker­Star and iOf­fice is now avail­able.
Not only does dialling a tele­phone num­ber in the pro­gramme auto­mat­i­cal­ly cre­ate the con­nec­tion. For incom­ing calls, the sys­tem also recog­nis­es a saved num­ber and auto­mat­i­cal­ly opens the cor­re­spond­ing cus­tomer win­dow. The solu­tion cur­rent­ly works exclu­sive­ly with the pop­u­lar 3CX tele­phone sys­tem. The low costs make this use­ful option a highlight.

 

The three com­po­nents of the solution

1. voice over IP (VoIP)

Since 2019, tele­pho­ny in Switzer­land has been made exclu­sive­ly via the inter­net. New meth­ods recog­nise whether calls or data are involved. In most cas­es, all com­mu­ni­ca­tion is trans­mit­ted via the same connection.

2. com­put­er inte­grat­ed telephony

Just as com­put­er data can con­tain a link to a web­site or an e‑mail address, direct links to a tele­phone num­ber are also avail­able. Click­ing on them cre­ates a con­nec­tion direct­ly to the VoIP-based tele­phone net­work or via a tele­phone sys­tem. This can be locat­ed any­where on the Internet.

3. the CTI soft­ware solution 

WMC pro­grammes such as Bro­ker­Star or iOf­fice have inte­grat­ed tele­pho­ny. The only link required is a com­pat­i­ble tele­phone sys­tem. Con­nec­tion to a 3CX is avail­able as stan­dard. This con­nec­tion option is also rec­om­mend­ed for Teams tele­pho­ny. Inter­faces to oth­er sys­tems can be cre­at­ed if required.