+40 256 706 057 [email protected]
Free Workshop: Integrating Skype for Business with your phone system ☎

Free Workshop: Integrating Skype for Business with your phone system ☎

29 May 2018, 9:30 – 13:30

Microsoft Romania Headquarters, Piața Presei Libere nr. 3-5; City Gate Building, Sud Tower, 2nd Floor, Cinema Room, Bucharest

This workshop is designed for technical decision makers from EPG & SMC companies, such as CTO, CIO, IT managers, IT directors or any other technical decision makers.

Why attend this workshop

Does your organization run on Microsoft 365?
Are you fully leveraging the unified communications & collaboration power of your enterprise software suite?

Attend this free workshop and understand the value of migrating away from legacy PBX systems to the new world of Microsoft enterprise collaboration (Skype for Business and Microsoft Teams), underpinned by the superior voice connectivity, security and productivity offered by AudioCodes comprehensive One Voice for Microsoft 365 solution and Avaelgo’s professional cloud services and Microsoft expertise.

Learn more about how to make your unified communications & collaboration (UCC) investment yield a better return, and how a well-functioning UCC investment rolls up into digital transformation success organization-wide.

The Unified Communications in a Microsoft World workshop will offer you:

  • Full Slides and Resources – you will receive all presentations delivered during the workshop
  • Hands-On Demo – you will see how AudioCodes IP Phones integrated with Skype for Business drive user productivity and adoption of the collaboration tools
  • Ask the Experts – raise any questions with AudioCodes and Avaelgo experts in this open, interactive workshop


During the workshop you will hear from Avaelgo and AudioCodes on:

  • Voice enabling your Microsoft 365 experience for unified communications on-premise, in the cloud or a hybrid approach
  • How IP Phones and Conference Room solutions integrated with Skype for Business can dramatically improve user adoption and productivity
  • How AudioCodes One Voice for Microsoft 365 can help you manage it all easily and efficiently
  • How Avaelgo working with AudioCodes can help manage your seamless transition to unified communications in a Microsoft world

AudioCodes provide the Voice DNA for the digital workplace and are a global leader in providing enterprise voice connectivity, devices and management for Microsoft 365.
Avaelgo are your trusted advisors and experts in Microsoft and cloud technologies

This workshop is a great opportunity to learn how you can fully benefit of the  new world of Microsoft enterprise communication and collaboration tools. Join us by registering below and gather all the information and insights you need!

Meet The Consultants

Daniel Popescu

Daniel Popescu, Senior Cloud Architect, Avaelgo
With more than 18 years experience with the Microsoft IT technology, Daniel managed IT teams for sales, marketing, and services division, and he was one of the first IT peoples that implemented Hyper-V in Europe, Middle East, and Africa region. He acts as an advisor for CIOs, in order to build the best strategy for their organizations.


Arye Ben Zrihem, Director Sales, Eastern Europe, AudioCodes
Arye has worked with AudioCodes for 15 years and for the last 5 years has driven AudioCodes sales growth in Eastern Europe. Arye’s background is rich in technology expertise, leading AudioCodes Sales Engineering team for Eastern Europe. Through both roles, Arye has worked for the last 10 years on significant unified communications projects in Romania with service providers, system integrators and enterprise organisations. He also manages a number of major global accounts for AudioCodes. Arye’s approach is to work closely with partners and help them build the ideal unified communications solution for their enterprise clients. Superior teamwork and technology being the key to success. Arye is very much looking forward to meeting you at the Avaelgo event and building mutually beneficial relationships.


Chaim Shachar, VP Sales, AudioCodes
Chaim is with AudioCodes since 2002, where he completed successfully several important Engineering, Business Development and Management positions. Prior to his present role of VP Sales Central Europe, he was based in Paris where he managed AudioCodes Operations in Western Europe, responsible for France, UK, Benelux and Nordic Countries. Prior to his work with AudioCodes Mr. Shachar worked with a Major Defense Organizations in Israel (IAI, VERINT) , assuming numerous Engineering and Project Management functions. Chaim holds and engineering degree from the Technion, Israel Institute of Technology of Israel , was born in Romania and resides in Israel.

Conferința de Cloud 2018 a avut loc pe 19 aprilie 2018

Conferința de Cloud 2018 a avut loc pe 19 aprilie 2018

A doua ediție a conferinței dedicată tehnologiei cloud

Conferința de Cloud, singura conferință IT dedicată tehnologiei Microsoft cloud din România a avut loc pe 19 aprilie 2018 la București. Participanții au avut ocazia să vadă cum se poate aborda cu succes Cloud-ul, respectiv să își completeze cunoștințele tehnice de Microsoft Azure și Microsoft Office 365. Prin organizarea Conferinței de Cloud, Avaelgo și-a propus să rămână poziționată în piață ca o companie super-specializată pe tehnologia Microsoft cloud și să fie una dintre companiile care sprijină activ dezvoltarea pieței de cloud din România.

Conferința a răspuns la întrebări precum: ”De ce Cloud?” sau ”Cum mă poate ajuta acesta?” și a explicat cum se pune în aplicare un plan de migrare de la zero: consolidarea identităților, migrarea proceselor de lucru și aplicațiilor, realizarea unui proces de continuitate a afacerii și recuperare în caz de dezastru și, nu în ultimul rând, conformitatea cu GDPR.

Agenda conferinței a fost împărțită pe două track-uri:

Track-ul de business, dedicat managerilor și persoanelor de decizie din cadrul tuturor companiilor interesate să afle cum Cloud-ul Microsoft poate să îi ajute prin reducerea costurilor, cresterea productivității, agilității și scalabilității organizațiilor pe care le conduc. Participanții care au asistat la prezentările acestui track, au aflat cum să gândească și să planifice în perspectivă strategia companiei lor în relație cu tehnologia cloud.

Track-ul tehnic, pentru profesioniștii IT interesați să învețe despre Microsoft Azure și să interacționeze cu experți din domeniu.

Speakerii care au vorbit la cea de a doua ediție a Conferinței de Clous sunt specialiști în cloud și IT, o mare parte din ei fiind și oameni de business, aducând o bogată experiență practică subiectelor prezentate. Dintre aceștia, am reușit să aducem în fața audienței un număr de:

  • 6 Microsoft MVP (Azure, AI si Cloud and Datacenter Management)
  • 2 Microsoft Regional Directors
  • 4 experți GDPR

Dintre speakeri, aminitm: Mihai Tătăran (General Manager, Avaelgo și Azure MVP), Tudor Damian (CIO, Avaelgo si Cloud and Datacenter Management MVP), Daniel Rusen (Cloud & Enterprise Lead, Microsoft), Ciprian Jichici (General Manager, Genisoft & CTO, HTSS, Microsoft Regional Director si AI MVP), Alexandru Mang (CEO, KeyTicket Solutions și Azure MVP), Radu Vunvulea (Chief Cloud Strategist, Avaelgo  si Azure MVP), Florin Loghiade (IT Consultant, Avaelgo si Azure MVP), Oana Terteleac (Enterprise Channel Manager & GDPR Advisor, Microsoft), Cristiana Fernbach (CIPP/E, Partner and Head of Technology and Data Protection, Stratulat Albulescu), Ovidiu Pismac (Account Technology Strategist, Microsoft).

Speakeri Conferinta de Cloud 2018

Sponsorii și partenerii Conferinței de Cloud

Participarea la Conferința de Cloud a fost gratuită mulțumită sponsorilor ALEF Distribution RO, Microsoft Romania, BinBox, COMPAREX Romania și Stratulat-Albulescu pentru că ni s-au alăturat și au făcut posibil acest lucru! Mulțumim și partenerilor noștri Automobile Bavaria Group, Orange România, Revista Biz, Mobzine, ANIS România și City Hub București pentru susținera lor!

Becoming GDPR-compliant – Avoidable privacy happenings

Becoming GDPR-compliant – Avoidable privacy happenings

Ioan Popovici

Ioan Popovici
Chief Software Engineer

Last time, I tried to brief some of the steps you need to cover before starting to choose the tools that will help you achieve compliance. Let’s dig a little deeper by using some real-life negative examples that I ran into during this faze.

Case 1. The insufficiently authenticated channel.

Disclosure disclaimer: following examples are real. I have chosen to anonymize the data about the bank in this article, although I have no obligation whatsoever to do so. I could disclose the full information to you per request.

At one point, I received an e-mail from a bank in my inbox. I was not, am not, and hopefully, will not be a client of that particular bank. Ever. The e-mail seemed (from the subject line) to inform me about some new prices of the services the bank provided. It was not marked as spam, and so it intrigued me. I ran some checks (traces, headers, signatures, specific backtracking magic), got to the conclusion that it is not spam, so I opened it. Surprise, it was directly addressed to me, my full name appeared somewhere inside. Oh’ and of course thanking ME that I chose to be their client. Well. Here’s a snippet (it is in Romanian, but you’ll get it):

Of course, I complained to the bank. I was asking them to inform me how they’ve got my personal data, asking them to delete it, and so on. Boring.
About four+ months later (not even close to a compliant time) a response popped up:

Let me brief it for you: It said that I am a client of the bank, that I have a current account, where the account was opened. Oh, but that is not all. They have also given me a copy of the original contract I supposedly signed. And a copy of the personal data processing document that I also signed and provided to them. With the full-blown personal data. I mean full blown: name, national id numbers, address, etc. One problem though: That data was not mine, it was some other guy’s data that had one additional middle name. A thus, a miracle data leak was born. It is small, but it can grow if you nurture it right.

What went wrong?
Well, in short, the guy filled in my e-mail address and nobody checked it, not him, not the bank, nobody. You imagine the rest.

Here’s what I am wondering:

1. Now, in the 21st century, is it so hard to authenticate a channel of communication with a person? Is it so difficult to implement a solution for e-mail confirmation based on some contract id? Is it, really? We could do it for you, bank. Really. We’ll make it integrated with whatever systems you have. Just please, do it yourselves or ask for some help.

2. Naturally, privacy was 100% absent from the process of answering my complaint, even though I made a privacy complaint. Is privacy totally missing from all your processes?

In the end, this is an excellent example of poor legislative compliance, with zero security involved, I mean ZERO security. They have some poor legal compliance: there is a separate document asking for personal data and asking for permission to process it. The document was held, and it was accessible (ok, it was too accessible). They have answered my complaint even though it was not in a timely compliant manner.


0. Have a good privacy program. A global one.

1. Have exquisite security.

2. When you choose tools, make sure they can support your privacy program.

3. Don’t be afraid to customize the process or the tools. We (and, to be honest, anybody in the business) could easily give you a quote for an authentication/authorization solution of your communication channels with any client.

I am sure you can already see for yourself how this is useful in the context of choosing tools that will help you organize your conference event, and still maintain its privacy compliance.

About the author

Ioan Popovici

Ioan Popovici, the Chief Software Engineer of Avaelgo, Microsoft Certified Professional, Certified Information Privacy Professional / Europe, is specialized on Microsoft technologies and patterns and practices with such technologies, acting as the architect on most of Avaelgo’s solutions. He has delivered many trainings to software companies in Romania.

Becoming GDPR-compliant – Tools, Information Security Topics and some Disaster Scenarios

Becoming GDPR-compliant – Tools, Information Security Topics and some Disaster Scenarios

Ioan Popovici

Ioan Popovici
Chief Software Engineer

In the first article of this series, I have briefed some of the main points that need review before thinking about turning your event GDPR compliant and mentioned that in doing so, you will obtain, as a happy byproduct, a nice fingerprint of your event.
Now, as a side note, and as you probably have already figured out, this series of articles is not necessarily addressing those environments that already have a data governance framework in place. If this is your case, I am sure you already have the procedure and tools in place. This series may become interesting for you when we get to talk about some specific tools, information security topics and some disaster scenarios.

There are still some grounds to cover regarding this topic, so let’s go!

Most probably, your main focus in the beginning is: let’s cover some the costs using sponsors, and let’s fire that registration & call for content procedures right away. Now, let’s not just rush into that. In order for you to collect data from participants and speakers (in short), you must have a legal basis for doing that. The legal basis for doing the processing – in this case just collecting it – may not be much of a choice, even though it seems so. In our experience, given the specific of our activity, you may have as a choice: consent, and fulfillment of a contract. Probably you will want to have a homogenous legal basis for all of your participants. Let’s assume the consent as legal basis for processing.


In order to be provided with consent, you are obligated to notify to the person offering consent several pieces of information:

  • Recipients of the personal data
  • Intention to transfer data to a third country or international organization
  • Storage Period, or criteria used to determine it.
  • How is automated decision making present in processing?

Just to name a few. I will not detail the full challenges of what a consent should be here, because this may become boring to you. You may know all this already. After all, you are already in this business.
Several of these topics are easy to pinpoint if you went to the process detailed in the first article of the series. (e.g. identifying the recipients of the personal data). Still, some of the topics did not derive from that first process.

Establishing Data-Flow and assessing the tools

In order for you to be able to answer some questions like:
Are these data going to travel outside EU? Where exactly?
Are we going to profile anybody, or do some automated decision making?
First, you need to define a data-flow associated with personal data, and even more, start thinking about the tools you are going to use.

Remember, in our first article, we have talked about the need to think about some third party software that may help you with some of your activities? Where does this software maintain its data? Is it outside EU? Can you control this?
You see where I am going with this: formalizing the data-flow, knowing what tools touch your data is of uttermost importance before even asking anybody for consent.

But don’t panic! These are anyway things you needed to do for your event, now, you just need to do them earlier. And if you ask me, just at the proper moment in order to benefit at the maximum from them. You do not want to start thinking about what tools you need when you already have 300 attendees registered by phone. That would be a bummer.

Next time, we are going to take a deeper look into tools and some basic security requirements that we recommend! Be safe!

About the author

Ioan Popovici

Ioan Popovici, the Chief Software Engineer of Avaelgo, Microsoft Certified Professional, Certified Information Privacy Professional / Europe, is specialized on Microsoft technologies and patterns and practices with such technologies, acting as the architect on most of Avaelgo’s solutions. He has delivered many trainings to software companies in Romania.

Premium Hands-on Workshops in București

Premium Hands-on Workshops in București

On April 20th 2018 we’re offering two premium hands-on workshops, in which we deep dive into:

Working with Containers in Microsoft Azure

This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about container solutions in Azure.

During this workshop participants will gain knowledge on which Azure container service fits each scenario, how to create production-ready container clusters and how to manage and deploy services on those clusters.

Architecting Serverless Solutions

It is an in-depth training for software developers and architects, where they will get a real chance to get your hands dirty with the only way of developing truly scalable applications and learn how big software vendors like Microsoft, Google, Twitter, Facebook and others design the applications that everyone is using on a regular basis.

Both workshops have the Early Bird offer available until March 30th 2018, so hurry and secure your lowest price for these workshops!

How build a GDPR-compliant conference or event

How build a GDPR-compliant conference or event

Ioan Popovici

Ioan Popovici
Chief Software Engineer

I am starting a series of articles in which I will try to cover my experience in managing privacy and GDPR compliance for several IT related conference events that we handle here at Avaelgo. During this journey, I will also touch some in-depth security aspects, so stay tuned for that.

As I am sure you know already, a conference is a place where people gather, get informed, do networking (business or personal), have fun, and who knows what other stuff they may be doing. The critical aspect here is that for such a conference to be successful, you need to have a fair amount of people being part of it. Moreover, since people are persons, well, that also means a fair amount of personal data.

There’s a lot to cover, but we will start with the basics. If this is the first time you are organizing such a conference, then you already have a head start: you do not have to change anything. If not, then you must begin by reviewing the processes that you already have in place.

In this first article, I am going to cover what are the key points that you should review. Let’s go:

1. How do people get to know about your event?

It is essential to know how exactly you are going to market your event. The marketing step is crucial, and itself must be compliant with the regulation. This is a slightly separate topic, but it cannot be overlooked.
It does not matter that you will market yourself to participants, speakers, or companies. Personal data is still going to be involved.

2. How are people going to register for your event?

That is, how are you going to collect data regarding the participants? Is there going be a website that allows registration? Do you include phone registration? There are still more questions to answer, but you have an idea about the baseline. These decisions will have a later impact on the security measures you need to take to secure those channels

3. How are speakers going to onboard your event?

Same situation as above, but it may be that there is a different set of tools for a different workflow.

4. How are you going to verify the identity of the participants?

Is someone going to be manually verifying attendance and compare ID card names with a list? Is there going to be a tool? Is there a backup plan?

5. Do you handle housing, traveling for speakers or participants?

If yes, you will probably need to transfer some data to some hotels, airlines, taxies, etc.

6. Do you have sponsors? Do they require some privilege regarding the data of the participants?

This aspect is a big one, as I am sure you know, some or all of the entities that collaborate on your conference will require some perks back from your event. It may be that they are interested in recruitment, marketing, or some other kind of activities on the personal data of your participants. Trade carefully, everything must be transparent.

7. Will you get external help?

Companies/volunteers/software tools and services that will help you with different aspects of organizing the event? What are they going to do for you? If they touch personal data, it is probably good to know before you give it away to them.

8. Are there going to be promotions and contests?

Usually, these are treated separately, and onboarding to this kind of activities will be handled independently, but still, it is a good idea to know beforehand if you intend to do this.
As you can already imagine, this is not all, but we will anyway cover each topic from here in future articles, and then, probably, extend to some more.

All of this may look scary, and it might seem to involve a lot of work, but that isn’t the case. In the end, by trying to tackle personal privacy beforehand, you also get, as a happy byproduct, a cool fingerprint of what you need to do to have a successful event. Cheers to that!

A future article will come soon, covering the next steps. I am sure you can already guess what those are. See you soon!

Before you go

If you want to find out more about GDPR, how it affects your events, company etc. you can register to our free webinars in Timisoara and Cluj-Napoca.

About the author

Ioan Popovici

Ioan Popovici, the Chief Software Engineer of Avaelgo, Microsoft Certified Professional, Certified Information Privacy Professional / Europe, is specialized on Microsoft technologies and patterns and practices with such technologies, acting as the architect on most of Avaelgo’s solutions. He has delivered many trainings to software companies in Romania.

Pin It on Pinterest