Green Key Technologies releases version 2.0 of Trader Voice Box

Source: Green Key Technology

Green Key Technologies, a voice software development firm, announced today the release of Trader Voice BoxSM 2.0, a VoIP "Soft Turret" that offers encrypted and recorded inbound/outbound calling as well as private hoot and holler.

Green Key is a cross-functional group of developers, quants, network engineers and technologists. Our mission is to make trader voice simpler, smarter and more cost effective. We believe physical lines and hardware are no longer required for secure, mission critical conversations to take place. Our solution is an encrypted global VoIP network and the development of intelligent Soft Turrets.

Trader Voice BoxSM enables global financial market participants to rapidly set up and instantly speak on private, secure voice networks without hardware. Communication takes place using a downloadable software client that is installed on the user's PC connecting over a virtual private network (VPN) into Green Key Technologies' telecom infrastructure. The service is available as managed infrastructure or as a private cluster installation.

"Trader voice is moving to the PC," Anthony Tassone, Chief Executive Officer for Green Key Technologies, said. "Banks and brokerage firms are reducing costs while increasing compliance capabilities. The desire to shed hardware while centralizing access control are converging to drive trader voice toward a more cost effective, compliance-centric, unified communication platform - on the PC."

"The Trader Voice BoxSM 2.0 release represents the feedback of over 100 brokers and traders who have demoed our software since product inception. Seven months and 2900 builds later we are ecstatic with the results and excited to deploy it out to our voice network for further feedback," Eric Detterman, Chief Technology Officer for Green Key Technologies, said.

Trader Voice BoxSM includes access to Green Key's eDiscovery and control platform. From within the browser based tool, users can maintain their own network connections, keep a telephone address book, set up intelligent call routing and ring groups as well as communicate with support. In addition, authorized users can search for, listen to and analyze call recordings.

Comments: (0)