How Remote Work Changed Telecom
When the workforce went remote, most IT teams scrambled to keep people connected. Two or three years later, many of those same teams are still running makeshift solutions—a patchwork of VPN licenses, consumer-grade home internet connections, personal mobile devices, and UCaaS platforms that were never configured for distributed use. The temporary fix became permanent infrastructure.
The problem is that traditional enterprise telecom was designed around premises. Your internet circuit terminated at the building. Your PBX sat in the server room. Your firewall sat between your building and the internet. Quality of service (QoS) policies applied to traffic leaving your network—traffic you controlled. Security policies enforced at the perimeter assumed employees were inside that perimeter.
Remote work broke all of that. Now each employee is their own network edge. You have no visibility into whether they're on a shared apartment building Wi-Fi connection or a dedicated gigabit fiber line. You have no QoS control over their home router. You can't physically inspect or easily support a home setup. And your security perimeter dissolved the moment employees started tunneling in from home networks you don't manage.
The specific challenges stack up quickly: home internet is wildly variable in quality and reliability; there is no QoS enforcement on residential connections; security exposure is significant when employees access corporate resources over unmanaged networks; cost allocation becomes complex when you're paying for services spread across dozens or hundreds of employee homes; and IT support for non-standard home setups eats disproportionate help-desk time. None of these are insurmountable, but solving them requires a deliberate architecture—not a collection of workarounds.
Home Internet: What You Should Require and Subsidize
The foundation of any remote telecom strategy is home internet. What should you actually require, and how much should you pay for it?
On the technical side, a reasonable baseline for a knowledge worker doing video calls, VoIP, and cloud app access is a symmetrical connection with at least 25 Mbps download and 10 Mbps upload, latency under 50ms to the nearest major hub, and a hardwired Ethernet connection (not Wi-Fi) for video calls. If the employee is running a softphone for customer-facing calls, upload reliability matters more than raw speed. Jitter and packet loss cause far more call quality problems than low speeds.
Whether to mandate fiber specifically depends on geography. In urban and suburban markets, fiber is usually available and the right call: it's symmetrical, reliable, and not subject to the neighborhood contention issues that plague cable during peak hours. In rural areas, fiber may not be an option at all. There, fixed wireless, 5G home internet, or cable may be the only practical choices. Blanket fiber requirements will strand rural employees—build flexibility into your policy.
On stipends: the most common range in the US market is $30 to $75 per month, with many companies landing around $50. Some companies pay the full bill; most pay a flat stipend regardless of actual cost. A few important caveats: stipend amounts in the US are generally treated as taxable income if not tied to a verifiable business expense reimbursement under an accountable plan. Talk to your employment attorney or HR team before deciding whether to treat internet stipends as a reimbursement (potentially non-taxable) or as supplemental pay (taxable).
For rural employees where adequate internet may not exist at any price point, consider budgeting for a cellular backup solution. A 5G hotspot as a secondary connection can serve as a failover when the primary connection has issues, and for some rural employees it may be the primary connection altogether.
UCaaS for Distributed Teams
Unified Communications as a Service (UCaaS) is where remote telecom becomes most visible to end users. The platform you choose—and how you configure it—determines whether remote workers sound like they're next door or like they're calling from a construction site.
The first decision is hardware vs. software: physical desk phones for home offices versus softphone clients on laptops or mobile devices. For most remote workers, a softphone is the right call. It's one less piece of hardware to ship and support, it travels with the employee, and modern softphone quality (especially WebRTC-based clients) is excellent when paired with a good headset. Physical IP phones make sense for employees who spend 6+ hours a day on calls or who prefer the ergonomics of a dedicated device—customer service representatives, for instance.
Whatever the endpoint, headsets are non-negotiable for quality calls. A wired USB headset with a built-in noise-canceling microphone (Jabra, Logitech, Plantronics/Poly are the standard enterprise choices) eliminates most of the ambient noise, echo, and reverb issues that plague remote calls. Budget $60 to $150 per headset and ship them standardized rather than letting employees use whatever earbuds came with their phone.
On the technical side: WebRTC clients (the default in most modern UCaaS platforms like RingCentral, Zoom Phone, and Microsoft Teams) are generally more firewall-friendly than legacy SIP clients and work better over NAT. SIP clients offer more flexibility and lower latency for high-volume call centers but require more careful network configuration. For most distributed office workers, WebRTC is the right choice; for contact center environments, evaluate SIP with your UCaaS vendor.
One often-overlooked configuration: media bypass settings. In a UCaaS environment, audio traffic should flow directly between the user and the nearest media server—not be backhauled through your corporate network. Misconfigured call paths are one of the most common causes of call quality degradation in remote deployments. Review your UCaaS vendor's documentation on media routing before you deploy at scale.
VPN vs. SASE: Getting Security Right
The traditional answer to remote access security was the VPN: tunnel all traffic from the remote worker's device back to a corporate data center or firewall, then let it exit to the internet from there. It was adequate when most corporate apps lived on-premises. It became a liability when everything moved to the cloud.
The core problem with VPN in a cloud-first environment is backhauling. If your employee is in Denver and your data center is in Chicago, their Teams call or Salesforce session gets routed Denver → Chicago → Microsoft or Salesforce, then back. That round trip adds latency, degrades real-time audio, and puts unnecessary load on a central choke point. As the workforce went remote, VPN concentrators became the bottleneck the architecture was never designed to be.
SASE—Secure Access Service Edge—solves this by moving security enforcement to the cloud edge, as close to the user as possible. Platforms like Cato Networks, Zscaler, and Cloudflare One provide secure, direct-to-application access without backhauling. The employee's traffic is inspected at the nearest point of presence, then forwarded directly to its destination. You get enterprise-grade security without the hairpin routing.
Paired with a zero-trust network access (ZTNA) model—where access is granted based on verified identity, device posture, and context, not just "is the user on the VPN?"—SASE provides a fundamentally better security architecture for distributed workforces than legacy VPN. It's also easier to manage: no VPN concentrators to size and maintain, no split-tunneling debates, no complaints from employees about slow connections when they're working from home.
The migration from VPN to SASE is a non-trivial project, but it's one of the highest-ROI telecom investments a remote-first company can make. Start with the highest-impact use case (usually access to cloud apps) and expand from there.
Mobile and Device Management
Remote employees use more endpoints than office employees: a laptop, a personal phone, sometimes a tablet, and possibly a company-issued mobile device. Managing that mix requires a coherent mobile device management (MDM) strategy before it manages you.
The corporate vs. BYOD question is the first fork in the road. Corporate-owned devices give you maximum control: you can enforce encryption, push configurations, remotely wipe, and install your MDM agent without asking permission. BYOD is more politically palatable to employees but requires containerization (separating work apps and data from personal apps on the same device) and more nuanced policy enforcement. Most enterprise-grade MDM platforms—Microsoft Intune, Jamf, VMware Workspace ONE—support both models.
On mobile plans: if you're paying for corporate mobile plans, remote work creates "bill shock" risks that didn't exist when employees were mostly on Wi-Fi at the office. Employees working from home connect to Wi-Fi most of the time, which is good—but those who travel or work from coffee shops frequently can generate surprising data overages. Audit your mobile plan data tiers against actual usage annually. Many companies find they're paying for data plans that are significantly oversized for most employees and undersized for a handful of heavy users. A pooled data plan often reduces total spend while eliminating individual overages.
Expense management for employee-owned devices on corporate plans is also worth standardizing. Define a reimbursement cap, require receipts or direct billing, and specify what counts as a reimbursable use. Without clear policy, mobile expense management becomes an informal negotiation between employees and their managers—which is expensive and inconsistent.
Managing Costs Across a Distributed Workforce
Telecom cost allocation in a remote-first company is genuinely more complex than in a traditional office environment. You're no longer paying one circuit for one building. You're paying for UCaaS seats, internet stipends, mobile plans, MDM licenses, SASE subscriptions, and possibly home office equipment—spread across a workforce that may span dozens of states or countries.
The fundamental choice is between company-paid and stipend models. Company-paid means the employer directly contracts and pays for the service (common for UCaaS seats, MDM, SASE). Stipend means the employer gives employees a monthly allowance and lets them select their own service (most common for home internet). Hybrid models are the norm: company-paid UCaaS and security stack, stipend for internet, reimbursement for approved headsets.
For visibility into total remote telecom spend, build a per-employee telecom cost model. Aggregate UCaaS seat cost + internet stipend + mobile plan cost + MDM license cost + prorated SASE cost per employee. This number usually runs $150 to $350 per remote employee per month in mid-market deployments—and most IT leaders are surprised by how high it is when they actually add it up. Knowing the number is the first step to managing it.
Department-level allocation is increasingly required for budget reporting. Most UCaaS and MDM platforms allow you to tag users by department for reporting purposes. SASE platforms typically track usage per user as well. Build those tags into your provisioning workflow so cost allocation data is clean from day one rather than a retrofit.
Policy, Contracts, and Compliance
Policy is where remote telecom strategy either holds together or falls apart. Without written policies, you're relying on individual judgment—which means inconsistency, disputes, and compliance gaps.
At minimum, a remote telecom policy should cover: minimum internet speed and reliability requirements; approved device types and operating system versions; MDM enrollment as a condition of corporate access; VPN or SASE client requirements; headset and audio standards for customer-facing calls; internet stipend amount, payment cadence, and tax treatment; mobile plan reimbursement limits; and acceptable use of company-provided communications tools.
On the contracts side, the biggest mistake remote-first companies make is signing carrier agreements that still reflect an office-centric world. Many legacy telecom contracts tie seat counts or bandwidth commitments to specific office addresses. When you shed office space or shift headcount to remote, you can end up paying for capacity at locations you no longer use—or hitting penalties for reducing headcount below contracted minimums.
- Does the contract tie seat counts or bandwidth to specific physical locations?
- What are the penalties for reducing headcount below the committed minimum?
- Can seats be reallocated from office locations to remote employees without a contract amendment?
- How is the contract structured if we close an office and those employees go fully remote?
- Does the contract accommodate employees in multiple states or countries?
- What are the data sovereignty or compliance implications for employees in regulated industries working from home?
- Is there a remote-work addendum that addresses home-office support, equipment, and network standards?
Before signing any new contract—whether for UCaaS, internet aggregation, SD-WAN, or SASE—have the vendor walk you through how the agreement handles headcount fluctuation, location changes, and remote worker additions. If they can't answer clearly, that's a red flag worth resolving before signature.
Compliance adds another layer for regulated industries. Healthcare companies subject to HIPAA, financial services firms under SOC 2 or PCI DSS, and government contractors under CMMC or FedRAMP all have specific requirements for how data is transmitted and stored—requirements that extend to employee home networks when those employees are handling sensitive data. An acceptable use policy is not enough; you may need technical controls (device encryption, app containerization, network segmentation via SASE) to satisfy compliance requirements at the home-office level.
Frequently Asked Questions
Should we pay for employees' home internet?
Most companies with a significant remote workforce do provide some form of internet stipend—typically $30 to $75 per month in the US. Whether you're legally required to do so depends on your state: California, for example, has an expense reimbursement law (Labor Code §2802) that arguably covers home internet costs when employees are required to work remotely. Regardless of legal requirements, providing a stipend sets a clear expectation about minimum internet quality and helps attract remote talent. Structure it as a business expense reimbursement under an accountable plan to avoid taxable income issues; consult your employment attorney or HR team for your specific jurisdiction.
What's the best UCaaS platform for remote teams?
There is no single "best"—it depends on your existing stack, call volume, and user needs. Microsoft Teams Phone is the right answer if you're already deep in Microsoft 365, because the integration removes friction. RingCentral is strong for SMB and mid-market with simpler IT infrastructure. Zoom Phone is a natural fit if your workforce already lives in Zoom for meetings. For contact center environments, consider CCaaS platforms like Five9, NICE CXone, or Genesys Cloud rather than standard UCaaS. What matters more than brand is proper configuration: media routing, headset standards, and network QoS settings have a larger impact on call quality than which logo is on the platform.
How do we handle IT support for home office setups?
This is a persistent pain point. A few practices that work: first, standardize as much as possible—one approved headset model, one approved MDM client, one documented VPN or SASE configuration. The more variables you eliminate, the fewer unique troubleshooting scenarios your help desk faces. Second, build a home office setup guide that employees can follow themselves for common issues. Third, for employees who spend significant time on customer-facing calls, consider requiring a wired ethernet connection as a condition of handling calls—this eliminates an entire category of support tickets. Fourth, for employees in persistent trouble with home connectivity, budget for a cellular backup device as a stopgap.
What is SASE and do we actually need it?
SASE (Secure Access Service Edge) is a cloud-delivered architecture that combines network security functions—firewall, secure web gateway, cloud access security broker, zero-trust network access—with wide-area networking capabilities, all delivered from the cloud edge rather than a corporate data center. Whether you need it depends on your security requirements and current architecture. If you're still running a legacy VPN and your employees primarily access cloud applications, SASE is worth evaluating seriously—the performance and security benefits over VPN are significant. If you're a smaller company with modest security requirements and on-premises apps, a well-configured VPN may be adequate for now. For any company handling sensitive data with remote employees across multiple states or countries, SASE is increasingly the expected standard.
Build a Remote-First Telecom Strategy
Need help building a remote-first telecom strategy? ITG Group helps distributed companies right-size their stack—at no cost.
Start a Conversation