10 Articles Tagged SBC

Avaya Article Thumbnail

Nine Big Reasons Why Your UC Network Needs Session Border Controllers

  • Andrew Prokop
  • March 13, 2014 | 5 minutes to read
  • SIP has been around since the late 1990’s, but confusion still exists regarding what it is and what it can do.  Most old school telephony…
Avaya Article Thumbnail

How to Manage Network Risk and Security with Session Border Controllers

  • Andrew Prokop
  • March 5, 2014 | 4 minutes to read
  • A big part of my job is working with companies on SIP migrations.  Some are looking to dip their toes in the water with a…
Avaya Article Thumbnail

How Today's UC Technology Deals with our Need for Speed

  • Andrew Prokop
  • February 27, 2014 | 3 minutes to read
  • I never saw the first computer I worked on.  It was 1975 and I was a senior at Coronado High School in Scottsdale, Arizona.  Those…
Avaya Article Thumbnail

The Virtual Private Network (VPN) is Dying. Here's Why.

  • Andrew Prokop
  • February 23, 2014 | 6 minutes to read
  • A lot has changed since I left college and entered the workforce.  My first “real” job began July 5, 1983 at the company formerly known…
Avaya Article Thumbnail

Getting SIP Communications Right the First Time Around

  • Andrew Prokop
  • February 19, 2014 | 5 minutes to read
  • Last week was a teaching week for me.  Although I enjoy playing the role of professor in my SIP class, I am happy that it’s…
Avaya Article Thumbnail

How to Build a Secure SIP Network

  • Andrew Prokop
  • February 13, 2014 | 5 minutes to read
  • For the most part, I love my job as a communications architect.  I love sifting through Wireshark traces trying to find needles in SIP haystacks. …
Avaya Article Thumbnail

The 'Religious' War Brewing in Unified Communications Security

  • Andrew Prokop
  • February 12, 2014 | 4 minutes to read
  • I am surrounded by zealots. No, I am not talking about organized religion. I am talking about tech zealots. You know the type: Mac vs. Windows.  Firefox vs. Chrome.  Android…
Avaya Article Thumbnail

Q&A: How to Prevent Hackers, Malware from Disrupting your Unified Communications System

  • Luke Stangel
  • January 30, 2014 | 6 minutes to read
  • Business telecommunication systems are the new focus of hacker attacks, according to last week's New York Times and its piece, "Swindlers Use Telephones, with Internet's…
Avaya Article Thumbnail

Unified Communications Creates Security Holes. Here's How To Plug Them.

  • Luke Stangel
  • April 17, 2013 | 6 minutes to read
  • UC Exposes Security Gaps That Your Regular Firewall Can't Even Begin To Sew Up. But A Combination Of Smart Policies And The Right Hardware Can…
Avaya Article Thumbnail

Love BYOD but *Hate* VPN? Here's a Solution

  • Luke Stangel
  • March 14, 2013 | 3 minutes to read
  • What made Yahoo CEO Marissa Mayer's anti-telecommuting policy so...head-scratching? Because despite her background as a Google executive, Mayer's stance put her in the same camp as basically…