48 Articles Tagged security

Avaya Article Thumbnail

The IoT Chronicles Part 2: Three Big Security Threats—and How to Solve Them

  • Jean Turgeon
  • November 28, 2016 | 6 minutes to read
  • With projected market revenue of $1.7 trillion by 2020, the Internet of Things (IoT) stands to forever change the world as we know it. In…
Avaya Article Thumbnail

Verbio Brings Voice Biometrics to Avaya Breeze™

  • Jon Alperin
  • November 8, 2016 | 2 minutes to read
  • If you’ve been following the Avaya Connected Blog in recent weeks, hopefully you’ve read about the changes Avaya expects to see in Customer Engagement as…
Avaya Article Thumbnail

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…
Avaya Article Thumbnail

Security and the IoT: Where to Start, How to Solve

  • Fab Fiori
  • November 2, 2016 | 6 minutes to read
  • I recently attended the 2016 North America IoT Tech Expo in Santa Clara, California. This event highlights how the most innovative advancements in technology are…
Avaya Article Thumbnail

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
Avaya Article Thumbnail

As Consumer Tech Remakes the Workplace, a Thoughtful Security Strategy Is the Best Defense

  • Adrian Brookes
  • October 26, 2016 | 5 minutes to read
  • I think we’d all agree the business landscape has changed dramatically over the past two decades. Think back to the last time you wrote a…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Avaya Article Thumbnail

Changing the Lagging Face of Public Safety with Smart Networking Solutions (Part 4)

  • Fab Fiori
  • October 13, 2016 | 6 minutes to read
  • In part I of this series, Avaya Vice President and Chief Technologist for Software-Defined Architecture Jean Turgeon opened up a much-needed conversation about the current…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

  • Jean Turgeon
  • October 12, 2016 | 4 minutes to read
  • As I’ve said before, no one provider can completely eliminate network security risks. There is, however, a proven way to reduce risk and network exposure:…
Avaya Article Thumbnail

How to Make the Most of IoT While Minimizing Security Risks

  • Jean Turgeon
  • October 6, 2016 | 2 minutes to read
  • I was in London yesterday for IP Expo 2016. I had the pleasure of speaking with many customers and presenting a keynote about the security…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

  • Jean Turgeon
  • October 5, 2016 | 9 minutes to read
  • More than 90% of businesses say they have some sort of cybersecurity framework in place, but here’s the truth: a network security strategy will never…
Avaya Article Thumbnail

What does a Smart City look like? We’re defining it with a new partner

  • Jean Turgeon
  • September 29, 2016 | 4 minutes to read
  • The city of the future is a Smart City, emboldened by technology that folds in government, industry, and consumers. For this to happen, it needs…
Avaya Article Thumbnail

New Age, New Requirements, More Innovation: Three Ways to Keep Up (Part 3)

  • Jean Turgeon
  • August 31, 2016 | 4 minutes to read
  • The 2016 Rio Olympics may be over, but the excitement is still palpable. As I watched the performances from some of today’s most gifted athletes,…
Avaya Article Thumbnail

How to Fail a Hacking Challenge

  • Maan Al-Shakarchi
  • July 20, 2016 | 2 minutes to read
  • 32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security…
Avaya Article Thumbnail

Avaya Named a Leader in Gartner’s Magic Quadrant for Contact Center Infrastructure

  • Gordon Blackie
  • June 2, 2016 | 1 minute to read
  • Avaya is honored to be recognized as a leader in Gartner's Magic Quadrant for Contact Center Infrastructure worldwide. Avaya has been the only vendor having…
Avaya Article Thumbnail

How to Explain Cloud Projects to a CFO

  • Michael Blake
  • June 1, 2016 | 5 minutes to read
  • As tensions continue to increase in cloud-related discussions at the executive level, so has the importance of effective communication. Much of the debate on cloud…