46 Articles Tagged security

Avaya Secure Access Link 3.0 Meets Customers’ Security Needs – Avaya Blog

Avaya Secure Access Link 3.0 Meets Customers’ Security Needs

  • Carl Knerr
  • November 14, 2017 | Estimated reading time: 3 minutes to read
  • This past May I took on a new role here at Avaya, leading our team that engages with our amazing partner community. We’re working to…
Authentication & Authorization: Avaya’s Easy Security for Snap-in Developers | Avaya Blog

Authentication & Authorization: Avaya’s Easy Security for Snap-in Developers

  • Joel Ezell
  • September 7, 2017 | Estimated reading time: 4 minutes to read
  • Security. Many application developers consider security to be the bane of their existence. We just want to get our features to work, and often don’t…
The IoT Chronicles Part 4: Predictions for 2017 and Beyond

The IoT Chronicles Part 4: Predictions for 2017 and Beyond

  • Jean Turgeon
  • January 5, 2017 | Estimated reading time: 5 minutes to read
  • 2016 certainly didn’t come up short in terms of tech innovation. From genetically engineered immune cells that can control long-term HIV to plant gene editing…
The IoT Chronicles: Security Regulation (part 3) | Avaya Blog

The IoT Chronicles Part 3: Security Regulation

  • Jean Turgeon
  • December 19, 2016 | Estimated reading time: 6 minutes to read
  • There’s no denying the transformative power of the IoT (whether or not you’ve read this IoT Chronicles blog series.) Practically every object imaginable today has…
IoT Security Risks | Network Security Solutions from Avaya

The IoT Chronicles Part 2: Three Big Security Threats—and How to Solve Them

  • Jean Turgeon
  • November 28, 2016 | Estimated reading time: 6 minutes to read
  • With projected market revenue of $1.7 trillion by 2020, the Internet of Things (IoT) stands to forever change the world as we know it. In…
Verbio Brings Voice Biometrics to Avaya Breeze

Verbio Brings Voice Biometrics to Avaya Breeze™

  • Jon Alperin
  • November 8, 2016 | Estimated reading time: 2 minutes to read
  • If you’ve been following the Avaya Connected Blog in recent weeks, hopefully you’ve read about the changes Avaya expects to see in Customer Engagement as…
Time for a New Network Engine: Start Running on a Software-Defined Network

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…
How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
As Consumer Technology Remakes the Workplace, a Strategy for Managing Security Breaches

As Consumer Tech Remakes the Workplace, a Thoughtful Security Strategy Is the Best Defense

  • Adrian Brookes
  • October 26, 2016 | Estimated reading time: 5 minutes to read
  • I think we’d all agree the business landscape has changed dramatically over the past two decades. Think back to the last time you wrote a…
An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | Estimated reading time: 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

  • Jean Turgeon
  • October 12, 2016 | Estimated reading time: 4 minutes to read
  • As I’ve said before, no one provider can completely eliminate network security risks. There is, however, a proven way to reduce risk and network exposure:…
How to Make the Most of IoT While Minimizing Security Risks

How to Make the Most of IoT While Minimizing Security Risks

  • Jean Turgeon
  • October 6, 2016 | Estimated reading time: 2 minutes to read
  • I was in London yesterday for IP Expo 2016. I had the pleasure of speaking with many customers and presenting a keynote about the security…
An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

  • Jean Turgeon
  • October 5, 2016 | Estimated reading time: 9 minutes to read
  • More than 90% of businesses say they have some sort of cybersecurity framework in place, but here’s the truth: a network security strategy will never…
What does a Smart City look like? We’re defining it with a new partner

What does a Smart City look like? We’re defining it with a new partner

  • Jean Turgeon
  • September 29, 2016 | Estimated reading time: 4 minutes to read
  • The city of the future is a Smart City, emboldened by technology that folds in government, industry, and consumers. For this to happen, it needs…
Part 3 - New Age, New Requirements, More Innovation: Three Ways to Keep Up

New Age, New Requirements, More Innovation: Three Ways to Keep Up (Part 3)

  • Jean Turgeon
  • August 31, 2016 | Estimated reading time: 4 minutes to read
  • The 2016 Rio Olympics may be over, but the excitement is still palpable. As I watched the performances from some of today’s most gifted athletes,…
Hacking Challenge

How to Fail a Hacking Challenge

  • Maan Al-Shakarchi
  • July 20, 2016 | Estimated reading time: 2 minutes to read
  • 32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security…