46 Articles Tagged security

Avaya Tops in Gartner’s Magic Quadrant for Contact Center Infrastructure

Avaya Named a Leader in Gartner’s Magic Quadrant for Contact Center Infrastructure

  • Gordon Blackie
  • June 2, 2016 | Estimated reading time: 1 minute to read
  • Avaya is honored to be recognized as a leader in Gartner's Magic Quadrant for Contact Center Infrastructure worldwide. Avaya has been the only vendor having…
How to Explain Cloud Projects to a CFO

How to Explain Cloud Projects to a CFO

  • Michael Blake
  • June 1, 2016 | Estimated reading time: 5 minutes to read
  • As tensions continue to increase in cloud-related discussions at the executive level, so has the importance of effective communication. Much of the debate on cloud…

Network Security – It’s Everybody’s Business

  • Maan Al-Shakarchi
  • May 4, 2016 | Estimated reading time: 3 minutes to read
  • As the week kicks off, we are greeted with yet another network security breach making headline news. The story comes from Bangladesh’s Central Bank, where…

Lethal Tech Combo to Fight Crime

  • Iman Ghorayeb
  • May 4, 2016 | Estimated reading time: 6 minutes to read
  • With tough economic conditions, high crime rates are adding to a climate of risk and uncertainty. While CCTV systems are support to protect schools, banks…

8 Questions to Help Decide if You are Getting the Most From Your Cloud

  • Pat Patterson
  • February 22, 2016 | Estimated reading time: 5 minutes to read
  • Concerns around security and accountability remain top of mind (and top-of-budget) for today’s IT managers. Such concerns are the natural progression of a trend that…

12 Cloud Questions Every Company Should Ask Itself

  • Pat Patterson
  • November 19, 2015 | Estimated reading time: 5 minutes to read
  • Demand for cloud services continues to surge, driven by corporations interested in software flexibility and scalability. But how secure is the cloud? No surprise, analysts…

89% of Employees Apparently Don’t Care About Mobile Security

  • Luke Stangel
  • August 19, 2015 | Estimated reading time: 4 minutes to read
  • IT security has a big job: keep corporate data safe in the face of motivated hackers and unaware employees. Today that job is harder than…

10 Must-Ask Questions for Hospitals Adopting the Internet of Things

  • Luke Stangel
  • August 10, 2015 | Estimated reading time: 3 minutes to read
  • Hospitals are increasingly adopting Internet-connected devices, in hopes of tapping into their impressive benefits. Imagine “smart beds” that can automatically detect if they’re occupied (or…

Avaya Offers End-to-End Network Security Solutions for BYOD

  • Mohamed Awais
  • May 28, 2015 | Estimated reading time: 3 minutes to read
  • Cybersecurity threats within organizations are on the rise, driven by increased employee mobility and bring your own device policies. While enterprises need to look at…

Q&A: Avaya Chief Technologist Jean Turgeon on Securing the Smart Cities of the Future

  • Luke Stangel
  • April 26, 2015 | Estimated reading time: 8 minutes to read
  • How are vendors like you linking IOT with security? What are the challenges? To address and enhance security as part of a Smart City initiative,…

What Do CIOs Really Care About?

  • Luke Stangel
  • February 20, 2015 | Estimated reading time: 2 minutes to read
  • What keeps the average CIO awake at night? This year, it’s data security, cloud services and the network. Earlier this week, a handful of Avaya’s…

Avaya Networking Ranks “Best in Show” for Video Surveillance at Maine’s Fryeburg Fair

  • Luke Stangel
  • December 17, 2014 | Estimated reading time: 2 minutes to read
  • Charlotte’s “web” just got a whole lot faster at the Fryeburg Fair. The largest agricultural fair in the state of Maine--and the second-largest in New…

Join Avaya at EDUCAUSE 2014

  • Luke Stangel
  • September 24, 2014 | Estimated reading time: 2 minutes to read
  • Avaya will be hosting a booth at EDUCAUSE 2014, from Monday, September 29 to Thursday, October 2, where we will demonstrate how our solutions help…

Hacking 911: Is the Genie out of the Bottle?

  • Mark J. Fletcher, ENP
  • August 25, 2014 | Estimated reading time: 3 minutes to read
  • For many years a level of frailty has existed in the nation's 911 network and its primary level of protection has been "security through obscurity".…

A WebRTC Security Primer

  • Andrew Prokop
  • July 15, 2014 | Estimated reading time: 3 minutes to read
  • There are a number of reoccurring themes in my blog articles and security is near the top of the playlist. If you’ve been a long…

Don’t Let SIP Endpoints be Your Achilles Heel

  • Andrew Prokop
  • May 5, 2014 | Estimated reading time: 6 minutes to read
  • I was out East last week (I grew up in Arizona and we call everything on the right side of the map “out East”), where…