46 Articles Tagged security

Don't Sweat Your Password, We've Got It Covered

  • Camille Campbell
  • March 20, 2014 | Estimated reading time: 3 minutes to read
  • “IT department, how can I help?” “Hi, I forgot my password again.” Sound familiar? With the growing number of disparate enterprise applications, users often find…

A Timely Article About SIP Timers

  • Andrew Prokop
  • March 20, 2014 | Estimated reading time: 4 minutes to read
  • Some things happen for a reason and some things just happen. Last week I hit a deer and I highly doubt that there was some…

How to Manage Network Risk and Security with Session Border Controllers

  • Andrew Prokop
  • March 5, 2014 | Estimated reading time: 4 minutes to read
  • A big part of my job is working with companies on SIP migrations.  Some are looking to dip their toes in the water with a…

From Russia to California: What the Olympics Taught Us About InteropNet

  • Camille Campbell
  • March 4, 2014 | Estimated reading time: 4 minutes to read
  • To say that Avaya networking engineers have been getting their fair share of air miles would be an understatement. As Avaya was the Official Supplier…

Webinar: Learn Best Practices Around IP Video Surveillance

  • Luke Stangel
  • March 3, 2014 | Estimated reading time: 1 minute to read
  • Surveillance has come a long way from people in binoculars monitoring from the high ground to the first generation of analog cameras connected to video…

The Virtual Private Network (VPN) is Dying. Here's Why.

  • Andrew Prokop
  • February 23, 2014 | Estimated reading time: 6 minutes to read
  • A lot has changed since I left college and entered the workforce.  My first “real” job began July 5, 1983 at the company formerly known…

Five for Friday: How Avaya Messaging Service Beats WhatsApp for Business

  • Luke Stangel
  • February 21, 2014 | Estimated reading time: 4 minutes to read
  • By now, you've probably heard whassup about WhatsApp, why both Facebook and, apparently, Google would be willing to spend $19 billion (or more!) for this…

The 'Religious' War Brewing in Unified Communications Security

  • Andrew Prokop
  • February 12, 2014 | Estimated reading time: 4 minutes to read
  • I am surrounded by zealots. No, I am not talking about organized religion. I am talking about tech zealots. You know the type: Mac vs. Windows.  Firefox vs. Chrome.  Android…

Q&A: How to Prevent Hackers, Malware from Disrupting your Unified Communications System

  • Luke Stangel
  • January 30, 2014 | Estimated reading time: 6 minutes to read
  • Business telecommunication systems are the new focus of hacker attacks, according to last week's New York Times and its piece, "Swindlers Use Telephones, with Internet's…

iOS 7's Nine Killer Enterprise Features

  • Luke Stangel
  • September 23, 2013 | Estimated reading time: 2 minutes to read
  • I came across a great SlideShare deck over the weekend entitled, "The iOS 7 Apple Event for the Enterprise - that Never Happened." Created by San…

Five for Friday: Things I Love and Hate about the iPhone 5S

  • Luke Stangel
  • September 20, 2013 | Estimated reading time: 5 minutes to read
  • I'm an iPhone 4S owner who, until this week, had convinced myself that my next phone would be an Android phablet. The LG G2 had…

Unified Communications Creates Security Holes. Here's How To Plug Them.

  • Luke Stangel
  • April 17, 2013 | Estimated reading time: 6 minutes to read
  • UC Exposes Security Gaps That Your Regular Firewall Can't Even Begin To Sew Up. But A Combination Of Smart Policies And The Right Hardware Can…

Video Conferencing Security 101

  • Luke Stangel
  • April 10, 2013 | Estimated reading time: 2 minutes to read
  • Like any IP-based technology, video conferencing is subject to security threats, and IT managers must factor security into their purchase and deployment decisions. Last year,…

Love BYOD but *Hate* VPN? Here's a Solution

  • Luke Stangel
  • March 14, 2013 | Estimated reading time: 3 minutes to read
  • What made Yahoo CEO Marissa Mayer's anti-telecommuting policy so...head-scratching? Because despite her background as a Google executive, Mayer's stance put her in the same camp as basically…