From the Hacker's Point of View: Why SIP Attacks are Child's Play

We often talk about how important it is for enterprises to secure their SIP implementations against hackers. What we don't often talk about is how easy it is for hackers to get into an unsecured SIP. (Spoiler alert: It's pretty easy.) The media often depicts hacking as a complicated process involving obscure entries in a command-line interface, but taking control of an unsecured SIP is literally a three-step process.

CS2100 and SL-100 Customers – There’s Still Plenty of Open Road Ahead

Wondering what your options are when one of your traditional communications vendors suggests you rip out your legacy Nortel infrastructure so you can replace one proprietary platform with another? Why spend more money to be vendor-locked, have to retrain your team, and disrupt your end-users lives with a new expensive plastic phone that they didn’t request?

Enterprising Strategies: How Real Time Communications Apps are Delivering Value in Healthcare, Government, Financial Services & Education

Business today gets done online, and the digital transformation of large enterprises is driving nearly every single transaction to the cloud, the web, mobile apps, and more.

The virtualization of these digital enterprises is creating substantial gains in employee productivity, with an unprecedented number of them “dialing in” from remote locations, and a parallel growth in the number of on-site workers in offices, hospitals and medical clinics, in classrooms, public venues and more staying connected using business workflow apps as companions.

In an Increasingly Interconnected World a Rosetta Stone for Messaging Makes all the Difference

As communications networks evolve, interconnects tend to grow in numbers and complexity. Carriers and enterprises are converting core networks to IP, and are using IP to con­nect with peering entities. For the network core to deal with the emerging universe of applications, networks and devices, those elements must first be normalized at the edge.

The Five Trends in Service Provider Network Transformation from our Conversations with Global Leaders

Over the last several years, we have been working with some of the largest and most successful Communications Service Providers (CSPs) in the world, and it's been fascinating to be part of their transformation teams, contributing to their large-scale projects, as virtualized and software defined networks emerge and legacy networks continue to fade into the past.