251 Results for:SIP

  • Sort by: 

Securing the enterprise VoIP perimeter

By Gary Audin 19 Jun 2007

How to make VoIP work without sacrificing firewalls or network perimeter security. Read More

Unified communications infrastructure threats and defense strategies

By John Burke 17 Jul 2007

Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing ... Read More

Cisco UCM voice over IP system: Product overview

By Chris Partsenidis 02 Oct 2015

Designed for small and medium businesses, as well as large enterprises, Cisco UCM provides voice over IP technology that can replace a legacy telephone system. Read More

Cisco says it can't reproduce PIX flaw

By Bill Brenner 15 Aug 2006

Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful. Read More

When networks collide: how M&A brings infrastructure together

By Alex Scroxton 30 Aug 2018

Enterprise IT runs on networking, so fixing up the network should be a priority issue during mergers and acquisitions – but that’s not always the case. Find out how the pros manage it Read More

What is tromboning?

27 Jul 2005

In this expert reply, Patrick Ferriter explains what tromboning means in VoIP. Read More

What is the difference between gateways and gatekeepers?

09 Feb 2004

Learn what the difference is between a network gateway and a gatekeeper in this Ask the Expert response. Read More

Design redundancy into VoIP communication systems

By Chris Partsenidis 06 Apr 2015

Implementing redundancy at the VoIP and network infrastructure levels is an integral part of VoIP communication, ensuring call and business continuity. Read More

VoIP, unified communications prompt new technologies, threats

09 Sep 2007

Wireless voice servers and handsets, VoIP and unified communications threats, and licensing agreements constitute recent changes in the VoIP market. Read More

VoIP vulnerability threatens data

13 Aug 2007

VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Read More