251 Results for:SIP
- Sort by:
Securing the enterprise VoIP perimeter
19 Jun 2007How to make VoIP work without sacrificing firewalls or network perimeter security. Read More
Unified communications infrastructure threats and defense strategies
17 Jul 2007Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing ... Read More
Cisco UCM voice over IP system: Product overview
02 Oct 2015Designed for small and medium businesses, as well as large enterprises, Cisco UCM provides voice over IP technology that can replace a legacy telephone system. Read More
Cisco says it can't reproduce PIX flaw
15 Aug 2006Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful. Read More
When networks collide: how M&A brings infrastructure together
30 Aug 2018Enterprise IT runs on networking, so fixing up the network should be a priority issue during mergers and acquisitions – but that’s not always the case. Find out how the pros manage it Read More
What is tromboning?
27 Jul 2005In this expert reply, Patrick Ferriter explains what tromboning means in VoIP. Read More
What is the difference between gateways and gatekeepers?
09 Feb 2004Learn what the difference is between a network gateway and a gatekeeper in this Ask the Expert response. Read More
Design redundancy into VoIP communication systems
06 Apr 2015Implementing redundancy at the VoIP and network infrastructure levels is an integral part of VoIP communication, ensuring call and business continuity. Read More
VoIP, unified communications prompt new technologies, threats
09 Sep 2007Wireless voice servers and handsets, VoIP and unified communications threats, and licensing agreements constitute recent changes in the VoIP market. Read More
VoIP vulnerability threatens data
13 Aug 2007VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Read More