You've requested...

Download this next:

VoIP has never lost its voice: How to get the most out of your business communications

In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce. Increasingly, VoIP capability is being integrated into the leading conferencing and collaboration tools, giving users the option of placing voice calls through a desktop application, an integrated IP phone, or directly through the native dialler on a mobile device. Download our exclusive e-Guide and read more about:

  • VoIP gateway vs. PBX: What is the difference?
  • Verizon Business enriches mobile endpoint for Microsoft Teams
  • Broadband Forum launches app-enabled services network gateway
  • Do you need to manage QoS when deploying VoIP over LAN?
  • What is the difference between IP telephony and VoIP?

These are also closely related to: "Ensuring VoIP Quality of Service"

  • Jargon Buster Guide to Voice over IP (VoIP)

    Voice over IP, or VoIP telephony – the transmission of voice over an IP network as opposed to a traditional telephone network – has become the mainstay of communications in the modern enterprise to the extent that you’d be hard pressed to find a traditional handset in today’s office.

    In this Jargon Buster, we’ll explore some key definitions around this topic, and look at how VoIP fits into the wider unified communications landscape.

  • You’re under SIP attack: Limiting SIP vulnerabilities

    Today, firewalls alone are not enough to provide a secure network. Instead, both enterprise customers and service providers alike need a complete, seamless approach to network security—one that encompasses the unique vulnerabilities of VoIP communications systems—to preempt issues and protect the organization.

    Open this white paper to explore:

    • The threat SIP trunking faces
    • The barriers to SIP security
    • Preparing a defense
    • And more

Find more content like what you just read:

  • Boost Your Work from Home Experience

    Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.

    Download

  • Boost Your Work from Home Experience

    Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.

    Download

  • Voice Network Vulnerabilities in the Enterprise: How to Address Them

    As communications technology has advanced and brought on subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network. Instead, enterprises need a complete, seamless approach to network security to preempt issues and protect their organizations. Access this white paper to learn more.

    Download

  • The development of wired and wireless LANs in a hybrid work model

    Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).

    Download

  • Network Security - Making Sure VoIP Is Not A Security Risk

    Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.

    Download

  • Network Security - Is VoIP A Security Risk?

    Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.

    Download

  • BrightTALK Panel - Sample of Remote Participant - Filmed in London, UK

    1 moderator with 2 participant in studio and 1 participant joining remotely over VOIP

    Download

  • The key to planning for the future of voice systems

    72% of IT decision-makers report that they didn’t feel as though their tech stack wasn’t prepared for the sudden switch to remote work, especially their voice communications systems. So, what are the best ways to future-proof your solutions? Access this guide to learn more.

    Download

  • How is the contact center changing? 5 trends to know

    The contact center of the future is powered by innovative technologies like AI, IoT, and UCaaS. Learn how to transform your contact center experience by leveraging the latest trends in this informative blog post.

    Download

  • Simplify your Communications on MS Teams

    Hybrid work is the new normal, and State Governments and agencies are increasingly looking to transform their employee and citizen experiences through modern digital solutions such as Microsoft Teams. We have seen MS Teams adoption for chat, collaboration and video conferencing grow to over 300M users over the past 5 years, but less than 30% of those users have enabled calling on MS Teams. Now, Verizon has a simple, scalable and reliable solution to enable enterprise grade calling on your MS Teams platform to enhance productivity and improve the digital experience for your agency. Join Verizon on April 19 at 2:00 pm ET as our experts provide an overview of our Verizon VoIP for MS Teams Operator Connect offering, and discuss the benefits of integrating an enterprise grade calling platform with your MS Teams collaboration platform to digitally transform your employee experience, and improve productivity and efficiency in your department, thereby impacting the experiences and quality of services delivered to your constituents. Register now to hear: - The benefits of accessing and integrating Verizon's industry leading SIP solution to your MS Teams platform - An overview of our Verizon VoIP for MS Teams Operator Connect solution - How Verizon can help you transform your department and enable your hybrid work setup

    Download

  • DEMO: How to configure VoIP and ERP optimization for 3000 employees across

    In this video, Cato’s Sr. Sales Engineer Sylvain Chareyre demos IT agility as he configures VoIP and ERP optimization for 3000 employees across the world in minutes. Sylvain shows how an IT manager can instantly make enterprise-wide network changes with Cato. In less than 10 minutes, he deploys UCaaS worldwide, optimize access to an on-premise ERP system, and prepare the network for cloud migration.

    Download

  • DEMO: How to configure VoIP and ERP optimization for 3000 employees across

    In this video, Cato’s Sr. Sales Engineer Sylvain Chareyre demos IT agility as he configures VoIP and ERP optimization for 3000 employees across the world in minutes. Sylvain shows how an IT manager can instantly make enterprise-wide network changes with Cato. In less than 10 minutes, he deploys UCaaS worldwide, optimize access to an on-premise ERP system, and prepare the network for cloud migration.

    Download

  • Ransom DDoS, Meris Botnet, and other DDoS Trends

    The third quarter of 2021 was an exceptionally busy time for attackers. Cloudflare observed and mitigated record-setting HTTP DDoS attacks, terabit-strong network-layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom DDoS attacks targeting Voice over IP (VoIP) service providers around the world. How do organizations ensure that their Internet assets are protected against threats of any size or kind? In this webinar, you’ll discover: • Key DDoS attack trends from Q3 2021 • Ransom DDoS threats — and what you can do if you are affected • How to make the impact of DDoS attacks a thing of the past

    Download

  • What you need to know about the 3CX Cyber Attack

    ReversingLabs Co-Founder/Chief Software Architect Tomislav Pericin and Field CISO Matt Rose delve into the details of the explosive software supply chain attack experienced by 3CX, a provider of enterprise voice over IP (VOIP) solutions. Beginning on March 22nd, 2023, it was discovered that 3CX had released and distributed malware-compromised versions of its 3CXDesktopApp desktop VoIP client directly to customers. While the industry is experiencing the ripple effect of this security incident, early indicators point strongly to a compromise of 3CX’s software build pipeline, leading to malicious code being inserted into the 3CXDesktopApp package. Tomislav & Matt cover the critical details resulting from analysis of the malicious files used in the attack and explore what pre-emptive actions could have been taken by 3CX to prevent this hack and mitigate future attacks following similar patterns. In this webinar, you will learn: ✓ The initial impact of the 3CX software supply chain attack ✓ Where legacy tools and policies failed to detect and address the risks in its software package ✓ Who is responsible for this attack and what it means for software development as a whole ✓ How 3CX and others can detect and mitigate these increasingly advanced software supply chain threats

    Download

  • A Day in the Life of a WLAN Pro - Challenges of Deploying HUGE! K-12 Networks

    Ever wondered what are the challenges of deploying a network in a huge K-12 School? There is a lot of them... • Training local hands-on how to perform a Wi-Fi site survey so you can cover more ground in less time • Troubleshooting PoE problems on VoIP phones • Qualifying fiber connections between campus buildings • Mapping a wired network that wasn't labeled correctly • Validating new AP installations So, how can you effectively tackle this and other challenges? Well, wonder no more! Join us for NetAlly's next live webcast with special guest Keith Parsons, Managing Director at Wireless LAN Professionals, to learn about the challenges he faced while recently deploying a wireless network in a HUGE K-12 school. Plus, how he overcame those challenges!

    Download

  • 2021: DDoS a Year in Review

    Join Imperva DDoS Principal Architect, Alex Bakshtein and Senior Director Network DDoS Sales, Peter Reidy to find out what we learned about DDoS attacks in 2021. Our speakers will review and discuss the DDoS trends and highlights monitored by Imperva during 2021 and how they give us an insight into what to expect in 2022. In this session you will learn how: * Ransom DDoS attacks continued to be one of the biggest threats to organizations’ security in 2021 * DDoS attacks targeted TelCo and VoIP industries and the implications of these attacks * DDoS service outages left many organizations exposed and vulnerable last year -- be prepared for more outages in the future * DDoS has become a board-level problem due to the disruptive impact to organizations

    Download

  • Tolly Group validated VMware SD-WAN speed, quality for remote work

    The Tolly Group puts VMware SD-WAN to the test VMware and Intel commissioned the Tolly Group to benchmark quality of service and remediation capabilities of VMware SD-WAN™ to improve end user experience for VoIP and work-from-anywhere applications using a dual WAN link deployment. The results? VMware SD-WAN delivered good user experiences even with 15% packet loss on a single link. Using Dynamic Multipath Optimization™, VMware SD-WAN delivered excellent voice quality scores despite 20 ms of jitter and 150 ms of latency introduced during testing. Intel developer tools also help optimize SD-WAN packet processing, speed and encryption. Watch this two-minute webinar for a quick take on the results from Kevin Tolly, founder of the Tolly Group. Presenters: - Shefali Chinni, SASE Product Marketing, VMware - Kevin Tolly, Founder, The Tolly Group - Tarun Viswanathan, Principal Engineer, Intel - Swapnil Hendre, Director for Solution Infrastructure and Design, VMware

    Download

  • Streamlining Business Collaboration: Unleashing the Power of Zoom UC

    Managing multiple communication tools can be costly and complicated, but unified communications (UC) solves this problem by combining telephony, instant messaging, and video conferencing on one streamlined platform. When the platform is cloud-based, it's known as unified communications as a service (UCaaS), offering greater flexibility, reliability, and scalability. Zoom's UCaaS platform combines VoIP phone service, video conferencing, chat, and more into a single app, allowing you to spend less time managing different systems and contracts and more time improving productivity, collaboration, and getting work done. In this webinar, you'll gain insights into: - Latest trends shaping the new era of work and why collaboration platforms are essential for managing a highly distributed and collaborative enterprise in 2023. - How a cloud phone solution complements your communication strategy and streamlines your business operations. - Tips and best practices for maximizing the benefits of Zoom's UCaaS platform, improving team communication and collaboration, and increasing productivity. Don't miss out on this opportunity to learn more about Zoom's UCaaS platform and how it can help your team work more efficiently and effectively.

    Download

  • 5 Key Considerations for a Successful Migration from Legacy VPN to ZTNA

    Today, businesses need a modern and robust approach to remote access security. One that delivers zero trust, comprehensive visibility, and advanced data protections across hybrid and remote environments. Designed for only traditional network architectures, VPNs simply don’t match up to securely enable access across all multi-cloud environments. In addition, they are difficult to scale, impact performance, and are costly and complex to maintain. Like all other organizations, Lookout has also faced its fair share of these issues with legacy VPNs. And who better to learn from than someone who's been in the trenches? Hear firsthand from Joel Perkins, Lookout’s head of IT, to discuss how he overcame challenges of a legacy VPN with Lookout Secure Private Access, our zero trust network access (ZTNA) solution. Discover why visibility and control over all your private apps and the data within those apps is crucial, and why remote access via a standard VPN alone doesn’t suffice anymore. Get practical takeaways and strategies for: - Understanding of all private apps: Discovering all private apps that need to be migrated. - Planning migration of apps: Depending on the form factor, whether they are legacy / client server, VoiP or web apps, how can we plan the migration and whether both VPN and ZTNA need to coexist. - Understanding of all users: Whether they are employees, contractors and using managed or unmanaged devices. - Consider Protecting data from deliberate or accidental exfiltration: Avoid deliberate or accidental data exfiltration after access is granted. - Look beyond ZTNA as an integrated platform: Achieve seamless zero trust access with a single-agent, single console, and single policy engine, and support for a multi-cloud environment.

    Download

  • 47-page E-book: Deep Dive on Session Border Controllers

    What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.

    Download

  • 12 top enterprise risk management trends in 2023

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

    Download

  • MicroScope - July-August 2024: Is it worth taking a risk?

    In this issue, we take a closer look at the channel's approach to risk, with experts weighing in on with their approach to playing it safe versus taking steps towards innovation. Also read up on why the time is now to learn about AI-capable PCuse cases, as well as why the human factor should not be underestimated when it comes to AI

    Download

  • Insights on achieving network diversity and business continuity

    Network diversity is crucial for business continuity, but using multiple carriers doesn't always achieve true diversity. Learn how a single carrier with robust network architecture can provide reliable, redundant communications to keep your business connected. Read the full white paper to discover Sinch's approach to network diversity.

    Download

  • The ultimate guide to E911 compliance

    Today, 80% of 911 calls are made from mobile devices, it can be difficult to pinpoint a caller’s location. So, how can emergency services revamp their telecom while ensuring their compliance with new E911 laws? Access this white paper to learn more.

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • A Guide to BYOD-enabled Conference Rooms

    Hybrid work remains standard, challenging businesses to ensure their conferencing technology fosters collaboration and smooth experiences. To do so, many businesses are adopting a bring-your-own-device (BYOD) model for their conference rooms. Browse this white paper to access a shopping list for creating a BYOD conference room for your company.

    Download

  • Jargon Buster Guide to Unified Communications

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

    Download

  • Facilitating day-1 connectivity for construction trailers

    Connecting their on-site engineers and construction trailers is key to Bilfinger SE – an international industrial services provider – meeting their strict deadlines. So, how does Bilfinger facilitate reliable, secure connectivity? Explore this case study to find out.

    Download

  • Communications: Seamlessly connect to any telecom provider

    How can you improve your communications infrastructure to better connect employees and who they interact with? Access this whitepaper to learn how Ribbon’s portfolio is designed to help you move from a complex combination of call control platforms to modern cloud-based infrastructure.

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

    Download

  • Ribbon intelligent session and routing control solutions

    Today’s enterprises strive to maintain and improve customer service while enabling more efficient employee collaboration. Access this white paper to learn how you can achieve this through Ribbon PSX.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Truman Medical Centers/ University Health Charts Big Improvements In Clinician Communication And Satisfaction With Single Mobility Investment

    Electronic health record systems have become the industry standard for many patient care applications and processes. Yet caregivers at the patient’s bedside don’t always have immediate access to this critical information. View this report to access 5 critical steps to developing a clinical mobility strategy for your healthcare facility.

    Download

  • Improving data quality in the age of generative AI

    Generative AI can revolutionize your business. But it relies on one crucial element: high-quality data. This playbook from Alteryx and Databricks, “Improving Data Quality in the Age of Generative AI”, will give you strategies to overcome data quality challenges for your generative AI initiatives. Read on now to learn more.

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • Improve your audio quality to break the circle of frustration

    Poor audio quality can be the thing that makes or breaks a meeting. It also can bring on a sort of “circle of frustration” with a handful of challenges that can plague businesses and their teams. So, how can leaders ensure quality interactions by enhancing their audio tools? Dig into this article to learn more.

    Download

  • Integrating Quality and Risk Operations In Health Plans

    Integrating quality and risk operations in health plans can improve member satisfaction, provider efficiency, and financial performance. Learn how to consolidate data, align departments, and implement best practices for a unified approach. Read the full white paper to discover the benefits of this integration.

    Download

  • Unified Communication: “It should work as easily as a telephone call!”

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

    Download

  • Qualys Technical Series Webinar - Best Practices to Optimize your Data Quality

    To be able to understand what risks you have in your environment you need to ensure that the data quality within your Vulnerability Management solution is accurate, because Rubbish In = Rubbish Out. Join us to learn some best practices to ensure the data quality within Qualys subscriptions are as good as they can be. Connect with us on Tuesday 10th October in our Qualys Technical Series to discover: • How do you identify issues in your subscription • How do you ensure your data is kept to a good standard • The benefits that this will bring to your risk management program Register now and don't miss this opportunity to optimize the quality of data within your Qualys subscription.

    Download

  • Audio quality & hybrid work: What to know for success

    As the world continues to favor hybrid work models, it’s crucial for organizations to have the proper tools and technology to enable effective collaboration and communication from anywhere. This starts with your audio quality. Tune into this podcast to learn more.

    Download

  • 5 verticals, 5 SASE strategies: Brief e-book

    Download this e-book to learn how SASE can augment security postures in 5 verticals, including manufacturing and technology.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • For Dummies E-book: Data Observability

    This For Dummies e-book explores the evolving landscape of data management and the crucial role that detecting, resolving, and preventing data issues (also known as data observability) plays in this process. Read on to gain a deeper understanding of the value data observability brings to your organization.

    Download

  • Data for AI: Do You Trust in Data for AI?

    Data quality is foundational to success with AI. Most organizations venture into AI without assessing and investing in data quality leading to failed AI initiatives. How do you assess and improve data quality to ensure success with your AI applications? What tools and platforms are available for you to use and apply?

    Download

  • A Computer Weekly buyer's guide to applications of next-generation networking

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

    Download

  • Focus: Network security

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

    Download