Enabling today’s workforce requires businesses to think outside of the meeting room. Remote employees, mobile-reliant teams, and an increased need for collaboration all require new tools and technology to get the job done successfully.
In this issue we focus on Security.

Kicking off Cybersecurity Month – Build a Secure Cyber Foundation

October is Cybersecurity Awareness Month in the United States, European Union, and many countries around the world. Cybersecurity Awareness Month brings to light the many successes we’ve realized and the struggles we continue to face – a sobering reminder that our work is far from finished.

Read More

Contributor: Cisco

.

Why Quality of Service is Critical For Enterprise Cloud Services

The UCaaS market is accelerating at an annualized rate of 29% due to the continued erosion of on-premises PBX systems, which declined -11%, and the rapid pace of adoption among enterprises that are migrating to the cloud looking for richer and more cost-effective collaborative communication solutions,” says Jeremy Duke, Synergy Research Group’s founder and chief analyst

Learn More

Contributor: RingCentral

New Fortinet Security Fabric Capabilities for Microsoft Azure

This week during Microsoft’s Ignite conference, we introduced new Fortinet Security Fabric capabilities for the Azure cloud, further establishing our leadership position of offering the broadest, most consistent security capability sets across all public clouds. With these new capabilities for Azure, we now support even more cloud security use cases for our customers.

Learn More

Contributor: Fortinet

Know What’s Really Happening on Your Network

Trying to understand every endpoint— think smartphones, tablets, printers, you name it — is what I refer to as the “unknown unknown” problem. You may know what endpoints report back on the network. You may know what endpoints once did report back, but no longer do. But what about the endpoints that were never audited? Or how about new endpoints being connected and authenticated?

Read More

Contributor: Gigamon

SBCs Security Challenges of the Future

There’s no question that Session Border Controllers (SBCs) are a key element to any VoIP network. The main drivers behind the SBCs are: 1) the adoption of SIP trunking services and 2) the interconnectivity between systems within the enterprise network such as PBXs, Unified Communications, video conferencing and contact center platforms. An SBC’s primary function is to provide VoIP security, analyzing and protecting mission critical VoIP applications from malicious activity. While firewalls and SBCs seem to accomplish the same security goals, SBCs take traffic management to the next level. Click here for a white paper that examines the evolution of the SBCs and related security considerations.

Read More

Contributor: AudioCodes

When It Comes to the Communications Cloud, You Cannot Manage What You Cannot Measure

As more and more real-time communications – whether voice, messaging, video or collaboration – move to distributed software and cloud infrastructure, the management and security of real-time services becomes increasingly complex.

Learn More

Contributor: Ribbon

Ensure business continuity and disaster recovery compliance

Veeam® Availability Orchestrator coupled with Veeam Backup & Replication™, automates the process of creating, documenting and testing disaster recovery (DR) plans that ensure business continuity and meet compliance.

Watch Video

Contributor: Veeam

Crestron DM NVX: Secure Network AV

Thousands of companies across hundreds of industries, government agencies, universities, and more have standardized on Crestron DigitalMedia™ as their AV distribution solution. They trust and rely on it to make their lives simpler and more successful every day. Central to that success is Crestron’s unwavering commitment to network security. Simply put, “If it’s on the network, it must be secure.”

Read More

Contributor: Crestron

Implementing an adequate security system was needed to ensure the safety of fans

Until recently, the security system in major soccer stadiums in Montevideo (particularly, the Centenario, the Campeón del Siglo, and the Gran Parque Central) boiled down to a scant number of cameras located in some stands and bleacher sections. These were very simple and basic systems that weren’t very effective. Anytime an incident occurred, there was neither control nor evidence that law enforcement authorities could depend upon.

Learn More

Contributor: Viewsonic

UC Today recently spoke with Nectar’s Joe Fuccillo and Ribbon’s Kevin Isacks on UC Network Security

Podcast – Out Loud: Securing the Enterprise UC Network. Listen to Ribbon and Nectar discuss their perspectives and solutions when it comes to securing UC networks.

Listen to Podcast

Contributor: Nectar

Uptime at private school is now by the books with Eaton

Sporadic power outages largely fueled by unpredictable weather conditions prompted the school to seek a high-quality power protection solution. Central Catholic required a robust uninterruptible power system (UPS) capable of safeguarding the campus’ complete network environment,  security system, phone,  a dozen switches, and several other appliances.

Read more

Contributor: Eaton