Troubleshooting VoIP
By: SUSE View more from SUSE >>
Download this next:
VoIP has never lost its voice: How to get the most out of your business communications
By: TechTarget ComputerWeekly.com
Type: eBook
In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce. Increasingly, VoIP capability is being integrated into the leading conferencing and collaboration tools, giving users the option of placing voice calls through a desktop application, an integrated IP phone, or directly through the native dialler on a mobile device. Download our exclusive e-Guide and read more about:
- VoIP gateway vs. PBX: What is the difference?
- Verizon Business enriches mobile endpoint for Microsoft Teams
- Broadband Forum launches app-enabled services network gateway
- Do you need to manage QoS when deploying VoIP over LAN?
- What is the difference between IP telephony and VoIP?
These are also closely related to: "Troubleshooting VoIP"
-
Jargon Buster Guide to Voice over IP (VoIP)
By: TechTarget ComputerWeekly.com
Type: eGuide
Voice over IP, or VoIP telephony – the transmission of voice over an IP network as opposed to a traditional telephone network – has become the mainstay of communications in the modern enterprise to the extent that you’d be hard pressed to find a traditional handset in today’s office.
In this Jargon Buster, we’ll explore some key definitions around this topic, and look at how VoIP fits into the wider unified communications landscape.
-
The development of wired and wireless LANs in a hybrid work model
By: TechTarget ComputerWeekly.com
Type: eBook
Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs). Download our exclusive e-Guide and read more about:
- Network virtualization benefits in the LAN, WAN and data center
- Do you need to manage QoS when deploying VoIP over LAN?
- Australia’s Macquarie Telecom debuts SD-LAN service
- Considering the differences in LAN vs. WAN security
Find more content like what you just read:
-
You’re under SIP attack: Limiting SIP vulnerabilities
By: Ribbon Communications
Type: White Paper
Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.
-
Network Security - Making Sure VoIP Is Not A Security Risk
By:
Type: Replay
Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.
-
Network Security - Is VoIP A Security Risk?
By:
Type: Replay
Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.
-
Voice Network Vulnerabilities in the Enterprise: How to Address Them
By: Ribbon Communications
Type: White Paper
As communications technology has advanced and brought on subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network. Instead, enterprises need a complete, seamless approach to network security to preempt issues and protect their organizations. Access this white paper to learn more.
-
BrightTALK Panel - Sample of Remote Participant - Filmed in London, UK
By:
Type: Video
1 moderator with 2 participant in studio and 1 participant joining remotely over VOIP
-
The key to planning for the future of voice systems
By: Sinch
Type: White Paper
72% of IT decision-makers report that they didn’t feel as though their tech stack wasn’t prepared for the sudden switch to remote work, especially their voice communications systems. So, what are the best ways to future-proof your solutions? Access this guide to learn more.
-
Boost Your Work from Home Experience
By:
Type: Replay
Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.
-
Boost Your Work from Home Experience
By:
Type: Talk
Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.
-
How is the contact center changing? 5 trends to know
By: Intervision
Type: Blog
The contact center of the future is powered by innovative technologies like AI, IoT, and UCaaS. Learn how to transform your contact center experience by leveraging the latest trends in this informative blog post.
-
DEMO: How to configure VoIP and ERP optimization for 3000 employees across
By: Cato Networks
Type: Replay
In this video, Cato’s Sr. Sales Engineer Sylvain Chareyre demos IT agility as he configures VoIP and ERP optimization for 3000 employees across the world in minutes. Sylvain shows how an IT manager can instantly make enterprise-wide network changes with Cato. In less than 10 minutes, he deploys UCaaS worldwide, optimize access to an on-premise ERP system, and prepare the network for cloud migration.
-
DEMO: How to configure VoIP and ERP optimization for 3000 employees across
By: Cato Networks
Type: Replay
In this video, Cato’s Sr. Sales Engineer Sylvain Chareyre demos IT agility as he configures VoIP and ERP optimization for 3000 employees across the world in minutes. Sylvain shows how an IT manager can instantly make enterprise-wide network changes with Cato. In less than 10 minutes, he deploys UCaaS worldwide, optimize access to an on-premise ERP system, and prepare the network for cloud migration.
-
A Day in the Life of a WLAN Pro - Challenges of Deploying HUGE! K-12 Networks
By:
Type: Talk
Ever wondered what are the challenges of deploying a network in a huge K-12 School? There is a lot of them... • Training local hands-on how to perform a Wi-Fi site survey so you can cover more ground in less time • Troubleshooting PoE problems on VoIP phones • Qualifying fiber connections between campus buildings • Mapping a wired network that wasn't labeled correctly • Validating new AP installations So, how can you effectively tackle this and other challenges? Well, wonder no more! Join us for NetAlly's next live webcast with special guest Keith Parsons, Managing Director at Wireless LAN Professionals, to learn about the challenges he faced while recently deploying a wireless network in a HUGE K-12 school. Plus, how he overcame those challenges!
-
Ransom DDoS, Meris Botnet, and other DDoS Trends
By:
Type: Replay
The third quarter of 2021 was an exceptionally busy time for attackers. Cloudflare observed and mitigated record-setting HTTP DDoS attacks, terabit-strong network-layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom DDoS attacks targeting Voice over IP (VoIP) service providers around the world. How do organizations ensure that their Internet assets are protected against threats of any size or kind? In this webinar, you’ll discover: • Key DDoS attack trends from Q3 2021 • Ransom DDoS threats — and what you can do if you are affected • How to make the impact of DDoS attacks a thing of the past
-
Simplify your Communications on MS Teams
By:
Type: Talk
Hybrid work is the new normal, and State Governments and agencies are increasingly looking to transform their employee and citizen experiences through modern digital solutions such as Microsoft Teams. We have seen MS Teams adoption for chat, collaboration and video conferencing grow to over 300M users over the past 5 years, but less than 30% of those users have enabled calling on MS Teams. Now, Verizon has a simple, scalable and reliable solution to enable enterprise grade calling on your MS Teams platform to enhance productivity and improve the digital experience for your agency. Join Verizon on April 19 at 2:00 pm ET as our experts provide an overview of our Verizon VoIP for MS Teams Operator Connect offering, and discuss the benefits of integrating an enterprise grade calling platform with your MS Teams collaboration platform to digitally transform your employee experience, and improve productivity and efficiency in your department, thereby impacting the experiences and quality of services delivered to your constituents. Register now to hear: - The benefits of accessing and integrating Verizon's industry leading SIP solution to your MS Teams platform - An overview of our Verizon VoIP for MS Teams Operator Connect solution - How Verizon can help you transform your department and enable your hybrid work setup
-
What you need to know about the 3CX Cyber Attack
By:
Type: Video
ReversingLabs Co-Founder/Chief Software Architect Tomislav Pericin and Field CISO Matt Rose delve into the details of the explosive software supply chain attack experienced by 3CX, a provider of enterprise voice over IP (VOIP) solutions. Beginning on March 22nd, 2023, it was discovered that 3CX had released and distributed malware-compromised versions of its 3CXDesktopApp desktop VoIP client directly to customers. While the industry is experiencing the ripple effect of this security incident, early indicators point strongly to a compromise of 3CX’s software build pipeline, leading to malicious code being inserted into the 3CXDesktopApp package. Tomislav & Matt cover the critical details resulting from analysis of the malicious files used in the attack and explore what pre-emptive actions could have been taken by 3CX to prevent this hack and mitigate future attacks following similar patterns. In this webinar, you will learn: ✓ The initial impact of the 3CX software supply chain attack ✓ Where legacy tools and policies failed to detect and address the risks in its software package ✓ Who is responsible for this attack and what it means for software development as a whole ✓ How 3CX and others can detect and mitigate these increasingly advanced software supply chain threats
-
2021: DDoS a Year in Review
By:
Type: Talk
Join Imperva DDoS Principal Architect, Alex Bakshtein and Senior Director Network DDoS Sales, Peter Reidy to find out what we learned about DDoS attacks in 2021. Our speakers will review and discuss the DDoS trends and highlights monitored by Imperva during 2021 and how they give us an insight into what to expect in 2022. In this session you will learn how: * Ransom DDoS attacks continued to be one of the biggest threats to organizations’ security in 2021 * DDoS attacks targeted TelCo and VoIP industries and the implications of these attacks * DDoS service outages left many organizations exposed and vulnerable last year -- be prepared for more outages in the future * DDoS has become a board-level problem due to the disruptive impact to organizations
-
Tolly Group validated VMware SD-WAN speed, quality for remote work
By:
Type: Talk
The Tolly Group puts VMware SD-WAN to the test VMware and Intel commissioned the Tolly Group to benchmark quality of service and remediation capabilities of VMware SD-WAN™ to improve end user experience for VoIP and work-from-anywhere applications using a dual WAN link deployment. The results? VMware SD-WAN delivered good user experiences even with 15% packet loss on a single link. Using Dynamic Multipath Optimization™, VMware SD-WAN delivered excellent voice quality scores despite 20 ms of jitter and 150 ms of latency introduced during testing. Intel developer tools also help optimize SD-WAN packet processing, speed and encryption. Watch this two-minute webinar for a quick take on the results from Kevin Tolly, founder of the Tolly Group. Presenters: - Shefali Chinni, SASE Product Marketing, VMware - Kevin Tolly, Founder, The Tolly Group - Tarun Viswanathan, Principal Engineer, Intel - Swapnil Hendre, Director for Solution Infrastructure and Design, VMware
-
Streamlining Business Collaboration: Unleashing the Power of Zoom UC
By:
Type: Video
Managing multiple communication tools can be costly and complicated, but unified communications (UC) solves this problem by combining telephony, instant messaging, and video conferencing on one streamlined platform. When the platform is cloud-based, it's known as unified communications as a service (UCaaS), offering greater flexibility, reliability, and scalability. Zoom's UCaaS platform combines VoIP phone service, video conferencing, chat, and more into a single app, allowing you to spend less time managing different systems and contracts and more time improving productivity, collaboration, and getting work done. In this webinar, you'll gain insights into: - Latest trends shaping the new era of work and why collaboration platforms are essential for managing a highly distributed and collaborative enterprise in 2023. - How a cloud phone solution complements your communication strategy and streamlines your business operations. - Tips and best practices for maximizing the benefits of Zoom's UCaaS platform, improving team communication and collaboration, and increasing productivity. Don't miss out on this opportunity to learn more about Zoom's UCaaS platform and how it can help your team work more efficiently and effectively.
-
5 Key Considerations for a Successful Migration from Legacy VPN to ZTNA
By:
Type: Replay
Today, businesses need a modern and robust approach to remote access security. One that delivers zero trust, comprehensive visibility, and advanced data protections across hybrid and remote environments. Designed for only traditional network architectures, VPNs simply don’t match up to securely enable access across all multi-cloud environments. In addition, they are difficult to scale, impact performance, and are costly and complex to maintain. Like all other organizations, Lookout has also faced its fair share of these issues with legacy VPNs. And who better to learn from than someone who's been in the trenches? Hear firsthand from Joel Perkins, Lookout’s head of IT, to discuss how he overcame challenges of a legacy VPN with Lookout Secure Private Access, our zero trust network access (ZTNA) solution. Discover why visibility and control over all your private apps and the data within those apps is crucial, and why remote access via a standard VPN alone doesn’t suffice anymore. Get practical takeaways and strategies for: - Understanding of all private apps: Discovering all private apps that need to be migrated. - Planning migration of apps: Depending on the form factor, whether they are legacy / client server, VoiP or web apps, how can we plan the migration and whether both VPN and ZTNA need to coexist. - Understanding of all users: Whether they are employees, contractors and using managed or unmanaged devices. - Consider Protecting data from deliberate or accidental exfiltration: Avoid deliberate or accidental data exfiltration after access is granted. - Look beyond ZTNA as an integrated platform: Achieve seamless zero trust access with a single-agent, single console, and single policy engine, and support for a multi-cloud environment.
-
Jargon Buster Guide to Unified Communications
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.
-
47-page E-book: Deep Dive on Session Border Controllers
By: Ribbon Communications
Type: eBook
What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.
-
Why Does a Construction Company Use LTE Routers?
By: Cradlepoint
Type: Case Study
Connecting their on-site engineers and construction trailers is key to Bilfinger SE – an international industrial services provider – meeting their strict deadlines. So, how does Bilfinger facilitate reliable, secure connectivity? Explore this case study to find out.
-
Communications: Seamlessly connect to any telecom provider
By: Ribbon Communications
Type: White Paper
How can you improve your communications infrastructure to better connect employees and who they interact with? Access this whitepaper to learn how Ribbon’s portfolio is designed to help you move from a complex combination of call control platforms to modern cloud-based infrastructure.
-
Truman Medical Centers/ University Health Charts Big Improvements In Clinician Communication And Satisfaction With Single Mobility Investment
By: Zebra Technologies
Type: White Paper
Electronic health record systems have become the industry standard for many patient care applications and processes. Yet caregivers at the patient’s bedside don’t always have immediate access to this critical information. View this report to access 5 critical steps to developing a clinical mobility strategy for your healthcare facility.
-
Elevate your user experience with Lenovo
By: Insight
Type: Product Overview
In this product overview, you’ll learn how you can leverage the Lenovo ThinkCentre to deliver improved performance for data-crunching tasks and enhance the user experience. Read on now to find out how you can optimize your compute power with this business-ready desktop.
-
Commercial software risk assessment and management insights
By: ReversingLabs
Type: White Paper
Enterprises face growing risks and regulatory demands to secure third-party software. Spectra Assure's white paper details how its binary analysis identifies threats like malware and vulnerabilities in commercial software without source code. Discover risk management strategies by reading the full paper.
-
The rise and rise of SD-WAN in post Covid-19
By: TechTarget ComputerWeekly.com
Type: eGuide
So much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).
-
Ribbon intelligent session and routing control solutions
By: Ribbon Communications
Type: White Paper
Today’s enterprises strive to maintain and improve customer service while enabling more efficient employee collaboration. Access this white paper to learn how you can achieve this through Ribbon PSX.
-
A Computer Weekly buyer's guide to applications of next-generation networking
By: TechTarget ComputerWeekly.com
Type: eGuide
The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses
-
Focus: Network security
By: TechTarget ComputerWeekly.com
Type: eGuide
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
-
A Subway franchisee’s network refresh: Case study
By: Cradlepoint
Type: Case Study
DiPasqua Enterprises runs over 100 Subway locations. To support its expansive franchise portfolio, DiPasqua Enterprises performed a network refresh. Tap into this case study to discover what that refresh required and the outcomes that it has delivered.
-
Infographic: Zoom vs Teams vs Cisco
By: TechTarget ComputerWeekly.com
Type: eGuide
While all video conferencing tools perform broadly similar tasks, there are certain differences between products and providers.Here we examine the Cisco, Microsoft, and Zoom platforms, highlight the unique features of each product, and explain how the products differ from one another.
-
5 verticals, 5 SASE strategies: Brief e-book
By: Cato Networks
Type: eBook
Download this e-book to learn how SASE can augment security postures in 5 verticals, including manufacturing and technology.
-
Better respond to 911 calls while ensuring compliance
By: Sinch
Type: eBook
Today, 80% of 911 calls are made from mobile devices, it can be difficult to pinpoint a caller’s location. So, how can emergency services revamp their telecom while ensuring their compliance with new E911 laws? Access this white paper to learn more.
-
Unified Communication: “It should work as easily as a telephone call!”
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
How cloud-hosted voice can help elevate workplace flexibility and EX
By: Zoom Video Communications
Type: Infographic
Cloud-hosted voice solutions empower workplace flexibility and enhance employee experience. Learn how cloud-based voice platforms can transform your organization by integrating with collaboration tools and leveraging AI and analytics.
-
CW Middle East July-September 2020: Technology helps SMEs in UAE combat coronavirus crisis
By: TechTarget ComputerWeekly.com
Type: eGuide
The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.
-
CW Middle East July-September 2020: Technology helps SMEs in UAE combat coronavirus crisis
By: TechTarget ComputerWeekly.com
Type: Ezine
The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.
-
SD-WAN: Hitting the mainstream
By: TechTarget ComputerWeekly.com
Type: eGuide
For the networking industry, 2018 was the year that interest in software-defined wide area network started to ramp up in earnest, as more enterprises started to assess the benefits of the technology, and more early adopters started to make concrete purchasing decisions. In this e-guide, our experts explore the state of play in the SD-WAN market.
-
E-book: Maximizing LTE and 5G Inside and Beyond Retail Stores
By: Cradlepoint
Type: eBook
What unique networking challenges do retailers encounter? Along with unpacking 7 of them, including connectivity for pop-up stores and out-of-band management for branch continuity, this 17-page e-book explores retailers’ stories of networking success. Download the book to learn about the journeys of PANDORA, T-Mobile and more.
-
MicroScope's ultimate guide to the digital transformation and emerging opportunities for the channel
By: MicroScope
Type: eGuide
The phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.
-
A Guide to BYOD-enabled Conference Rooms
By: Shure Inc
Type: White Paper
Hybrid work remains standard, challenging businesses to ensure their conferencing technology fosters collaboration and smooth experiences. To do so, many businesses are adopting a bring-your-own-device (BYOD) model for their conference rooms. Browse this white paper to access a shopping list for creating a BYOD conference room for your company.
-
CIO Trends #11: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
-
CIO Trends #11: Middle East
By: TechTarget ComputerWeekly.com
Type: eGuide
Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.
-
Insights on achieving network diversity and business continuity
By: Sinch
Type: White Paper
Network diversity is crucial for business continuity, but using multiple carriers doesn't always achieve true diversity. Learn how a single carrier with robust network architecture can provide reliable, redundant communications to keep your business connected. Read the full white paper to discover Sinch's approach to network diversity.
-
How AI-Powered Phones Are Changing The Modern Workplace
By: Zoom Video Communications
Type: eBook
As remote and hybrid work become the norm, businesses need to rethink how their teams communicate and collaborate. Access this e-book to discover how an AI-powered phone system like Zoom Phone can streamline your communication tools, boost productivity, and improve the employee and customer experience.
-
Assess & Manage Your Commercial Software Risk
By: ReversingLabs
Type: White Paper
How do you know the commercial software you bring into your organization is safe? With Industry analysts seeing a 300% to 1000% increase in attacks targeting the commercial software businesses, it represents the largest under-addressed attack surface. Download this White Paper to learn more.