You've requested...

Download this next:

VoIP has never lost its voice: How to get the most out of your business communications

In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce. Increasingly, VoIP capability is being integrated into the leading conferencing and collaboration tools, giving users the option of placing voice calls through a desktop application, an integrated IP phone, or directly through the native dialler on a mobile device. Download our exclusive e-Guide and read more about:

  • VoIP gateway vs. PBX: What is the difference?
  • Verizon Business enriches mobile endpoint for Microsoft Teams
  • Broadband Forum launches app-enabled services network gateway
  • Do you need to manage QoS when deploying VoIP over LAN?
  • What is the difference between IP telephony and VoIP?

These are also closely related to: "Troubleshooting VoIP"

  • Jargon Buster Guide to Voice over IP (VoIP)

    Voice over IP, or VoIP telephony – the transmission of voice over an IP network as opposed to a traditional telephone network – has become the mainstay of communications in the modern enterprise to the extent that you’d be hard pressed to find a traditional handset in today’s office.

    In this Jargon Buster, we’ll explore some key definitions around this topic, and look at how VoIP fits into the wider unified communications landscape.

  • The development of wired and wireless LANs in a hybrid work model

    Many companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs). Download our exclusive e-Guide and read more about:

    • Network virtualization benefits in the LAN, WAN and data center
    • Do you need to manage QoS when deploying VoIP over LAN?
    • Australia’s Macquarie Telecom debuts SD-LAN service
    • Considering the differences in LAN vs. WAN security

Find more content like what you just read:

  • Network Security - Making Sure VoIP Is Not A Security Risk

    Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.

    Download

  • Network Security - Is VoIP A Security Risk?

    Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.

    Download

  • BrightTALK Panel - Sample of Remote Participant - Filmed in London, UK

    1 moderator with 2 participant in studio and 1 participant joining remotely over VOIP

    Download

  • The key to planning for the future of voice systems

    72% of IT decision-makers report that they didn’t feel as though their tech stack wasn’t prepared for the sudden switch to remote work, especially their voice communications systems. So, what are the best ways to future-proof your solutions? Access this guide to learn more.

    Download

  • Boost Your Work from Home Experience

    Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.

    Download

  • Boost Your Work from Home Experience

    Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.

    Download

  • Top contact center technology trends to know

    The contact center of the future is powered by innovative technologies like AI, IoT, and UCaaS. Learn how to transform your contact center experience by leveraging the latest trends in this informative blog post.

    Download

  • DEMO: How to configure VoIP and ERP optimization for 3000 employees across

    In this video, Cato’s Sr. Sales Engineer Sylvain Chareyre demos IT agility as he configures VoIP and ERP optimization for 3000 employees across the world in minutes. Sylvain shows how an IT manager can instantly make enterprise-wide network changes with Cato. In less than 10 minutes, he deploys UCaaS worldwide, optimize access to an on-premise ERP system, and prepare the network for cloud migration.

    Download

  • DEMO: How to configure VoIP and ERP optimization for 3000 employees across

    In this video, Cato’s Sr. Sales Engineer Sylvain Chareyre demos IT agility as he configures VoIP and ERP optimization for 3000 employees across the world in minutes. Sylvain shows how an IT manager can instantly make enterprise-wide network changes with Cato. In less than 10 minutes, he deploys UCaaS worldwide, optimize access to an on-premise ERP system, and prepare the network for cloud migration.

    Download

  • A Day in the Life of a WLAN Pro - Challenges of Deploying HUGE! K-12 Networks

    Ever wondered what are the challenges of deploying a network in a huge K-12 School? There is a lot of them... • Training local hands-on how to perform a Wi-Fi site survey so you can cover more ground in less time • Troubleshooting PoE problems on VoIP phones • Qualifying fiber connections between campus buildings • Mapping a wired network that wasn't labeled correctly • Validating new AP installations So, how can you effectively tackle this and other challenges? Well, wonder no more! Join us for NetAlly's next live webcast with special guest Keith Parsons, Managing Director at Wireless LAN Professionals, to learn about the challenges he faced while recently deploying a wireless network in a HUGE K-12 school. Plus, how he overcame those challenges!

    Download

  • Ransom DDoS, Meris Botnet, and other DDoS Trends

    The third quarter of 2021 was an exceptionally busy time for attackers. Cloudflare observed and mitigated record-setting HTTP DDoS attacks, terabit-strong network-layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom DDoS attacks targeting Voice over IP (VoIP) service providers around the world. How do organizations ensure that their Internet assets are protected against threats of any size or kind? In this webinar, you’ll discover: • Key DDoS attack trends from Q3 2021 • Ransom DDoS threats — and what you can do if you are affected • How to make the impact of DDoS attacks a thing of the past

    Download

  • Simplify your Communications on MS Teams

    Hybrid work is the new normal, and State Governments and agencies are increasingly looking to transform their employee and citizen experiences through modern digital solutions such as Microsoft Teams. We have seen MS Teams adoption for chat, collaboration and video conferencing grow to over 300M users over the past 5 years, but less than 30% of those users have enabled calling on MS Teams. Now, Verizon has a simple, scalable and reliable solution to enable enterprise grade calling on your MS Teams platform to enhance productivity and improve the digital experience for your agency. Join Verizon on April 19 at 2:00 pm ET as our experts provide an overview of our Verizon VoIP for MS Teams Operator Connect offering, and discuss the benefits of integrating an enterprise grade calling platform with your MS Teams collaboration platform to digitally transform your employee experience, and improve productivity and efficiency in your department, thereby impacting the experiences and quality of services delivered to your constituents. Register now to hear: - The benefits of accessing and integrating Verizon's industry leading SIP solution to your MS Teams platform - An overview of our Verizon VoIP for MS Teams Operator Connect solution - How Verizon can help you transform your department and enable your hybrid work setup

    Download

  • What you need to know about the 3CX Cyber Attack

    ReversingLabs Co-Founder/Chief Software Architect Tomislav Pericin and Field CISO Matt Rose delve into the details of the explosive software supply chain attack experienced by 3CX, a provider of enterprise voice over IP (VOIP) solutions. Beginning on March 22nd, 2023, it was discovered that 3CX had released and distributed malware-compromised versions of its 3CXDesktopApp desktop VoIP client directly to customers. While the industry is experiencing the ripple effect of this security incident, early indicators point strongly to a compromise of 3CX’s software build pipeline, leading to malicious code being inserted into the 3CXDesktopApp package. Tomislav & Matt cover the critical details resulting from analysis of the malicious files used in the attack and explore what pre-emptive actions could have been taken by 3CX to prevent this hack and mitigate future attacks following similar patterns. In this webinar, you will learn: ✓ The initial impact of the 3CX software supply chain attack ✓ Where legacy tools and policies failed to detect and address the risks in its software package ✓ Who is responsible for this attack and what it means for software development as a whole ✓ How 3CX and others can detect and mitigate these increasingly advanced software supply chain threats

    Download

  • 2021: DDoS a Year in Review

    Join Imperva DDoS Principal Architect, Alex Bakshtein and Senior Director Network DDoS Sales, Peter Reidy to find out what we learned about DDoS attacks in 2021. Our speakers will review and discuss the DDoS trends and highlights monitored by Imperva during 2021 and how they give us an insight into what to expect in 2022. In this session you will learn how: * Ransom DDoS attacks continued to be one of the biggest threats to organizations’ security in 2021 * DDoS attacks targeted TelCo and VoIP industries and the implications of these attacks * DDoS service outages left many organizations exposed and vulnerable last year -- be prepared for more outages in the future * DDoS has become a board-level problem due to the disruptive impact to organizations

    Download

  • 5 game-changing ZTNA capabilities with ZPA

    Zscaler Private Access (ZPA) has been at the forefront of securing remote and in-office users for the last few years, with several of our customers benefiting from fast deployment as well as quick, secure transitions to remote work. ZPA now boasts of several new features to add to our market-leading ZTNA to cover many more use cases and deliver robust, comprehensive security to private apps. Join ZPA product leaders in this webinar as they unveil new features expanding the use cases covered by ZPA and see firsthand how they can support your zero trust journey. Introducing secure access to legacy network-connected resources such as VoIP and server-to-client applications Gain visual insights for a detailed understanding of app segment allocation and policy utilization Ensure business continuity with uninterrupted zero trust access to private applications, even when the Zscaler cloud is unreachable Extend the same reliable zero trust access to a partner organization’s network

    Download

  • Tolly Group validated VMware SD-WAN speed, quality for remote work

    The Tolly Group puts VMware SD-WAN to the test VMware and Intel commissioned the Tolly Group to benchmark quality of service and remediation capabilities of VMware SD-WAN™ to improve end user experience for VoIP and work-from-anywhere applications using a dual WAN link deployment. The results? VMware SD-WAN delivered good user experiences even with 15% packet loss on a single link. Using Dynamic Multipath Optimization™, VMware SD-WAN delivered excellent voice quality scores despite 20 ms of jitter and 150 ms of latency introduced during testing. Intel developer tools also help optimize SD-WAN packet processing, speed and encryption. Watch this two-minute webinar for a quick take on the results from Kevin Tolly, founder of the Tolly Group. Presenters: - Shefali Chinni, SASE Product Marketing, VMware - Kevin Tolly, Founder, The Tolly Group - Tarun Viswanathan, Principal Engineer, Intel - Swapnil Hendre, Director for Solution Infrastructure and Design, VMware

    Download

  • Streamlining Business Collaboration: Unleashing the Power of Zoom UC

    Managing multiple communication tools can be costly and complicated, but unified communications (UC) solves this problem by combining telephony, instant messaging, and video conferencing on one streamlined platform. When the platform is cloud-based, it's known as unified communications as a service (UCaaS), offering greater flexibility, reliability, and scalability. Zoom's UCaaS platform combines VoIP phone service, video conferencing, chat, and more into a single app, allowing you to spend less time managing different systems and contracts and more time improving productivity, collaboration, and getting work done. In this webinar, you'll gain insights into: - Latest trends shaping the new era of work and why collaboration platforms are essential for managing a highly distributed and collaborative enterprise in 2023. - How a cloud phone solution complements your communication strategy and streamlines your business operations. - Tips and best practices for maximizing the benefits of Zoom's UCaaS platform, improving team communication and collaboration, and increasing productivity. Don't miss out on this opportunity to learn more about Zoom's UCaaS platform and how it can help your team work more efficiently and effectively.

    Download

  • 5 Key Considerations for a Successful Migration from Legacy VPN to ZTNA

    Today, businesses need a modern and robust approach to remote access security. One that delivers zero trust, comprehensive visibility, and advanced data protections across hybrid and remote environments. Designed for only traditional network architectures, VPNs simply don’t match up to securely enable access across all multi-cloud environments. In addition, they are difficult to scale, impact performance, and are costly and complex to maintain. Like all other organizations, Lookout has also faced its fair share of these issues with legacy VPNs. And who better to learn from than someone who's been in the trenches? Hear firsthand from Joel Perkins, Lookout’s head of IT, to discuss how he overcame challenges of a legacy VPN with Lookout Secure Private Access, our zero trust network access (ZTNA) solution. Discover why visibility and control over all your private apps and the data within those apps is crucial, and why remote access via a standard VPN alone doesn’t suffice anymore. Get practical takeaways and strategies for: - Understanding of all private apps: Discovering all private apps that need to be migrated. - Planning migration of apps: Depending on the form factor, whether they are legacy / client server, VoiP or web apps, how can we plan the migration and whether both VPN and ZTNA need to coexist. - Understanding of all users: Whether they are employees, contractors and using managed or unmanaged devices. - Consider Protecting data from deliberate or accidental exfiltration: Avoid deliberate or accidental data exfiltration after access is granted. - Look beyond ZTNA as an integrated platform: Achieve seamless zero trust access with a single-agent, single console, and single policy engine, and support for a multi-cloud environment.

    Download

  • Jargon Buster Guide to Unified Communications

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

    Download

  • Assess & Manage Commercial Software Risk

    Enterprises face growing risks and regulatory demands to secure third-party software. Spectra Assure's white paper details how its binary analysis identifies threats like malware and vulnerabilities in commercial software without source code. Discover risk management strategies by reading the full paper.

    Download

  • The rise and rise of SD-WAN in post Covid-19

    So much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).

    Download

  • A Computer Weekly buyer's guide to applications of next-generation networking

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

    Download

  • Focus: Network security

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

    Download

  • Infographic: Zoom vs Teams vs Cisco

    While all video conferencing tools perform broadly similar tasks, there are certain differences between products and providers.Here we examine the Cisco, Microsoft, and Zoom platforms, highlight the unique features of each product, and explain how the products differ from one another.

    Download

  • The ultimate guide to E911 compliance

    Today, 80% of 911 calls are made from mobile devices, it can be difficult to pinpoint a caller’s location. So, how can emergency services revamp their telecom while ensuring their compliance with new E911 laws? Access this white paper to learn more.

    Download

  • Unified Communication: “It should work as easily as a telephone call!”

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.

    Download

  • Why secure access should be a priority as cyberattacks advance

    As network perimeters expand, secure access is critical. Learn how SD-WAN, SD-branch, and SASE can provide integrated network and security solutions to protect remote access and enable hybrid work. Read the resource to explore these emerging technologies.

    Download

  • CW Middle East July-September 2020: Technology helps SMEs in UAE combat coronavirus crisis

    The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.

    Download

  • CW Middle East July-September 2020: Technology helps SMEs in UAE combat coronavirus crisis

    The UAE, like the rest of the world, continues to be heavily impacted by the fallout of the Covid-19 pandemic – and technology is helping to lead the fight.

    Download

  • SD-WAN: Hitting the mainstream

    For the networking industry, 2018 was the year that interest in software-defined wide area network started to ramp up in earnest, as more enterprises started to assess the benefits of the technology, and more early adopters started to make concrete purchasing decisions. In this e-guide, our experts explore the state of play in the SD-WAN market.

    Download

  • MicroScope's ultimate guide to the digital transformation and emerging opportunities for the channel

    The phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.

    Download

  • Intermedia Contact Center Datasheet

    Intermedia Contact Center offers a cloud-based solution to enhance customer interactions. It provides omnichannel capabilities, real-time insights, and customizable call flows. Experience more responsive and positive customer experiences. Read the full product overview to learn more.

    Download

  • CIO Trends #11: Middle East

    Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.

    Download

  • CIO Trends #11: Middle East

    Read in this e-guide how Saudi Arabia is harnessing the cloud during the global healthcare crisis. Also read in this issue how SMEs in the United Arab Emirates are adopting the latest technologies at pace to help their businesses survive the Covid-19 related business disruption.

    Download

  • Insights on achieving network diversity and business continuity

    Network diversity is crucial for business continuity, but using multiple carriers doesn't always achieve true diversity. Learn how a single carrier with robust network architecture can provide reliable, redundant communications to keep your business connected. Read the full white paper to discover Sinch's approach to network diversity.

    Download

  • 2024 Domain Security Report

    The 2024 Domain Security Report analyzes the domain security posture of the Forbes Global 2000 companies. It highlights key trends, including rising DMARC adoption and low registry lock usage. The report offers insights to improve domain security and protect against cyber threats. Download the full report to learn more.

    Download

  • Zoom Phone Ebook: Comprehensive Guide to Optimizing Telephony

    This e-book explores how to secure remote access and build user trust as the network perimeter expands. Learn how to protect your organization in this comprehensive digital resource.

    Download

  • Top five threat trends influencing the security strategies of software companies

    While all the usual attack vectors are in play, there are some big trends shaping the threat landscape that impact an organization's ability to protect their data and operations long term. To dive deep into the top five, download this infographic.

    Download

  • Top five threat trends influencing the security strategies of software companies

    While all the usual attack vectors are in play, there are some big trends shaping the threat landscape that impact an organization's ability to protect their data and operations long term. To dive deep into the top five, download this infographic.

    Download

  • 9 Ways Your Aging Phone System Is Putting Business Success On Hold

    Explore 9 ways an aging phone system can put your business success on hold. Learn how a cloud-based phone system can provide reliable connectivity, advanced features, and mobile capabilities to meet the needs of today's impatient customers and mobile workforce. Read the full white paper to discover how to modernize your business communications.

    Download

  • 7-step roadmap for securing your domain profile

    "Domain names," explains CTO of CSC's Digital Brand Services, Ihab Shraim, "should be considered part of the external attack surface." Along with exploring the ways that domains can be attacked, this 16-page white paper offers a roadmap to securing your business's domain portfolio. Read on to access the security insights and guidance.

    Download

  • 6 Reasons Why Businesses Adopt UCaaS

    To unlock a 14-page leader’s guide to unified communications as a service (UCaaS), tap into this white paper.

    Download

  • European Perceptions, Preparedness and Strategies for IoT Security

    Research from analyst group Quocirca conducted in the UK and German-speaking regions exposes the challenges organisations face in managing and securing internet of things devices.

    Download

  • Schools and Cybersecurity: Tips, Threats and More

    Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.

    Download

  • Focus: Enterprise Mobility Management

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

    Download

  • Computer Weekly – 19 February 2019: When is it best to stick with paper?

    In this week's Computer Weekly, sometimes going digital is not necessarily the best thing to do – we weigh the pros and cons of paper versus technology. Our new buyer's guide examines the challenges of asset management as you move to the cloud. And we look at the growing role of software developers in the future of networking. Read the issue now.

    Download

  • Boost your remote access performance

    The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.

    Download