Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

security tag

Drill down on security search:

25 result(s) displayed for security (1 - 25 of 203):

Stack8: Achieving the Promise of UC and UCaaS

When it comes to UC, quite often, integrators leave when a system is technically up and running, not when it is optimally running. Stack8 was founded in 2010 to address this gap by bringing enterprise UC systems closer to what...

Openpath Intros Next-Gen Access Control System

As everything in our lives has become smart; the phone, speaker, lights, cities, thermostats and doorbells, the reality is that pretty much everything needs to become intelligent to participate in the ecosystem of things and services. One area which has...

ZiipRoom Intros Must-Have Videoconferencing Solution

Friction or resistance is generally used to slow things down. In fact, a car's braking system is a great example of something very small - brake pads, reducing the momentum of a vehicle weighing thousands of pounds.A learning curve is friction. Multiple...

Cloudstudio with Your UCaaS, Would You Like Fries With That?

McDonald's is famous for asking customers if they want fries with their order and as a result, over the years, they have generated millions of dollars of extra profit. We can all learn a little something from this worldwide purveyor...

Martello Offers Unique SD-WAN Solutions

Martello Technologies has become one of the more interesting players in the SD-WAN space - by purchasing Elfiq - one of the first if not the first players in the space. From there, they combined SD-WAN with service assurance... From quality...

New VTech Devices Bring SIP and Key System Functionality to Business

Sometimes you need to go backward to go forward is what we thought when we met for an exclusive interview with VTech execs to discuss a new line of products bringing together the best of Vtech with its recent...

Jenne Becomes Leading UCaaS Value-Added Distributor

As resellers evolve from selling telecom hardware like PBXs to UCaaS, they often need help to figure out how to do it successfully. Beyond the financial challenges inherent in going from a CAPEX to a monthly recurring (MRR) model are the...

With Yeastar, Becoming a Telecom MSP is a Massive Arbitrage Opportunity

Recently we wrote about how telecom resellers are becoming MSPs, providing UCaaS solutions on their own, without the need to rely on an OTT provider such as RingCentral or 8x8.In our discussions with MSPs making the switch from reselling a...

3CX Aims to be Top 3 in UC Software

MSPs and resellers in telecom are going in three directions. The first is business as usual. They continue to sell boxes and/or cloud services. Sometimes they'll just refer the business to the UCaaS provider and other times, they'll do the...

FracTEL Advances Conference Call Security

Citing the common theft of conference call pin codes in places like political campaigns, Michael Crown, President of FracTEL told us in an exclusive interview, his company's SKRUM solution announced at ITEXPO earlier this year, securely calls participants instead of relying on...

Kollective Improves Network Performance via P2P Technology

Enterprise network congestion on continues to be a problem as software updates and files continue to grow in size. Add to these challenges, the fact that increasingly, enterprises expect to be able to communicate via video seamlessly.In fact, more than 2,000 US and...

Could Scheduling Logins Make us Safer?

Hackers are relentless. Today it was discovered the Consumer Financial Protection Bureau (CFPB) suffered at least 240 data breaches and another 800 suspected hacks, according to Mick Mulvaney, the acting director of the bureau in congressional testimony.The City of Atlanta has...

This iPhone X Feature Makes it Worth $1,000

You're driving in the car, come to a red light and decide to check e-mail. You double click the home button to open the mail app, delete a few emails and then look up after you hear the horn of...

Hackers Now Threaten Death to Schools and other Types of Extortion

Hackers are now breaking into schools which typically have lax security relative to corporations and once in, they access student information and use it to threaten death to students. Mentioning Sandy Hook - a horrific school shooting in Connecticut, a...

The Scary Apple Pay Takeover iconectiv Helps Stop

Personally Identifiable Information or PII is leaking out of companies faster than ever. Equifax had two major hacks in a matter of months, Yahoo had three-billion emails stolen and so on. We could devote this entire post to various hacks...

AdaptiveMobile: CSOs Flying Blind if They Can't Monitor Mobile Networks

SS7 is the signaling protocol for the world’s telecom networks and like the internet, it wasn’t really designed with security in mind. The assumption back in the day was the telecom operators were all trusted nodes on the network. It...

MultiTech Continues IoT Leadership in LPWA and Security

One of the longest-running companies in the connectivity business, MultiTech has stepped up their IoT leadership. Specifically, in the world of LPWA. At MWC Americas the company demoed NB-IoT with T-Mobile. Company spokesperson Sarah Brown told me in an in-person...

Intermedia Anti-Phishing Tools for Small Business

Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor...

StaffAlerter Provides Value in Emergency Notification and IoT

With terrorist attacks and other shooting incidents becoming commonplace, the need to quickly notify large groups of people regarding dangerous situations seems to have never been greater. While many of the solutions on the market are targeted at governments or...

HPE Composable Infrastructure Turns Data Centers into a Mini-Google

Fans of search engine history likely know that Google benefited greatly due to the timing of its launch. Whereas Yahoo launched when dotcom money flowed, allowing it to buy million-dollar SUN servers like they were going out of style (they...

Portnox Adds Visibility and Control To Help Secure Networks

Networks have become so complex that securing them has become an increasingly complex challenge. As the number of attack vectors increase seemingly endlessly, corporations need to have a commensurate solution which scales with device growth, allowing IT to protect their...

Tempered Networks Boosts Trust with Identity-Defined Networks

If you missed Paula Bernier’s article (free registration required) in our IoT Evolution Magazine, you may not have known Tempered Networks is the new name for Asguard – which is pronounced the same way as Thor’s home-world but spelled with...

The Drone Wars Have Arrived

An army of good drones will protect our high-value targets at all times. In February 2014 we warned of the impending urban drone wars: The police department after dealing with this incident is forced to develop a policy which entails the...

How Microsoft Just Scared the IT Community to Death

Brad Smith, the President and Chief Legal Officer at Microsoft spoke recently at a conference and wrote about the need for a Digital Geneva Convention which would do a number of things. For example, it would eliminate targeting of tech companies, assist...

The Utter Hypocrisy of Feigned Russian Hacker Outrage

From the president to the mainstream media, all of a sudden it seems state-sponsored hacking is a problem Whether you believe Barack Obama’s presidency was a failure or a success, there is no doubt on the subject of cybercrime, this...
1 2 3 4 5 6 7 8 9 Next
Featured Events