Firewalls: Traditional, Next-Gen and Never Again

Firewalls—they’re pretty boring, right? How many times have you yawned at the mention of these essential but unexciting devices? That might have been true in the past. But, did you know that even next-gen firewalls are subject to hype and might be on the road to extinction? Hackers, Firewalls and AI For many IT admins and developers, […]
Cracking the Code of VoIP Encryption

Welcome to another foray into VoIP-related technology and the hype that surrounds it. This time, we’re reviewing end-to-end encryption of phone calls, messages, video and audio VoIP content—what encryption is, how it works and who needs it. Different Levels of VoIP Security VoIP communications (phone calls, video and messaging) are being widely adopted to provide […]
Some TI Requirements You Might Have Overlooked

Threat Intelligence and Security Does your business want to set up or improve its threat intelligence security operations? If you find it more complicated than you thought, you have plenty of company. Many companies wanting to benefit from Threat Intelligence are learning a hard truth: setting up successful TI operations takes a lot more than subscribing […]
Compelling Voice over IP Statistics to Build Your Business Case

Business VoIP Statistics You’ve probably heard plenty of anecdotes about the benefits of Voice over IP, and you know that many organizations have already made the switch. But if you’re thinking about upgrading from a traditional phone system to Business VoIP, then anecdotes are not enough – you need cold, hard facts to build your […]
8 Ways to Avoid Threat Intelligence Disappointment

More than 35 years ago, when biotech was young, the trade press bombarded readers with a litany of praise about the newest biological drugs, processes and medical treatments that biotech would bring to pass. As usual with high-tech product announcements, some of this verbiage was based on hope, not evidence. Long before Gartner established its […]
What is CTI (Computer Telephony Integration)

Computer Telephony Integration (CTI) Computer Telephony Integration refers to technology that enables computers and telephones to interact with one another. CTI is used extensively in contact centers to improve productivity and deliver better customer experience. CTI applications offer a wide range of capabilities, including: Screen Pops – Display’s caller information on answering agent’s computer screen. […]
What is a Switch?

In the world of IT, a ‘switch’ can refer to two completely different pieces of technology; it can mean either a network switch or a telecoms switch. This article talks about the key characteristics and differences between these two types of switches. What is a Network Switch? In networking, a switch is a piece of […]
What’s the difference between a Key System and a PBX?

Key System & PBX A telephone system is a critical piece of infrastructure for any modern organization. It connects your business to the outside world and enables employees to communicate effectively with each other and with external clients and partners. A Key System and Private Branch Exchange (including traditional PBXs and IP PBXs) are the […]
What is DTMF and How Does it Work in a VoIP Environment?

What is DTMF and How Does it Work? Dual Tone Multi-Frequency is a signal tone generated when buttons are pushed on a telephone keypad – hence the term ‘Touchtone Phone’. DTMF was invented by the Bell Telephone Company in 1963. Over the following decades, it gradually replaced the earlier Pulse Dialing or Rotary Dialing technology. […]
What is a Codec? G.729 vs. G.711

G.729 vs. G.711 The word “Codec” has two meanings in the technology world. The term originally stood for coder/decoder – typically a hardware-based device that performed digital-to-analog and analog-to-digital conversion. One well-known example is a modem, used to transmit data over analog telecommunications lines. The second, and now more common meaning of ‘codec’ is compression/decompression. It describes […]