+1 800.462.8694 U.S. | +1 770.937.9735 Worldwide

Posts Tagged ‘Security’

VPN Use in a VoIP System

Cloud communications provides full-featured phone services over the Internet. Additional security is often a concern. This whiteboard session addresses the use of VPNs to address that concern. Also, review the SIP Trunking and Gateway whiteboard sessions and gain insight on how all the pieces work together. Transcript: Hey guys, welcome back to another installment of…

Read More

7 Critical Steps to Secure Your VoIP Services

Voice over IP or VoIP systems provide full-featured telephone services over the Internet. The benefit is lower costs, greater numbers of services, increased control and cloud-based, hosted operations that minimize hardware requirements and maintenance. Traditional phone system providers handle security requirements associated with their systems. This article describes how to meet and manage the security…

Read More

How Much Does a VPN Solution Cost?

Companies of all sizes in all industries have privacy concerns. The need to conduct business securely and to assure customers that their data is protected drives interest in tools like a VPN. The tool is easy to use and focuses on the importance of security and privacy. But if you’re new to this tool, you are…

Read More

Keeping Your Cloud Accounts Secure

Following a recent Cloud hacking incident, many are left wondering if they’re vulnerable to a similar attack. Using Cloud storage and applications is all the rage but are they safe? In this article we’ll talk about the Cloud, its security, keeping your Cloud accounts secure and the steps you can take to do so. The Cloud…

Read More

8 Security Measures You Need For VoIP

Voice over IP or VoIP allows for full-featured telephone services over the Internet, thus providing lower costs, greater numbers of services, and hosted operations (in the cloud). However, this type of operation pushes many of the security requirements formerly handled by a company and its telco to a VoIP services provider who can be vulnerable…

Read More