edgeprotect

February 02, 2016 BLog List Date Underline

What Does OTT or "Over the Top Communications" Really Mean?

by Lars Nohling

The true meaning of over the top (OTT) networking isn’t always understood—even by networking veterans.

Yet almost all of us use Over the Top communications apps—we just don’t always know it. Instant messaging, Internet telephony, and video conferencing are just of the few of the categories of apps delivered over the top.

See More > >
April 15, 2015 BLog List Date Underline

Obama Declares War on DoS Attacks

by Rosa Lear

It seems like every week there is headline mentioning a business or government that just became the victim of a cyberattack. We aren’t the only ones taking notice either. The U.S. Government has been responding to the rising threat of DoS and other cyberattacks with new legislations and task forces.

See More > >
January 22, 2015 BLog List Date Underline

Videoconferencing in Action: A Case Study

by Rosa Lear

You may have heard the familiar expression “A picture is worth a thousand words.” However, in the world of sales and marketing, a picture may sometimes be worth a thousand dollars or a thousand customers, and that’s when it matters most. When it comes to closing sales, it’s always great to be able to answer questions and close the deal in person. Yet sometimes, it’s just impossible due to the costs involved, both in terms of time and convenience.

See More > >
November 25, 2014 BLog List Date Underline

Dialing Fraud: What you can do to Protect Yourself

by Rosa Lear

Would you use a bicycle lock to protect your car?

See More > >
November 04, 2014 BLog List Date Underline

Delivering Network SaaS through SDN and NFV: Benefits and Advantages

by Rumus Sakya

Delivering network software as a service through Network Functions Virtualization (NFV) and Software Defined Networks (SDN) is going to dramatically change how managed service providers address the security needs of their SMB clients. In this post, we’ll speak about the various advantages and benefits of this delivery method. We’ll also speak about the reasons why SMBs are reluctant to try these security methods, especially if they appear to be something new.

See More > >
September 18, 2014 BLog List Date Underline

Videoconferencing: No Strings Attached

by Rosa Lear

In July, we wrote a blog post about how we helped one of our partners to optimize their videoconferencing system using our EdgeProtect unified communication-centric Enterprise Session Border Controller (ESBC) in conjunction with other videoconferencing equipment. The video call went very well and included attendees located in three different physical locations around the globe.

See More > >
blog-ctabar-img.png

SIP Trunking Survey: Many Don't Have any SBCs