risk

 

BYOD: Employees Ignoring Heartbleed, Other Security Risks

A new study reveals that 10 percent of enterprise employees don’t even have a password, PIN or other security measure enabled on the mobile device they use for work purposes, potentially exposing organizations to grave risk.

Risk 101

AS IP TELEPHONY BECOMES the standard of communications for both business and residential users, understanding and mitigating the security risks associated with it become even more paramount. It is important to understand the various threats and how to mitigate each one. Configuration Consternation. In their default configurations, many of the IP telephony devices may have […]

Calence Selects Kellogg to Lead Network Security Solutions Practice

Calence LLC, which builds, manages and optimizes customized, client-centric networks today announced that Greg Kellogg will head its growing network security practice as vice president of security solutions. Kellogg will be responsible for managing the companys overall security strategy, as well as developing new security solutions and service offerings, establishing strategic partnerships, managing strategic client engagements and […]

BSG Introduces Credit Processing

BSG Clearing Solutions  today announced a credit card processing solution for North America. The service provides secure credit card processing for all major credit card associations and adds a comprehensive analytic fraud service for transaction risk management. BSG, a provider of clearing and settlement, payment services and financial risk management, began merchant implementations and processing […]

CopperCom Program Aids Transition to Facilities

CopperCom (Booth 319) is unveiling a program that provides CLECs with no-risk financing for the CopperCom Converged Switching Xchange softswitch platform, plus a range of consulting services to help get their networks and businesses up and running. The program is designed for CLECs migrating from UNE-P to a facilities-based business model, but also is expected […]

Back Office

Revenue assurance may seem an innocuous process of making sure operators get paid for everything they deliver, but the reality is far darker. While systemic miscommunication in data collection and mediation, order-entry systems, rating and billing and other OSS components account for plenty of revenue leakage, carriers also need to think beyond technology and patrol […]

VoIP Security is Like an Onion …

The drivers behind the converged network are well understood: lower support and maintenance costs, business enablement through telephony-application integration and aging telephone systems requiring replacement, just to name a few. Most companies are focusing their convergence efforts on VoIP. Accordingly, VoIP solutions are maturing at an amazing rate, as are its enabling network technologies - for […]

Rethinking Internet Risk Management

Hurricane Ivan illustrated a need for new forms of Internet business risk management when it damaged an undersea cable and disconnected the Cayman Islands. The disconnection lasted more than two days and is an example of a risk beyond the control of the enterprise or the telecommunications carrier: a force majeure risk, or act of […]

1 2 3 4

Polls

How do you approach customer MPLS networks in the age of SD-WAN?

View Results

Loading ... Loading ...
The ID is: 52551