article thumbnail

Hyper-segmentation – How to Avoid Cyber Disasters

CTOvision

After spinning off from Lucent Technologies and AT&T, Avaya became the experts in SIP, Internet telephony, unified communications and collaboration (UCC) and all thing VOIP. There are no ACLs to setup, no firewall rules to configure. Avaya is the company that is synonymous with telephony. The fabric handles it all.

How To 150
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Once the information security policy is written to cover the rules, all employees should adhere to it while sending email, accessing VOIP, browsing the Internet, and accessing confidential data in a system. Firewall Policy. How firewalls are named, configured etc. Implement policies. How access to the physical area is obtained.

Policies 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Product Review: Paessler PRTG Network Monitor

Galido

Monitoring QoS (Quality of service, for example, to monitor VoIP). Bandwidth monitoring using SNMP, WMI, NetFlow, sFlow, jFlow, packet sniffing. Application monitoring. Web monitoring. Monitoring of virtual servers. SLA monitoring (service level agreement). Environmental monitoring. Monitoring of LAN, WAN, VPN, and distributed sites.

Network 60
article thumbnail

Building Blocks of a Secure Tech Infrastructure: A Chief Product Officer’s Guide

Kitaboo

Network – This includes network elements like LAN and WAN along with internet connection, VoIP, switches, routers, and more. Software – It includes your CRM tools, productivity tools (Office 365, Google Workspace), or enterprise resource planning tools (such as SAP).

article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

Whenever Margo does remote work with a given client -- accessing the intranet, using internal apps, interacting via collaboration software, or even certain VoiP apps -- she must use the appropriate laptop. In these cases, each of Margos clients provides a shared (or dedicated) desktop OS behind their firewall.