What is ddos attack in simple terms
- Written by: amuravyov
DDoS attacks (Distributed Denial of Service) are a type of cyberattack aimed at making resources such as servers, networks, and applications inaccessible to users by overwhelming them with requests from multiple sources.
AI + PSTN = Changing the UC Landscape
- Written by: amuravyov
EC24 showcased the addition of AI services, including transcription and meeting minutes, to PSTN call using popular UC services (Teams, Zoom, Webex, Ring Central). While these have been in place for conference calls for almost a year, AI for one-to-one calls via the PSTN is new in 2024.
US Military Upgrades Voice Infrastructure with Ribbon & Dell
- Written by: amuravyov
Ribbon Communications and Dell Technologies partner to modernize a US military branch's voice infrastructure to VoIP before the 2025 DoD deadline. The upgrade offers enhanced security, zero trust voice architecture, and machine learning capabilities while leveraging existing infrastructure.
Deploying a Session Border Controller in Amazon Web Services
- Written by: amuravyov
Some service providers are moving away from deploying applications in their own data centers in favor of the public cloud and as the market leader for public cloud services, Amazon Web Services (AWS) is a top destination for providers of cloud-hosted, real-time communication services such as unified communications, conferencing and collaboration, and contact center applications.
Session Border Controllers – 5 Reasons Why Your Company Needs One
- Written by: amuravyov
SBCs are specifically designed to help enterprises deploy UC more quickly, easily and securely. For example, as your enterprise communication strategy transitions from a legacy Time Division Multiplexing (TDM) architecture to a new, Internet Protocol (IP)-based UC network, you will encounter new and different requirements for security, call routing, interworking and network management.
TDoS - A Real Threat to The Contact Center
- Written by: amuravyov
Over the course of the past several weeks I’ve had a chance to meet with a few customers that are using Ribbon in the core of their network for managing their contact center voice traffic.
Teams Calling: Operator Connect vs. Direct Routing
- Written by: amuravyov
As hybrid and remote work continues to become the norm for businesses of all sizes, organizations are increasingly gravitating to cloud-based unified communication tools to boost internal collaboration and stay connected to customers. Microsoft Teams is already one of the most popular choices for chat and meetings and it is becoming a popular tool to use as a cloud-based business phone system.
Real-Time Firewall Audit Request Automation: Why Tufin Excels
- Written by: amuravyov
The world of network security is more dynamic than ever. As our reliance on digital infrastructures grows, the demand for robust firewall management becomes paramount. One of the crucial areas that organizations often grapple with is real-time firewall audit request automation. It’s a topic that many encounter, yet few truly understand its implications. Enter Tufin. Let’s dive into how Tufin’s solutions are setting industry standards.
Vectra AI: The Gap Between SecOps and Threat Detection Tools
- Written by: Татьяна
Despite a majority of SOC analysts reporting their tools are effective, the combination of blind spots and a high volume of false positive alerts are preventing enterprises and their SOC teams from successfully containing cyber risk.
Understanding the Different Types of Adversaries
- Written by: Татьяна
As a CISO, expanding and evolving your thinking around what – and who – constitutes an adversary is essential for effective cybersecurity management. In this second part of our series on adversary alignment, we will take a closer onion at the different types of adversaries that CISO's should consider when building their organization’s cybersecurity strategies.
Protecting Your VoIP Infrastructure From DDoS Attacks
- Written by: amuravyov
Distributed denial of service (DDoS) attacks are an ongoing issue for communications service providers, putting critical systems at risk, undercutting service level agreements, and bringing unwanted headlines. In the first half of 2022 6 million of these attacks were reported.
Implementing the Zero Trust model with Tufin
- Written by: amuravyov
Zero Trust is a popular term seen everywhere lately, but it’s not a new concept. The Zero Trust Network, or Zero Trust Architecture model was created in 2010 by John Kindervag who was a Forrester analyst. Eleven years later, CISOs and CIOs are increasingly adopting and implementing the Zero Trust security model into their organizations.