You've requested...

Share this with your colleagues:

Download this next:

Jargon Buster Guide to Voice over IP (VoIP)

Voice over IP, or VoIP telephony – the transmission of voice over an IP network as opposed to a traditional telephone network – has become the mainstay of communications in the modern enterprise to the extent that you’d be hard pressed to find a traditional handset in today’s office.

In this Jargon Buster, we’ll explore some key definitions around this topic, and look at how VoIP fits into the wider unified communications landscape.

These are also closely related to: "Ensuring VoIP Quality of Service"

  • E911 for VoIP and UC

    If your enterprise is implementing (or has implemented) VoIP and UC, then you must ensure that you have proper 911 support for whichever platform(s) you use to avoid reputational harm and, more importantly, compliance issues.

    Download this data sheet to learn how Intrado can help you automate and simplify E911 for:

    • Avaya
    • Cisco
    • Microsoft
    • Mitel
    • And more

  • How to develop a combined voice and UC strategy

    The functionality offered by a combined VoIP and unified communications framework enables businesses to more effectively collaborate and communicate using technologies such as team chat, video conferencing and file sharing.

    This this buyer's guide can help your organization develop its voice and unified communications strategy.

    Download the guide to examine what sets VoIP products apart -- including features, UC functionality, phone hardware compatibility and technical support -- and compare offerings from 10 industry-leading providers.

Find more content like what you just read:

  • Product evaluation: VMware SD-WAN

    SD-WANs have become an increasingly reliable option in the era of remote work. This research report provides a comprehensive, unbiased evaluation of VMware’s SD-WAN offering, assessing how its features stack up across several quality tests – read on to unlock the full findings of the report.

    Download

  • Remote call & contact center performance monitoring

    Contact and call center workers require VoIP, Video, and UCaaS solutions that rely on the enterprise WAN to perform. Learn how to ensure performance of your voice, video, and collaboration tools in this white paper.

    Download

  • New UC Threats Leaving Your UC Platform Vulnerable

    This expert E-Guide from SearchUnifiedCommunications.com explores three emerging security threats that can leave your UC platform extremely vulnerability to security issues.

    Download

  • RINGCENTRAL JOHN VARVATOS ENTERPRISES

    Many businesses are still trying to wade through the mud with their disparate legacy phone systems – John Varvatos Enterprises, a premier luxury fashion brand, was no exception. In this comprehensive case study, learn how John Varvatos was able to realize both monetary and time savings across all departments with VoIP.

    Download

  • How Zoom Phone helps schools overcome 3 big telephony challenges

    Even as schools embrace digital methods of teaching, learning, and communicating, telephony remains an important part of campus communications. But the legacy digital phone system posed several issues for Solano County Office of Education. In this blog post, learn how switching to Zoom, a modern cloud VoIP phone system, solved their challenges.

    Download

  • Why a Fortune 500 retailer decided to deploy Cradlepoint

    A Fortune 500 retailer was looking to go all wireless in hundreds of stores that required reliable WAN connectivity for POS, security cameras, hand-held scanners, VoIP phones, laptops, tablets, and more. In this case study, learn why the Fortune 500 retailer decided to deploy Cradlepoint NetCloud Service for Branch to help reduce downtime.

    Download

  • LTE group aces cybersecurity

    LTE group, a learning service provider, knew that replacing their legacy phone system with Skype VoIP would be a big change. They didn’t, however, expect their Skype deployment to become infected, causing the quality of sessions to be reduced or disconnecting them altogether. This case study details how LTE group reduced their threats to zero.

    Download

  • Which cloud-managed Wi-Fi 6 APs perform best under pressure?

    Packet6’s Wi-Fi 6 AP stress test challenged out-of-the-box APs to manage and prioritize traffic for 30 Wi-Fi 6 laptop clients streaming 1080p video, 20 Wi-Fi 5 laptop clients and five Wi-Fi 5 tablets downloading data, and five Wi-Fi 5 tablets running simulated bi-directional VoIP calls. View this infographic to see which AP performed best.

    Download

  • The ultimate VoIP buyer's guide

    Successful businesses are constantly on the move: growing, adding locations and hiring new employees. Because your phone system has such an impact on your day-to-day, it should scale with your company. In this buyer’s guide, walk through the process of looking for a business-grade phone system and explore why hosted VoIP is a good fit.

    Download

  • Enterprise Wi-Fi stress test

    This report details the performance attributes of cloud-managed 802.11ax (Wi-Fi 6) access points (APs) in a high-density and high-capacity environment with a mix of video, VoIP and data traffic. The intent is to test cloud-managed enterprise AP performance under a real-world scenario that is relevant to most enterprise networks today.

    Download

  • PS-ALI vs. VPC: Find the E911 service that best suits your needs

    In this white paper, compare PS-ALI (Private Switch Automatic Location Identification) and VPC (VoIP Positioning Center) solutions to help determine the E911 service that best suits your needs.

    Download

  • Third party IoT risk management: A new roadmap

    The soaring number of IoT devices that can provide access to sensitive organizational data will make IoT risk management a convoluted undertaking. Professionals familiar with IoT are optimistic of its benefits but skeptical on security. Leverage this Ponemon report to get a grasp of organizational readiness for thir party IoT and its risks.

    Download

  • Internal Controls Checklist for Corporate Data Protection and Compliance

    In this expert tip, Eric Holmquist details four key governance items that should be on every enterprise’s internal controls checklist to ensure corporate data protection.

    Download

  • Manage the risks of AI, 5G, IoT and more

    Enterprise risk management (ERM) structures have grown in number and maturity, but many of them do not account for emerging technologies such as AI, 5G and IoT. At this juncture, it’s important that board and C-suite members assume responsibility for these shifts. View this SFG resource to learn ERM best practices for new technologies.

    Download

  • Building a customized security action plan: Case study

    In this case study: The board of directors of a rapidly growing, privately funded professional services firm recognized the company faced escalating cybersecurity risk. They also recognized the first step to thwarting these risks was understanding them. Read on to learn more.

    Download

  • WAN video conferencing network design requirements for QoS

    This e-guide takes an in-depth look at the critical requirements of the WAN video conferencing network design. Uncover best practices to ensure consistent, high-quality video service delivery across the WAN.

    Download

  • E-Guide: Best practices for pen testing Web applications

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

    Download

  • Using third-party risk management in your supply chain

    After years of outsourcing non-core functions, and using services provided by affiliates, financial institutions often find themselves dealing with complex—and risky—supply chains. In this white paper, learn about third-party risk management (TPRM) and how it can help FSIs address these challenges, and ultimately improve operational resilience.

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • Proactive security measures: How to prevent malware attacks

    Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.

    Download

  • Adaptive risk management for complex supply chains

    This paper discusses supply chain risk and the increased demands that complex supply chains place on outsourcers and providers. It also provides strategies and tactics for building and applying complex adaptive solutions to your own Third-Party Risk Management (TPRM) program. Download your copy today.

    Download

  • Threat prevention techniques: How to build a strong network

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

    Download

  • Focus: how to avoid being hit by ransomware

    In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • Video conferencing adoption: Tracking trends and deployment strategies

    Managers are looking for ways to incorporate video conferencing into their unified communications (UC) architectures as adoption continues to grow. This e-guide offers top recommendations and best practices to help you through the video decision process while ensuring quality stays a high priority.

    Download

  • For Dummies: How to manage digital risk

    In this e-book, you’ll learn everything you need to know about digital risk management 101. Inside, find out how you can understand the different types of risks, establish policies, controls, and monitoring best practices, and apply 5 tips for secure digital transformation success.

    Download

  • E-Guide: VM in the Cloud

    Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.

    Download

  • How MDM and the Consumerization of IT are Reshaping IT Decision-Making

    Access this white paper to learn why your organization needs to start integrating IT consumerization and BYOD into its business – and how to get there.

    Download

  • A Computer Weekly buyer's guide to managing paper processes

    Modern paper processes are ripping up the rule book. In this 13-page buyer's guide, Computer Weekly looks at risk mitigation, security measures for connected printers and the shift towards end-to-end digitisation.

    Download

  • Infographic: 5 questions to ask when creating a ransomware recovery plan

    Companies need extensive plans to successfully protect themselves from ransomware attacks. These 'five W's of ransomware' will help organizations ask the right questions when creating a ransomware-specific disaster recovery plan.

    Download

  • Managing Cloud Computing Risk

    Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

    Download

  • Research highlights: The pressing need for comprehensive cyber risk management

    There is a growing requirement to be able to assess and mitigate cybersecurity risks associated with IT environments. To get more insight into this trend, ESG surveyed IT and cybersecurity professionals involved in planning, implementing, and enforcing IT risk management. Download this research report to explore key findings.

    Download

  • Video Conferencing Best Practices: Making the Business Case and Key Tips for a Seamless Deployment

    This e-guide discusses key deployment strategies to help unified communications (UC) pros get started. Uncover the physical components of video conferencing systems, interoperability and standards considerations and how organizations should address video management to ensure a solid quality of service (QoS).

    Download

  • Beating web application security threats

    Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.

    Download

  • To hack back or not to hack back ...

    This e-guide discusses hacking back as a viable option to combat hacking attempts. Expert Kevin Beaver discusses the merits and drawbacks of an "offense is the best defense" approach to security and how to implement more permanent security tools moving forward.

    Download

  • Global Risks Report 2017

    Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals

    Download

  • Webinar: Uncover the changing vendor audit landscape

    As organizations adopt more cloud platforms with subscription-based licensing, the traditional landscape of software publisher audits and related risk is also rising. This webinar covers these changes and how to prepare through best practices. Tune in to learn about how to approach risk assessment, how to deal with audits and more.

    Download

  • Prioritizing CX in a cost-cutting environment

    In this guide, explore the 4 strategies CX leaders can employ—both from a business and technology perspective—to ensure their organization receives the funding and support it needs to deliver the experiences customers deserve.

    Download

  • Check the network before moving to the cloud

    Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.

    Download

  • How Configuration Lifecycle Management can catalyze manufacturing digitization

    Download this white paper to learn how Configuration Lifecycle Management (CLM) can help establish a collaborative single source of truth across your organization to improve time-to-market and increase product quality.

    Download

  • How microservices take the complexity out of governance

    What if there's an easy way to reduce overhead and adapt governance for modern app architectures? In this expert e-guide, explore a distributed, microservices-based approach to governance and learn how to adapt IT for microservices and containers with automation tools.

    Download

  • Ask the experts: Discover how to handle external security auditors

    A survey conducted at RSA Conference 2015 found that only about 68% of IT pros are honest with security auditors about the occurrence of incidents—leaving 32% in a decidedly gray area of ethics. Make the most of the audit process by learning 3 issues to consider when employing external security auditors.

    Download

  • Top 5 challenges SD-WAN solves

    SD-WAN is a feature-rich technology that is widely adopted by enterprises and organizations. In this white paper, uncover the top 5 benefits enterprises and organizations see when deploying SD-WAN, including voice and application quality, high availability and quality bandwidth and always-on connectivity.

    Download

  • Ensure the security of your endpoint devices: Expert tips

    Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.

    Download

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

    Download

  • A practical guide to choosing IT automation tools

    There's a lot of AI-infused, automation-heavy IT service tools available on today's market – but choosing practically is key. Find step-by-step outlines for planning artificial intelligence and automation strategies that not only give your IT teams the tools to succeed, but is sustainable well into the future.

    Download

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

    Download