You've requested...

Download this next:

Jargon Buster Guide to Voice over IP (VoIP)

Voice over IP, or VoIP telephony – the transmission of voice over an IP network as opposed to a traditional telephone network – has become the mainstay of communications in the modern enterprise to the extent that you’d be hard pressed to find a traditional handset in today’s office.

In this Jargon Buster, we’ll explore some key definitions around this topic, and look at how VoIP fits into the wider unified communications landscape.

These are also closely related to: "Tuning Applications for IP"

  • VoIP has never lost its voice: How to get the most out of your business communications

    In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce. Increasingly, VoIP capability is being integrated into the leading conferencing and collaboration tools, giving users the option of placing voice calls through a desktop application, an integrated IP phone, or directly through the native dialler on a mobile device. Download our exclusive e-Guide and read more about:

    • VoIP gateway vs. PBX: What is the difference?
    • Verizon Business enriches mobile endpoint for Microsoft Teams
    • Broadband Forum launches app-enabled services network gateway
    • Do you need to manage QoS when deploying VoIP over LAN?
    • What is the difference between IP telephony and VoIP?

  • Best practices for addressing voice network vulnerabilities

    As communications technology has advanced and unintentionally carried subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network.

    Instead, enterprises need a complete, seamless approach to network security to prevent exploitation through their VoIP communications.

    Access this white paper to learn about the current state of communications and voice network security, as well as:

    • Threats that SIP/IP communications face
    • Potential barriers to network security
    • How to build your defenses
    • And more

Find more content like what you just read:

  • How you can protect your data and IPs when hiring globally

    In today’s hybrid and remote world, IP and data protection has never been more important. This is especially true for companies with international employees, who can experience a handful of consequences. So, how can you avoid these pitfalls? Dig into this guide to learn more.

    Download

  • Ultimate guide to future-proofing voice communications

    72% of IT decision-makers report that they didn’t feel as though their tech stack wasn’t prepared for the sudden switch to remote work, especially their voice communications systems. So, what are the best ways to future-proof your solutions? Access this guide to learn more.

    Download

  • 5 considerations when integrating voice with Microsoft Teams

    The modern, hyper-distributed workforce communicates in myriad ways: in video meetings, over chat messages, through voice calls, and more. To simplify their communications strategy, many businesses have unlocked the power of voice with Microsoft Teams. In this guide, review 5 key considerations for that approach.

    Download

  • Compliance leader’s guide to cloud voice regulatory best practices

    The shift to cloud-based voice platforms is transforming communication and collaboration in businesses worldwide. Download this white paper to unlock key compliance considerations to prepare for the shift to cloud voice.

    Download

  • How to deploy Microsoft Teams in the cloud

    In this case study, learn how one organization needed a partner that could allow them to easily scale the conferencing use case as well as support their longer-term migration strategy to Teams Voice in GCC. Save the case study here to explore the solution.

    Download

  • Case study: Avionics safety certification with certifiable IP blocks

    Aerospace manufacturers struggle with costly, time-consuming DO-178C avionics software certification. Wind River's certifiable IP blocks reuse pre-certified components, slashing certification time and cost. This case study examines how a customer leveraged Wind River's software to quickly certify a 16-core system, saving millions.

    Download

  • Simplify DO-178C compliance and costs with certifiable IP blocks

    Wind River's DO-178C-compliant IP streamlines avionics certification. Their pre-verified virtualization, networking, security & storage solutions slash development time, costs & risks.

    Download

  • Programmable voice: The key to user privacy for all

    For companies specializing in package delivery, food services, or ride-sharing, customer and employee safety should be a top priority. So, what are the most effective ways you can ensure your user's privacy without hindering experiences on either end? Browse this article to learn more.

    Download

  • How to choose external communications integrations for Microsoft Teams

    Download this concise e-book for a buyer’s guide that describes Microsoft Teams’ PSTN integration choices. You will learn about the advantages and drawbacks of each without drowning in the details or losing sight of your original goal—to add voice service to Microsoft Teams.

    Download

  • Your guide to leveraging automation for your contact center

    As labor shortages, agent burnout, and inferior customer experiences plague contact centers, many are turning to automation to solve these issues and more. However, most organizations are unsure of where to start and can find the integration process daunting. Browse this article to learn more.

    Download

  • Protect Digital Assets with the FortiGuard Advanced Bot Protection Service

    The FortiGuard Advanced Bot Protection Service features sophisticated techniques to detect and mitigate malicious bot attacks while allowing legitimate traffic through. Read the brief to find out how to stop bots with: IP rep database, browser fingerprinting, biometric detection, ML models, and more.

    Download

  • How to overcome cloud challenges at scale

    Organizations building their enterprise workloads and applications in the cloud have extensive requirements to make them available to various kinds of consumers. Meeting these requirements can bring equally extensive challenges. Watch this webinar to learn how to solve overlapping IPs, NAT and other challenges at scale.

    Download

  • Voice Intelligence (Vi)™ Boosting Workplace Productivity

    To close deals and get more done, you might feel compelled to make a drastic change, like hiring an entirely new team. But there is one small change that combines speech recognition and machine learning that helps employees accomplish more in

    Download

  • How does Volkswagen Slovakia detect network anomalies?

    With approximately 11,000 employees, Volkswagen Slovakia is one of the largest employers in Slovakia. Also large is the company’s IT infrastructure, which is made up of its IT and OT departments that monitor 100,000 IP addresses and more. To learn how Volkswagen Slovakia manages such a complex IT environment, dig into this case study.

    Download

  • How to connect and collaborate with end-to-end innovation

    Whether you’re looking at point-to-point AV extension for a classroom, boardroom, or huddle space, or an enterprise-wide AV over IP solution, explore this white paper to find high quality solutions that are simple to install and even easier to operate.

    Download

  • Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?

    In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.

    Download

  • Fuel call center excellence with VMware SD-WAN

    With operations scaling, Simply Business’s existing network was holding their call centers back. Breeze Networks replaced the entire existing MPLS network with VMware SD-WAN, the central firewall and AWS interconnects, as well as deployed new resilient circuits and cloud-based web filtering. Download this case study to learn more.

    Download

  • EHR integrations: How to boost healthcare productivity and revenue

    Intermedia's Contact Center solution integrates with leading EHR systems to streamline patient-employee communications and improve healthcare outcomes. Automated patient verification, outreach, and self-service features can help reduce operational costs and increase revenue. Download the datasheet to learn more.

    Download

  • Practical steps for migrating to Teams Voice

    As they migrate to Teams Voice, what opportunities and obstacles should organizations expect? Unlock insights in this webcast, which features subject-matter experts from EnableUC and Ribbon Communications.

    Download

  • 15 best practices to supercharge your IVR navigation

    By streamlining your interactive voice response (IVR) call center system, you can supercharge your business's operational efficiency, productivity, and customer experience. Read this blog post now to get an in-depth look at how IVR can enhance your call center as well as 15 best practices to maximize its potential.

    Download

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

    Download

  • Resilience and Risk Mitigation in Solar Energy Systems

    Discover how solar energy pioneer BrightSource partnered with Escode, part of NCC Group, to build resilience into their large-scale solar energy projects. Learn how IP escrow and verification services protected critical intellectual property and secured investor trust. Read the full case study to see the results.

    Download

  • Navigating Success: AI Agents for Enterprise Growth webinar series

    As organizations continue to rely on customer experiences and service centers to drive business growth, many have turned to digital agents to make the process more efficient and cost-effective. Tune into this webinar to learn more.

    Download

  • A glance at the threat landscape

    The threat landscape is constantly shifting, and in order to actively defend your organization you need to stay up to date on the latest attack trends. Nexum has been leveraging its experience in order to provide an overall view of the threat landscape, specifically looking at 3 key macro trends. Read on to unlock these insights.

    Download

  • Deep Dive into DataOps

    In this e-guide, we hear from key decision-makers from Altran, Moogsoft, Puppet, Morpheus, Talend, NetApp and PagerDuty about how and why they are adopting DataOps.

    Download

  • Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

    In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now.

    Download

  • Royal Holloway: Cloud-native honeypot deployment

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

    Download

  • Security Think Tank: Biden's Cyber Security Plan

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

    Download

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

    Download

  • Marketing analytics, big data and ethics

    In this e-guide, we discuss the how important respecting the data privacy of customers and prospective customers is for companies trying to make a profit.  For commercial organisations, finding this ethical balance between making money from data and safeguarding the privacy of personal data is more important than ever thanks to the EU's GDPR.

    Download

  • Hybrid meeting equity 101: 6 tips for success

    For today’s organizations, effective collaboration means everything. However, making sure that all of your team members can participate in meetings regardless of their location, device, language, or experience level can be a tricky task. Browse this infographic to learn more.

    Download

  • Jargon Buster Guide to Unified Communications

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

    Download

  • How D-ID Agents Revolutionizes Customer Engagement in Banking and Financial Services

    D-ID Agents blends advanced technology and a human touch to transform banking and finance customer engagement. Learn how this AI-powered solution can enhance personalization, cost-efficiency, and 24/7 support. Read the full blog post to discover how D-ID Agents can revolutionize your customer experience.

    Download

  • Proving ownership of IPv6 addresses

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

    Download

  • FedRAMP compliant UC

    A top 10 federal defense contractor with over 20,000 employees was managing a complex environment with large Avaya and Cisco footprints for PBX and contact center. They required a FedRAMP environment that provided a seamless consolidation of collaboration, conferencing and voice. Download this case study to learn how they got it.

    Download

  • Covid-19: An Infographic - 3 Immediate Actions for CIOs

    This infographic highlights the measures CIOs should be taking in the wake of COVID-19. Download now!

    Download

  • Key capabilities necessary for public sector cybersecurity

    Public sector organizations continue to be prime targets for cybercrime, given their responsibility for highly sensitive data, such as health records, intelligence information, student data, and citizen IDs. Read this e-book to get started with a solid and resilient cybersecurity strategy to protect your IP, your data, and your citizens.

    Download

  • Enterprise strategy group: Insights on securing AI workloads

    Securing generative AI is crucial to protect sensitive data, intellectual property, and brand reputation. This Enterprise Strategy Group Showcase explores how AWS and partners like F5 can help organizations build a comprehensive security model for their generative AI workloads. Read on now to learn more.

    Download

  • Building a business case for UCaaS and CCaaS adoption

    Analyst report from highlights RingCentral's cloud phone system as an intelligent choice for businesses, detailing benefits like cost savings, flexibility, and scalability. Read the full report to learn how RingCentral can optimize communications and collaboration.

    Download

  • Fix your contact center challenges: Government agency guide

    With the average, overall satisfaction rate for digital government contact centers being 66%, it has become clear that agencies and organizations need to step up their game when it comes to the citizen experience. So, how can this best be done? Access this guide to learn more.

    Download

  • The Great Decommission

    Analog lines or plain old telephone service (POTS) are steadily being decommissioned, with the FCC reporting that carriers are on a path to drop POTS lines entirely within 5 years. To avoid getting disconnected, access this article to help find the right POTS replacement strategy for your organization.

    Download

  • The risk of off-channel communication

    With fines being imposed for recordkeeping failures in the U.S. totaling over $2.6 billion, communication compliance remains a serious issue. This white paper takes a deeper look at the dangers of off-channel communication and provides strategies you can employ to improve communication while reducing risk. Read on to learn more.

    Download

  • Infographic: Bitdefender's security solutions for healthcare, finance, & more

    Bitdefender offers a robust security suite tailored to industries like healthcare, finance, and manufacturing. The solutions provide comprehensive threat prevention, detection, and response capabilities. Learn how Bitdefender can strengthen your security posture and improve compliance by reading the full infographic.

    Download

  • Communications: Seamlessly connect to any telecom provider

    How can you improve your communications infrastructure to better connect employees and who they interact with? Access this whitepaper to learn how Ribbon’s portfolio is designed to help you move from a complex combination of call control platforms to modern cloud-based infrastructure.

    Download

  • Navigating the evolving landscape of AI in cloud communications: A guide

    This e-book explores how AI can address key business challenges around managing conversational data, empowering sales and contact center teams, and simplifying virtual events. Learn how RingCentral's AI solutions can make your communications more valuable. Read the full e-book.

    Download

  • Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres

    In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.

    Download

  • The guide to effective client communication in accounting

    The art of accounting comes from the understanding and management of numbers. But while numbers tell their own stories, in order to best understand your customers’ needs, you need words. This e-book explores techniques you can use to ensure that you and your clients are understood and heard, in every engagement. Read on to learn more.

    Download