You've requested...

Download this next:

Jargon Buster Guide to Voice over IP (VoIP)

Voice over IP, or VoIP telephony – the transmission of voice over an IP network as opposed to a traditional telephone network – has become the mainstay of communications in the modern enterprise to the extent that you’d be hard pressed to find a traditional handset in today’s office.

In this Jargon Buster, we’ll explore some key definitions around this topic, and look at how VoIP fits into the wider unified communications landscape.

These are also closely related to: "Tuning Applications for IP"

  • VoIP has never lost its voice: How to get the most out of your business communications

    In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce. Increasingly, VoIP capability is being integrated into the leading conferencing and collaboration tools, giving users the option of placing voice calls through a desktop application, an integrated IP phone, or directly through the native dialler on a mobile device. Download our exclusive e-Guide and read more about:

    • VoIP gateway vs. PBX: What is the difference?
    • Verizon Business enriches mobile endpoint for Microsoft Teams
    • Broadband Forum launches app-enabled services network gateway
    • Do you need to manage QoS when deploying VoIP over LAN?
    • What is the difference between IP telephony and VoIP?

  • Best practices for addressing voice network vulnerabilities

    As communications technology has advanced and unintentionally carried subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network.

    Instead, enterprises need a complete, seamless approach to network security to prevent exploitation through their VoIP communications.

    Access this white paper to learn about the current state of communications and voice network security, as well as:

    • Threats that SIP/IP communications face
    • Potential barriers to network security
    • How to build your defenses
    • And more

Find more content like what you just read:

  • A guide to protecting your intellectual property abroad

    In today’s hybrid and remote world, IP and data protection has never been more important. This is especially true for companies with international employees, who can experience a handful of consequences. So, how can you avoid these pitfalls? Dig into this guide to learn more.

    Download

  • 3 tips to keep your voice communications compliant

    As regulatory oversight increases, organizations struggle to adopt cloud unified communications (UC) systems while maintaining compliance. Discover how Theta Lake and RingCentral can help you capture, archive, and manage voice communications to ensure compliance and mitigate risks. Read the white paper to learn more.

    Download

  • Ultimate guide to future-proofing voice communications

    72% of IT decision-makers report that they didn’t feel as though their tech stack wasn’t prepared for the sudden switch to remote work, especially their voice communications systems. So, what are the best ways to future-proof your solutions? Access this guide to learn more.

    Download

  • Compliance leader’s guide to cloud voice regulatory best practices

    The shift to cloud-based voice platforms is transforming communication and collaboration in businesses worldwide. Download this white paper to unlock key compliance considerations to prepare for the shift to cloud voice.

    Download

  • How to deploy Microsoft Teams in the cloud

    In this case study, learn how one organization needed a partner that could allow them to easily scale the conferencing use case as well as support their longer-term migration strategy to Teams Voice in GCC. Save the case study here to explore the solution.

    Download

  • Boost Zoom compliance with these 3 best practice tips

    Ensure compliance in voice communications with Zoom Phone and Contact Center. This white paper explores best practices to navigate the evolving compliance landscape, including how to capture and archive all communications, unify searchable archiving, and leverage AI-powered risk detection. Read the full white paper to learn more.

    Download

  • Programmable voice: The key to user privacy for all

    For companies specializing in package delivery, food services, or ride-sharing, customer and employee safety should be a top priority. So, what are the most effective ways you can ensure your user's privacy without hindering experiences on either end? Browse this article to learn more.

    Download

  • How to choose external communications integrations for Microsoft Teams

    Download this concise e-book for a buyer’s guide that describes Microsoft Teams’ PSTN integration choices. You will learn about the advantages and drawbacks of each without drowning in the details or losing sight of your original goal—to add voice service to Microsoft Teams.

    Download

  • Protect Digital Assets with the FortiGuard Advanced Bot Protection Service

    The FortiGuard Advanced Bot Protection Service features sophisticated techniques to detect and mitigate malicious bot attacks while allowing legitimate traffic through. Read the brief to find out how to stop bots with: IP rep database, browser fingerprinting, biometric detection, ML models, and more.

    Download

  • Your guide to leveraging automation for your contact center

    As labor shortages, agent burnout, and inferior customer experiences plague contact centers, many are turning to automation to solve these issues and more. However, most organizations are unsure of where to start and can find the integration process daunting. Browse this article to learn more.

    Download

  • How to overcome cloud challenges at scale

    Organizations building their enterprise workloads and applications in the cloud have extensive requirements to make them available to various kinds of consumers. Meeting these requirements can bring equally extensive challenges. Watch this webinar to learn how to solve overlapping IPs, NAT and other challenges at scale.

    Download

  • Power hybrid working with cloud telephony and Microsoft Teams

    Discover how cloud telephony and Microsoft Teams can power your hybrid workforce. Learn the benefits, challenges, and key considerations for a successful migration. Read the full white paper to build a digital workplace that boosts employee experience and productivity.

    Download

  • How does Volkswagen Slovakia detect network anomalies?

    With approximately 11,000 employees, Volkswagen Slovakia is one of the largest employers in Slovakia. Also large is the company’s IT infrastructure, which is made up of its IT and OT departments that monitor 100,000 IP addresses and more. To learn how Volkswagen Slovakia manages such a complex IT environment, dig into this case study.

    Download

  • Voice Intelligence (Vi)™ Boosting Workplace Productivity

    To close deals and get more done, you might feel compelled to make a drastic change, like hiring an entirely new team. But there is one small change that combines speech recognition and machine learning that helps employees accomplish more in

    Download

  • How to connect and collaborate with end-to-end innovation

    Whether you’re looking at point-to-point AV extension for a classroom, boardroom, or huddle space, or an enterprise-wide AV over IP solution, explore this white paper to find high quality solutions that are simple to install and even easier to operate.

    Download

  • Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?

    In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.

    Download

  • Practical steps for migrating to Teams Voice

    As they migrate to Teams Voice, what opportunities and obstacles should organizations expect? Unlock insights in this webcast, which features subject-matter experts from EnableUC and Ribbon Communications.

    Download

  • Learn how to simplify compliance with voice recording

    Learn how to simplify compliance with voice recording and archiving regulations for Webex. Theta Lake is designed to integrate seamlessly to help businesses capture, retain, and monitor Webex communications. Discover three best practices to future-proof your voice compliance. Read the white paper to learn more.

    Download

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

    Download

  • Resilience and Risk Mitigation in Solar Energy Systems

    Discover how solar energy pioneer BrightSource partnered with Escode, part of NCC Group, to build resilience into their large-scale solar energy projects. Learn how IP escrow and verification services protected critical intellectual property and secured investor trust. Read the full case study to see the results.

    Download

  • Deep Dive into DataOps

    In this e-guide, we hear from key decision-makers from Altran, Moogsoft, Puppet, Morpheus, Talend, NetApp and PagerDuty about how and why they are adopting DataOps.

    Download

  • Royal Holloway: Cloud-native honeypot deployment

    Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.

    Download

  • Discover how vision picking can boost logistics efficiency

    Digitalization is transforming logistics, with vision picking using AR smart glasses boosting picking speed by 30% and reducing errors to near-zero. This report explores the benefits, requirements, and real-world examples of AR-powered vision picking. Read the full report to learn how to optimize your logistics operations.

    Download

  • Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

    In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now.

    Download

  • Security Think Tank: Biden's Cyber Security Plan

    As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.

    Download

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

    Download

  • Marketing analytics, big data and ethics

    In this e-guide, we discuss the how important respecting the data privacy of customers and prospective customers is for companies trying to make a profit.  For commercial organisations, finding this ethical balance between making money from data and safeguarding the privacy of personal data is more important than ever thanks to the EU's GDPR.

    Download

  • Hybrid meeting equity 101: 6 tips for success

    For today’s organizations, effective collaboration means everything. However, making sure that all of your team members can participate in meetings regardless of their location, device, language, or experience level can be a tricky task. Browse this infographic to learn more.

    Download

  • Jargon Buster Guide to Unified Communications

    In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

    Download

  • Proving ownership of IPv6 addresses

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.

    Download

  • Key capabilities necessary for public sector cybersecurity

    Public sector organizations continue to be prime targets for cybercrime, given their responsibility for highly sensitive data, such as health records, intelligence information, student data, and citizen IDs. Read this e-book to get started with a solid and resilient cybersecurity strategy to protect your IP, your data, and your citizens.

    Download

  • FedRAMP compliant UC

    A top 10 federal defense contractor with over 20,000 employees was managing a complex environment with large Avaya and Cisco footprints for PBX and contact center. They required a FedRAMP environment that provided a seamless consolidation of collaboration, conferencing and voice. Download this case study to learn how they got it.

    Download

  • Covid-19: An Infographic - 3 Immediate Actions for CIOs

    This infographic highlights the measures CIOs should be taking in the wake of COVID-19. Download now!

    Download

  • Fix your contact center challenges: Government agency guide

    With the average, overall satisfaction rate for digital government contact centers being 66%, it has become clear that agencies and organizations need to step up their game when it comes to the citizen experience. So, how can this best be done? Access this guide to learn more.

    Download

  • Building a business case for UCaaS and CCaaS adoption

    Analyst report from highlights RingCentral's cloud phone system as an intelligent choice for businesses, detailing benefits like cost savings, flexibility, and scalability. Read the full report to learn how RingCentral can optimize communications and collaboration.

    Download

  • The Great Decommission

    Analog lines or plain old telephone service (POTS) are steadily being decommissioned, with the FCC reporting that carriers are on a path to drop POTS lines entirely within 5 years. To avoid getting disconnected, access this article to help find the right POTS replacement strategy for your organization.

    Download

  • Top 5 communications challenges impacting customers and employees

    Discover the top 5 communications challenges impacting customers and employees, from disconnected channels to network downtime. Learn how unified communications and secure SD-WAN can help break down these barriers and improve productivity and reliability. Read the full blog post to explore the solutions.

    Download

  • The key differences between call centres and contact centers

    While call centers and contact centers are often thought of as one and the same, there are actually several important differences between the two services. But what are these differences and why do they matter? Browse this article to learn more.

    Download

  • Infographic: Bitdefender's security solutions for healthcare, finance, & more

    Bitdefender offers a robust security suite tailored to industries like healthcare, finance, and manufacturing. The solutions provide comprehensive threat prevention, detection, and response capabilities. Learn how Bitdefender can strengthen your security posture and improve compliance by reading the full infographic.

    Download

  • Securing AI Workloads: Insights by Enterprise Strategy Group

    Generative AI is transforming businesses, but securing the infrastructure, data, and models is critical. This report explores how AWS and partners like Check Point can help organizations build a comprehensive security strategy to unlock the full potential of generative AI while mitigating risks. Read the full Enterprise Strategy Group report.

    Download

  • Communications: Seamlessly connect to any telecom provider

    How can you improve your communications infrastructure to better connect employees and who they interact with? Access this whitepaper to learn how Ribbon’s portfolio is designed to help you move from a complex combination of call control platforms to modern cloud-based infrastructure.

    Download

  • Navigating the evolving landscape of AI in cloud communications: A guide

    This e-book explores how AI can address key business challenges around managing conversational data, empowering sales and contact center teams, and simplifying virtual events. Learn how RingCentral's AI solutions can make your communications more valuable. Read the full e-book.

    Download

  • The guide to effective client communication in accounting

    The art of accounting comes from the understanding and management of numbers. But while numbers tell their own stories, in order to best understand your customers’ needs, you need words. This e-book explores techniques you can use to ensure that you and your clients are understood and heard, in every engagement. Read on to learn more.

    Download

  • Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres

    In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.

    Download

  • The key to supercharging your workforce? Upgrading their laptops

    Explore how MacBook laptops can supercharge your workforce with built-in AI and security features. Learn about the benefits of Apple silicon M3 chips, productivity-boosting macOS tools, and cost savings versus traditional PCs. Qualified clients can test a MacBook Air at no cost through the Apple Dare to Compare program.

    Download

  • Revolutionize your contact center with conversational IVR

    Discover how conversational IVR can revolutionize your contact center. This guide explores the benefits of voice bots, including increased accuracy, flexibility, and reduced costs. Learn the 5 steps to a successful voice project and how boost.ai's solutions can transform your customer experience. Read the full white paper.

    Download

  • Mobile application platforms: Essential guide

    One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.

    Download