The Outlook for Fixed and Mobile Service Providers

Outlook

At Empirix, our continued focus and development of our analytics platform will extend the value to both Wireless and Wireline Service Providers. Our solutions will continue to place emphasis on Customer Experience and Empirix will offer holistic insight into those key entities that reveals unnecessary Opex and Churn.

Scoring Customer Experience for Telecom Operators in Africa

Quality of Experience

As Mobile technology moves towards 5G there’s an increased rollout of small cells capable of supporting low latency, low data rate applications like smart energy, building security, infrastructure, retail and healthcare etc. It may still be several years before we see the first, commercially viable applications actually in operation.

Is Your Enterprise Really Protected?

Enterprise Data Security

There is a perception in many enterprises that firewalls and security measures are only needed to protect vast sources of stored corporate or consumer data. Voice after all is inherently secure right? Not exactly.

Empirix Enhances Ability to Test Secure Communication Networks With Secure Device Emulation for Encrypted Avaya Voice Networks

Secure Communication

Empirix today announced enhancements to the Hammer Gen6 Test Platform to provide, functional, stress and ongoing testing for secure Avaya voice environments. The Empirix Hammer Gen6 test platform enables enterprises to examine latency, performance and voice quality over encrypted communication channels, resulting in truly secure communications. This new capability enables organizations to deploy with confidence secure communication networks for critical applications in verticals, such as financial, law enforcement, and healthcare, that use encrypted communications.

Fraud Within a VoIP Environment

Hacker

Since the introduction of VoIP, the service or underlying technology (based on the SIP protocol) has been susceptible to multiple fraud scenarios. In particular, by exploiting some of the features of VoIP, such as three way call and call transfer, hackers can inject call signals into the network and effectively hijack calls. The result is significant non-billable revenue for the Service Provider. Since commands associated with VoIP technology are often sent un-encrypted and without authorization for each command, this is an easy technique to carry out.

3 Contact Center Lessons Learned from the Buffer Hack

Computer Hacker

As soon as Buffer realized it had been hacked, the company sent out an apology and informational email. The company also responded quickly to emails, social media posts, and comments on its blog. There was no hiding or keeping silent. This earned the organization huge kudos in the eyes of its customers.

Testing SBCs: Why Do It?

Testing SBCs

Two key elements of infrastructure testing of contact centers and unified communication environments include the session border controller (SBC) and SIP trunking. To understand more about SIP testing, read SIP 101: Preparing for Successful Deployment. In this post, I will focus on the requirements of testing SBCs.