I was able to escape the blizzard-like conditions of New England winter for three sunny days in Las Vegas to attend the Avaya International User Group. Despite the recent restructuring announcement by Avaya, more than 2500 people registered to attend and hear about the latest and greatest that Avaya has to offer. Some highlights of […]
At Empirix, our continued focus and development of our analytics platform will extend the value to both Wireless and Wireline Service Providers. Our solutions will continue to place emphasis on Customer Experience and Empirix will offer holistic insight into those key entities that reveals unnecessary Opex and Churn.
As Mobile technology moves towards 5G there’s an increased rollout of small cells capable of supporting low latency, low data rate applications like smart energy, building security, infrastructure, retail and healthcare etc. It may still be several years before we see the first, commercially viable applications actually in operation.
There is a perception in many enterprises that firewalls and security measures are only needed to protect vast sources of stored corporate or consumer data. Voice after all is inherently secure right? Not exactly.
Empirix today announced enhancements to the Hammer Gen6 Test Platform to provide, functional, stress and ongoing testing for secure Avaya voice environments. The Empirix Hammer Gen6 test platform enables enterprises to examine latency, performance and voice quality over encrypted communication channels, resulting in truly secure communications. This new capability enables organizations to deploy with confidence secure communication networks for critical applications in verticals, such as financial, law enforcement, and healthcare, that use encrypted communications.
Since the introduction of VoIP, the service or underlying technology (based on the SIP protocol) has been susceptible to multiple fraud scenarios. In particular, by exploiting some of the features of VoIP, such as three way call and call transfer, hackers can inject call signals into the network and effectively hijack calls. The result is significant non-billable revenue for the Service Provider. Since commands associated with VoIP technology are often sent un-encrypted and without authorization for each command, this is an easy technique to carry out.
As soon as Buffer realized it had been hacked, the company sent out an apology and informational email. The company also responded quickly to emails, social media posts, and comments on its blog. There was no hiding or keeping silent. This earned the organization huge kudos in the eyes of its customers.