UC Security Lacking

Beyond standing email security, most UC security efforts lean toward protection of VOIP, Nemertes finds. SIP protection lags far behind, and IM security is barely on the radar.

EU Progressive with DLP

EU Companies operating in other compliance regimes, especially in EU countries where individuals are considered to be the owners of their personal data and enterprises merely custodians, are more likely to be deploying data-leak...

Financial Services Leads the Way

The rise of identity theft has raised awareness about data-leak prevention quite high in financial services, according to Nemertes Research. Nearly 67 percent of enterprises in the financial services vertical are using the...

DLP Not Common...Yet

Importantly, no small organizations Nemertes has benchmarked are yet deploying data-leak prevention. Another 21% are planning to deploy DLP systems by 2011.

UC, Privacy, and Presence

Last week, we discussed some of the issues unified communications raises with respect to litigatin, including e-discovery challenges. This week, I’d like to raise awareness of privacy concerns related to UC adoption.Presence, one of...

SIP Trunking Differentiators

To help SIP trunking buyers Nemertes has created a check-list of key product differentiators to look at when evaluating SIP trunking service offerings. These include:· Size of markets targeted· Verticals targeted· ...

SIPconnect Aims to Define Interoperability

SIP-trunking services are still are rapidly growing in availability though interoperability challenges spurred by different vendor and service provider implementations of SIP remain the key obstacle to a successful implementation. ...

SIP Trunking: More than PSTN Access

Many SIP-trunking providers deliver a number of value-added services, such as dynamic call re-routing. This lets voice architects set rules for in-bound call management, such as “follow- the-sun” configurations that route incoming...

Don't Forget About Security:

Only one-third of those adopting SIP trunking have a strategy for security, Nemertes finds. Vulnerabilities for SIP trunks are significant, ranging from PBX toll fraud to sophisticated denial of service attacks and violation of...

SIP Trunking on the Rise

Nemertes has tracked growing interest in SIP trunking, with 19% of recent research participants saying that they are deploying SIP trunking, up from 12% in 2008. An additional 28% are planning to deploy, while 16% are evaluating SIP...

Skype Grows Up

Now that it's legal troubles are apparently behind it, and separation from eBay is near, Skype is free to move aggressively into new opportunities, especially the nascent SIP trunking industry.Skype's presence on the show floor at...

Desktop Video, Not Ready to Replace the Telephone

Although Nemertes sees increased interest in desktop video, we don’t expect it to replace straight voice calls. Instead, it’s most often used to augment other video conferencing systems, enabling home or mobile workers, or those...

Video Deployment on the Rise

Nemertes sees no sign of video uptake slowing. Participants in our 2009 communications and collaboration benchmark often cite video conferencing as one of the services that “survives the cut” as IT budgets are scaled back due to the...

Conferencing: Not Just for the Big Guys

I was talking to a vendor the other day. These guys specialize in technologies designed for the small-to-medium business (SMB) market, and they asked how long it took for a given technology to “trickle down” from big enterprises to...

UC for Mobile Workers

There is growing interest in providing unified communications (UC) support for mobile workers. Vendors are extending their enterprise UC platforms to support devices such as Google Android, RIM BlackBerry, and Apple iPhone via...

Workers Happy from Home

Teleworkers are on the rise. Nearly 86% of organizations say they are increasing the number of teleworkers between 2008 and 2009. The number one reason for about 82% of organizations is to increase employee satisfaction.

Mobile Teleworker or Teleworker that’s Mobile?

What’s the difference between a “teleworker” and a “mobile worker”? Increasingly, not very much. Last week we discussed what organizations should do in order to make sure their companies are “teleworker-friendly”. But here’s the...

IM in the Workplace, Ready or Not

Gaining popularity first on the consumer front, instant messaging continues to be one of the most widely utilized UC applications, with 68% of organizations deploying and an additional 14% evaluating. Organizations must evaluate...

A Switch to Softphones?

For the past several years, the deployment of softphones was limited to very small pilots usually among IT staff members. Now, softphones are starting to gain key supporters among non-IT employees, resulting in 70% of organizations...

Who Owns UC?

I’m often asked, “Who owns UC?” What Nemertes finds is network and telecom groups are the primary decision makers for 61% of participating organizations, while 12% of participants have actually established cross-functional UC...

Load More