IT News from
Enterprise Product Reviews from
Enterprise Software News from
IT Security News from
Enterprise Storage News From
VoIP News from
IT Management Insights from
Business News from
SEARCH

October 26, 2005 (6:12 PM EDT)

SMBs Worry About IP Telephony Security

By W. David Gardner , TechWeb Technology News

A survey of small and medium businesses has found that many are leery of the security of IP telephony systems and favor traditional telephony systems.

Some 300 SMBs with 20-500 employees were interviewed and only 48 percent of them said they trust IP telephony security today while 76 percent said they trust the security of traditional service providers. The survey was conducted for the Computing Technology Industry Association (CompTIA). Results were released Wednesday.

Curiously, 31 percent of the SMBs polled said they expect to have greater confidence in IP telephony systems in the next 12 months.

In a prepared statement, John Venator, the trade association’s president and chief executive officer, noted that the survey indicates product vendors and solutions providers with security expertise can gain competitive advantage with SMB customers.


   Try TechWeb's RSS Feed!
(Note: The feed delivers stories from TechWeb.com only, not the entire TechWeb Network.)
NETWORKING WHITE PAPERS AND REPORTS
Secure Information Sharing for Layer 2 Networks
Recent improvements in both technology and hardware have made Layer 2 WAN services a viable, scalable and cost effective alternative to traditional WAN services. While the networking advantages of Layer 2 WAN services have been met with approval, there are some security deficiencies with Layer 2. These issues are discussed in this paper.

Complete Guide for Securing MPLS Networks
MPLS provides a virtual network to the enterprise over the service provider's network. The service provider's MPLS network is shared by multiple enterprise networks and/or used by the service provider as an MPLS and/or Internet backbone. But “virtual” does not imply “secure”, and it is not free from the risk of losing data.

Two-Factor Enterprise Authentication: An Overview
Cybercrime is a serious threat to networked assets, and the first step to deal with it is to ensure you know who is accessing your network. This paper deals with the issues surrounding network security, authentication and identity management, and the use of two factor authentication methods for securing access.

Two-Factor Enteprise Authentication for Mac OS X
With the proliferation of deployed workforces, users requiring network access from a variety of devices, and the sheer value and volume of online ‘assets’, the need for strong, reliable network protection has never been greater. This paper deals with the issues surrounding security, authentication and identity management in Mac OS X networks.

BIGFIX Presents: Ray Hopewood, the Godfather of Enterprise Security

Minimize Threats with ProCurve ProActive Defense

ECM: The value of content standardization

Control costs and increase productivity with MFPs

How resilient is your organization? Learn how to assess your IT risk

Related White Papers

CAREER CENTER
Ready to take that job and shove it?
SEARCH
Function:

Keyword(s):

State:
SPONSOR

RECENT JOB POSTINGS
CAREER NEWS
If you're thinking about establishing yourself in Second Life -- or are wondering whether you should -- we've got five rules that will help your new venture be a success.

The global defense and tech company is seeking tech professionals skilled in Web site development, general software development, database administration, digital manufacturing, SAP/ABAP, complex CAD/CAM and PLM activities.

Advertisement






Specialty Resources

Featured Microsite

Related Links


Microsites

Featured Topic

<A HREF=""http://as.cmpnet.com/event.ng/Type=click&FlightID=98278&AdID=166478&TargetID=447&Segments=475,1411,3108,3448,4869&Targets=447,2625,2878&Values=34,46,51,63,77,87,92,102,140,222,227,398,442,479,1255,1311,1405,1767,1785,1925,1970,2299,2310,2352,2678,2727,2767,2942,3904,4080,5195&RawValues=&Redirect=http://www.bmighty.com"" target=""_top""><IMG SRC=""http://i.cmpnet.com/ads/graphics/as5/tr/blank.gif"" WIDTH=125 HEIGHT=125 BORDER=0></A>

Additional Topics

Crush The Competition

TechWeb's FREE e-mail newsletters deliver the news you need to come out on top.

Techencyclopedia

Get definitions for more than 20,000 IT terms.