Monday, March 05, 2012

MWC 2012: Broadsoft announces apps targeting enterprise mobile users

Siemens launches new VoIP/UC platform, says it has earned another look | Avaya releases communications management platform

Network World Convergence and VoIP

Forward this to a Friend >>>


MWC 2012: Broadsoft announces apps targeting enterprise mobile users
In our final news note coming from this year's Mobile Word Congress, BroadSoft has announced availability of two user applications targeting enterprise mobile users. The first applications suite is delivered in a commercially availability version of BroadTouch Business Communicator, with unified communications features incorporated for voice, video, business directories, call logs, instant messaging and presence; a single interface spans a user's mobile devices and platforms, including Windows, Mac, iOS and Android. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Companies like Foursquare, StrongMail, and ExoIS are taking charge of cloud server security using Halo from CloudPassage, which ensures easy, scalable, and automated security for dynamic cloud environments. Register today to Secure 25 Cloud Servers for Free with Halo Basic.

WHITE PAPER: HP, Microsoft & Intel

HP reference configuration for Premium OLTP
Learn more Learn more

Siemens launches new VoIP/UC platform, says it has earned another look
Siemens Enterprise Communications, which has been rebuilding itself here in the U.S. for the past several years, will punctuate the idea that it deserves another look with the announcement Monday of Version 7.0 of its OpenScape UC suite that enables the VoIP platform to support up to 500,000 users. Read More

Avaya releases communications management platform
Avaya is looking to take over the management of an enterprise's entire communications platform with a new offering the company announced today. Read More


WHITE PAPER: FireEye

FireEye Advanced Threat Report – 2H2011
This report is unique in that it is not an analysis of well-known malware or billions of spam messages. Instead, we provide insight into the threats that are successful and therefore dangerous -- those which got through traditional defenses and into enterprise networks in 2H 2011. Read now.

Anonymous supporters find themselves victims of Zeus Trojan Horse
The hacktivist group Anonymous has taken on an increasingly more public profile over the past few months as the list of websites they've been able to infiltrate and deface is long and far ranging. From the US DOJ to the UFC website, Anonymous has proven quite adept at breaking into whatever they set their eyes on. But recently, members of the group had the tables turned around on them when many found... Read More

Should You Allow Inbound E-mail Over IPv6?
Federal organizations are aiming for September 2012 mandate to IPv6-enable their Internet perimeter applications. This not only includes IPv6-enabling web servers, but also IPv6-enabling e-mail servers. Therefore e-mail servers would be allowing inbound SMTP (TCP port 25) connections over IPv4 and IPv6. However, most e-mail content filtering companies only have defensive capabilities for IPv4. ... Read More


WEBCAST: NetIQ

Disaster Recovery Planning and the Cloud
Find out how virtualization is the stepping stone to the cloud and how to leverage virtualization technologies today to reduce the cost and improve the performance of your disaster recovery plan. Learn More!

Tablets With Serious Security for Business
These tablets have extra security features that will keep your work safe and your IT pros happy. Read More

Apple's App Store races by 25 billionth download mark
While most of us slept, Apple's App store sometime after midnight recorded its 25 billionth download, a milestone that will win the lucky downloader a $10,000 iTunes gift card. As you can see from the photo, the winner has yet to be announced. Our Friday story has background and details. Read More



SLIDESHOWS

15 worst data breaches
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. Destroy digital evidence before it destroys you
  2. Top 25 iPhone & iPad apps for business
  3. How to catch an Internet cyber thief
  4. Hands-on with Windows Server 8 beta
  5. Windows 8 review: 'Mission accomplished', 'transcendent', 'unintuitive'
  6. How to protect your online privacy
  7. Windows 8: What you need to get started
  8. AT&T ups "unlimited" 3G throttling cap to 3GB
  9. Juniper targeting 7 key market segments
  10. Mozilla's 'modest proposal': Dump the smartphone OS

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_convergence_voip_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment