Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

  • Secusmart puts its BlackBerry encryption chip to work on the desktop

    At around ?2,000 (US$2800) each, the secure smartphones that SecuSmart showed at Cebit last year were out of reach of many businesses -- although three governments have since bought them to secure mobile phone calls between senior officials, according to CEO Hans-Christoph Quelle. Now the company has developed a less expensive and more flexible system intended for the enterprise, and has extended the reach of its mobile system to secure VOIP calls on desktop phones.

  • Cisco working to fix broken patch for VoIP phones

    Cisco Systems plans to release a new patch for a vulnerability in its VoIP phones after the first patch did not fix the problem, which could allow an attacker to eavesdrop on conversations.

  • Zultys adds Android client for VoIP phone calls

    Zultys has upgraded the software in its MX family of IP PBXs and added a Mobile Communicator client for Android-based smartphones, the company said on Tuesday.

  • HP LaserJet printers vulnerable to attacks, Columbia researchers warn

    Millions of HP LaserJet printers contain a security weakness that could allow attackers to take control of the systems, steal data from them and issue commands that could cause them to overheat, according to two researchers from Columbia University.

  • Skype cuts company VoIP phone bills

    Any business that has a corporate VoIP system can now use Skype's SIP trunking service as a way to cut the cost of corporate phone bills.

  • Skype to expand to businesses

    Skype is making a play for the enterprise market with a system that lets companies integrate their existing, open VoIP phone systems with Skype's proprietary service.

  • Criminals using VoIP system for phone scam

    Criminals are taking advantage of a bug in the Asterisk Internet telephony system that lets them pump out thousands of scam phone calls in an hour, the FBI has warned

  • Enterprises to cut fixed-line in favour of mobile

    The economic downturn means that businesses will spend less on fixed-line voice budgets, as enterprises look to mobile phones as a cheaper communications alternative, so according to telecoms analyst group Analysys Mason.

  • Truphone puts VoIP on Blackberry minus Wi-Fi

    Truphone has opened a new front in its fractious battle to undercut mobile networks, announcing a beta version of its software that lets Blackberry users make VoIP phone calls.

  • Ruckus takes its WLANs higher

    Ruckus, which makes WLAN switches for small-to-medium businesses, has delivered a larger switch and upgraded its management software, to handle large sites with multiple buildings - entering the territory delivered of rivals such as Cisco and Aruba.

Latest Features

  • Cybercrime is 'much bigger than al Qaeda' in the US

    Security experts confirm concern outlined by DHS Secretary in recent speech

  • Five focus areas to keep Avaya in the race

    New Avaya data networking chief Marc Randall has five focus areas in his sights to help the company sell its Ethernet switches, gain market share... and perhaps stave off irrelevancy.

  • A guide to Network Access Control endpoint security

    One of the main promises of network access control is that you can ensure that endpoint security tools are up to date and that non-compliant machines can be identified or blocked. As regulatory compliance has grown in importance, NAC vendors have reacted by building strong feature sets aimed at endpoint security and compliance. In our NAC testing, we had good, and sometimes great, results across the board when it came to endpoint security.

  • A guide to Network Access Control authentication

    In the network access control products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of authentication mechanism you want, if any.

  • Microsoft gets NAC act together

    The world of network access control is being drawn, irresistibly, into Microsoft's orbit now that the Redmond giant's full repertoire of Network Access Protection client, server and policy components are out there in the real world.

  • Wireless LAN stress test uncovers 802.11 problems

    There are competing architectures for entgerprise Wi-Fi. A rare test , carried out by a Wi-Fi pioneer, made a surprising conclusion.

  • The Asterisk marks the spot

    The open source PBX software is now at the centre of an alternative telephony market.

  • Secrets and lies, encryption style

    Why an encryption programme, supposedly used by terrorists, should terrify no-one.

  • Hulk and Maui - a recap

    Within the next five months EMC will announce its cloud computing storage products, code-named Hulk and Maui. What do we know so far about them?

  • Crossing VoIP's security minefield

    I'm hearing more about new kinds of attacks on the LAN, such as VoIP attacks or using printers as a source of attack. How can LAN security help me prevent such events?

Featured White Papers

Proteus: IP Address Management Built Right

This paper discusses the evolution of IPAM technology toward the use of purpose-built appliances. Proteus? features are discussed in the context of current IPAM solutions and future network considerations. The new approaches to this technology that Proteus embodies are explained in terms of the integration of business processes that it enables.
Download whitepaper

Monitoring and Managing Voice over Internet Protocol (VoIP)

As with most new technologies, Voice over Internet Protocol (VoIP) brings new challenges along with the benefits. The main challenge is VoIP?s extreme sensitivity to delay and packet loss compared with other network applications such as web and e-mail services. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help you keep your VoIP network running smoothly.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map