Blog & Resources

Avaya Files Bankruptcy: What You Should Know

Avaya Files Bankruptcy: What You Should Know

Avaya filed for Chapter 11 bankruptcy protection in January, ending months of speculation that it would take steps to reduce and restructure its $6.3 billion in debt. This move was followed by the sale of Avaya’s networking business to Extreme Networks for $100 million.

Finding the Value of UC

Making the case for upgrading an aging phone system. 

Although IP-based telephony has been providing organizations with documented benefits for going on two decades now, a surprisingly large number of companies still depend on legacy time-division multiplexing (TDM) services.

Virtual Groundwork

For SMBs, virtualization helps create path to more effective digital initiatives.

The idea of harnessing emerging technologies to achieve “digital transformation” is appealing to small and midsize businesses (SMBs), but they struggle when it comes to actually developing a strategy for achieving that goal.

Multifactor Authentication Can Ease ‘Aftershock’ Attacks

Multifactor Authentication Can Ease ‘Aftershock’ Attacks

Earthquakes typically produce a series of smaller quakes in the same area long after the original. These “aftershocks” vary in intensity and can continue over a period of weeks, months or even years. Information security experts now believe that companies should be prepared for similar long-lasting reverberations following a number of high-profile data breaches.

The Danger of Rogue Access Points and BYON

The Danger of Rogue Access Points and BYON

When the CIO of the Department of Transportation (DOT) launched a project to implement Microsoft Office 365, he quickly discovered a big problem. No one had ever really designed the department’s network — end-users simply installed networking equipment as needed.

Data Shakedown

Almost half of companies were targeted by ransomware attacks in 2016. Here’s what you should know about this growing threat.

Security researchers and law enforcement officials say the spread of ransomware attacks has reached epidemic proportions. Organizations of all sizes in both the public and private sectors have been impacted by this insidious type of malware, which encrypts valuable digital files and demands a ransom to decrypt them.

The True Cost of IT

What are your computer systems really costing your organization? Here are some key questions to ask.

In today’s hyper-competitive marketplace, organizations of all sizes are looking for ways to improve efficiency and customer service while keeping expenses in check.

What Does an Effective Endpoint Security Strategy Look Like?

What Does an Effective Endpoint Security Strategy Look Like?

It was only a matter of time before the rise of mobile led to the rise of mobile security threats. From smartphones and tablets to wearables and Internet of Things devices, the number and variety of endpoints have made it difficult for organizations to maintain control over mobile environments and deliver security updates in a timely fashion.