Tuesday, October 27, 2009

UC This Week: Softphones Require Strong Endpoint Protection

NETWORKWORLD

 Check out the enhanced Master's of Unified Communications website.

This Week's Blog authored by Johna Till Johnson of Nemertes - excerpt:

What happens when the phone becomes the computer and vice versa? We're finding that 70% of organizations are using softphones for Voice over IP (VOIP) for at least some (on average, 22%) of their employees. And these are not just toys. Among organizations using softphones, a little more than a third are using softphones in lieu of a desktop phone. Just over half are using them primarily as an adjunct to a desktop phone. And the number one role (44%) for softphone use is mobile workers.

This all points to the need for strong endpoint security and authentication....

Read this blog and comment if you'd like.

Join us and be part of the UC community 

Gartner:  Planning Now for Virtualization's Future Challenges
In this white paper, Gartner offers advice on how to plan for unruly data centers with multiple silos, flatten the virtual hierarchy and achieve virtual data center optimization.
Download Now!

Forward this to a Friend >>>


SUBSCRIPTION SERVICES
You are currently subscribed as networking.world@gmail.com. If you do not wish to receive future mailings from Network World Online Resources, need to change your email or other preference, please visit: 
http://optout.nww.com/nwwonline.aspx?emid=ljgMWiUzqEL5DELSQFq82Zq8hfg6MLuR7GO49Ps0A64%3d .

If the above URL is not enabled as a link, please copy it in to your browser window to access our Subscription Page.

View Network World's online privacy policy.

Copyright 2009 | Network World | 492 Old Connecticut Path | Framingham MA  01701 | www.networkworld.com

No comments: