Blog Archives

An update on Heartbleed Bug and ShoreTel Platforms

By: ShoreTel, Brilliantly Simple

As you may have seen in the news the last few days, security experts have discovered a security flaw called the Open SSL Heartbleed Bug, a significant potential threat that could impact a large number of websites and applications across multiple industries and companies.  While this is not a ShoreTel caused event, it is important […]

The Evolution Continues – Cloud Communication

By: Tricia Stream, Product Positioning Manager Google+ icon for profile link

Once upon a time all enterprises used circuit-switched telephone networks with local operators manually switching cables to connect to inter-office numbers. As technology continued its march forward, businesses established the standard of deploying telephony systems via software installed on hardware appliances within company closets. The information superhighway heyday brought forth the ability to connect across […]

An Inside Look at the Enterprise Connect RFP Panel

By: Tricia Stream, Product Positioning Manager Google+ icon for profile link

Last week I had the opportunity to speak at the Enterprise Connect tradeshow. Each year there is a panel discussing the requests for proposals for a mock IP telephony and unified communications client. The 2014 RPF session at Enterprise Connect was the fourth iteration of this particular panel, as moderated by Dave Stein, principal at […]

Do you know the difference between privacy and security?

By: Tricia Stream, Product Positioning Manager Google+ icon for profile link

Technology evolves at a breakneck pace, but the greatest business successes come when technology molds to meet individual business needs. Alas, no matter where we’re located hackers find a way to keep pace with technological developments. The only truly secure system is one that no one can access, one that is totally private, which certainly […]

Cloud Privacy vs. Security

By: Pejman Roshan, Vice President, Product Management

Security is always a concern when sensitive data is involved, and that concern is heightened when it comes to cloud services that sit outside the corporate firewall. Although the terms have become interchangeable, there is a difference between privacy and security. Security is the state of being free from danger, whereas privacy is the state […]

The Fingerprint of Telephone Security

By: Pejman Roshan, Vice President, Product Management

Have you seen the Touch ID fingerprint sensor on the newly released iPhone 5S? This is the fingerprint scanning technology built into the Home button, which allows you to unlock you iPhone 5S, as well as make purchases through the App Store, without having to constantly re-enter your password. In the technology world, the great […]

ShoreTel Newsletter: Tips to Maximize Home Working, IP Telephony Security Checklist

By: Jack McCarthy, Content Manager Google+ icon for profile link

Despite some recent concerns that working from home may encourage goofing off, surveys actually show significant productivity increases with home working. This month’s edition of the ShoreTel Newsletter offers four tips on avoiding distractions in your home environment and maximizing your efforts. One way to stay connected at home is to use ShoreTel Dock to […]

Dip into SIP

By: ShoreTel, Brilliantly Simple Google+ icon for profile link

SIP trunking has long been on the technology watch list, but as SIP trunking services have matured, the time is now to jump in with both feet. Many of your peers have already made the leap. SIP trunking service revenue jumped 128% in 2011 from the previous year, according to the market research firm Infonetics. […]

Securing Your UC System

By: Dieter Rencken, Senior Product Manager

We live in a very different world than say just 10 years ago. Our business systems including our phone/UC systems are more open and standards based and more interconnected than ever before. This provides tremendous benefits but also requires us to be aware of the associated security risks. Securing a UC system should not be […]

< 1 – 10 of 14 >