Did you miss Channel Partners in Las Vegas last week? Fear not - we've jotted down some of the key themes for you. Take note!
TeleDynamics Think Tank
Topics: Trends, Network Security, Cloud, Events, News, IoT, Unified Communications
New year, new risks. Let’s talk security.
In today’s digital economy, mobility is not only an expectation, but in many cases, a requirement for workers to successfully fulfill their responsibilities. Security is a key preoccupation for network administrators as they implement voice and data technologies for remote workers.
In this article, we review various remote employee voice service scenarios, look at what their potential risks are, and examine the best voice encryption and VPN solution for each case.
Topics: VoIP, Network Security
The Internet of Things (IoT) is a field of information and communications technology (ICT) that has been increasing exponentially for the past few years, with the number of connected devices now exceeding the world’s human population.
But many IoT device users may not be aware of the inherent security risks of their internet-connected devices, according to a January 2018 study by the Cybersecurity Research Institute. According to the report, hackers have already proven themselves adept at discovering flaws in these devices and turning them into botnets (botnets are a collection of connected devices infected with malware and controlled without the owners' knowledge).
In this article, we review some of the vulnerabilities inherent in connected devices and steps you can take to secure your network and protect against hackers.
Topics: Trends, Network Security, IoT
One of the most common matters we discuss with customers on our support calls is network security – specifically, how to lock down SIP Trunks, IP PBXs, SIP phones, and routers from hacking. Here we review different ways hackers can break into your voice network and the steps you can take to secure your system.
Topics: SIP Phones, IP PBX, SIP, Network Security, Routers
EdgeMarc SBCs that scale with growing businesses
Review of the EdgeMarc 2900a and 2900e Enterprise Session Border Controllers
Update: Since this article was published, in 2018, Edgewater Networks was acquired by Ribbon Communications.
Edgewater Networks has added to its line of enterprise session border controllers (eSBCs) with its EdgeMarc 2900A and 2900E models. These are designed to enable enterprises and service providers to future-proof their SIP trunking and Unified Communications (UC) deployments. With built-in mechanisms for both QoS and security, they provide intelligent mechanisms allowing for both hosted PBX services as well as SIP trunking applications.
They have several features that differ from other EdgeMarc SBCs.
Topics: QoS, VoIP, SIP, Peripherals, Network Security, Network Design, Product Review
If you weren’t able to attend Channel Partners Evolution last week in Austin, fear not: here are our top takeways from the event.
Topics: VoIP, Trends, Network Security, Cloud, Events
The Future of Telecommunications: the Next 25 Years
Quantum-leap technology advancements will enable on-demand services anytime, anywhere, with ubiquitous connectivity.
by Laureen R. Cook, Principal Telecoms, Media and Technology Advisor, IFC (World Bank)
Nordic Mobile Telephony (NMT) was introduced as the first 1G system in the Scandinavian countries in 1982. 2G was commercially deployed in 1992 and 3G launched commercially in 2001, allowing mobile data as a mainstream service. 4G has been deployed since 2012, and is still being deployed around the world in developing markets, and 5G is on the horizon for the early- to mid-2020s. On average, we deploy a new generation of mobile communications every 10 years. In 25 years’ time, we will have deployed 7G and be well underway with design of the specifications for 8G, where wireless high-definition video streaming and virtual reality are part of the everyday norm. We will have transformed ourselves from the Digital Era of the 1990s to 2020, to the Digital Era of Automation from 2020 and beyond, which will be an all-immersive, high-definition user experience, taking us seamlessly from Gigabytes GB = 109 of data to Zettabytes ZB = 1021.
Topics: Wireless, Business Telephone System, Trends, Mobility (including remote work), Network Security, Mobile, Network Design
Implementing VoIP safely and efficiently on the network edge
Voice over IP networks can be challenging to implement efficiently and securely. This is in part because voice packets require specialized management and must be treated differently than normal data packets. Quality of Service (QoS), security and flow control are just some areas in which the required handling of voice traffic differs from conventional data traffic.
The good thing is that with the proper expertise and care, many of these issues can be successfully dealt with within the corporate network. Such networks are under the complete control of the network administration team and thus can be fully customized for the needs of the voice being transmitted.
However, what happens when voice packets are routed beyond the corporate network, either for voice calls to the PSTN or mobile network, or for employees who use internal voice network services remotely? Here we look at various network edge mechanisms that can be used to monitor and manage data traveling in and out of the LAN.
Topics: QoS, VoIP, Total Voice Solution, Trends, Network Security, Network Design
For a safe new year, you need more than a firewall
By John Macario, SVP of Product Management and Marketing at Edgewater Networks
The beginning of a new year is a time when many business managers reflect on learnings from the previous year and begin working on their goals for the current year. Business continuity and data security are, of course, top priorities and securing the network is a vital part of this.
For network professionals, there is no word more fearsome than “breach.” A security breakdown can mean lost data, stolen secrets, expensive lawsuits, and more. According to IBM, the average cost of a data breach is now US$4 million. This is why nearly every organization that knows what's good for it now invests in antivirus, data loss prevention (DLP), and of course, firewalls.
These days, however, we need to protect more than just data. Enterprise communications have grown into a multi-billion dollar market, particularly due to the widespread adoption of VoIP and unified communications (UC) services. This presents a new challenge that firms will have to face in order to gain a winning edge: voice security. IP phone services present a whole new attack area to potential hackers, a frontier that firewalls simply cannot protect by themselves. The essence of this challenge lies in the fact that we're talking about two entirely different types of information transmission that, in turn, require different security solutions.
Topics: QoS, VoIP, Network Security
Five reasons you should add an SBC to your IP network
We consider session border controllers (SBCs) to be a best practice in most enterprise contexts because of the improved security, control and overall VoIP system functionality they lend.
So what exactly are SBCs and why do you need one?
Topics: SIP Phones, QoS, Business Telephone System, VoIP, SIP, Total Voice Solution, Network Security
Welcome to our Think Tank
In this blog you'll read our thoughts on business telephone systems. While a lot has changed in telecom since TeleDynamics was founded in 1981, we remain as committed as ever to delivering the best customer service in the industry.
If you would like elaboration on a specific topic, please let us know in the comments section.
Happy reading and thanks for stopping by!
Receive New Articles by Email

Recent Posts
- Grandstream WP836 ruggedized Wi-Fi phone shines in tough environments
- Meet Yealink's impressive BH74 binaural noise-cancelling Bluetooth headset
- Manage your notification and paging ecosystem with Terminus by CyberData
- Yealink unveils AI-powered solutions at ISE 2025
- Yeastar's impressive hotel management solutions
Posts by Topic
- 5G
- AI
- Android
- Avaya
- Bluetooth
- Boom Collaboration
- Business Continuity
- Business Strategy
- Business Telephone System
- Case Study
- Catalog
- Cisco
- Cloud
- Codecs
- Collaboration
- Communication
- Conferencing
- Cordless
- CPaaS
- Customer Service
- Customer Success Story
- DECT
- E911
- Events
- Facility Management
- Firewall
- Firmware Upgrades
- FoIP
- Gateway
- Grandstream
- Headsets
- Home Security
- Internet Protocol
- IoT
- IP PBX
- Jabra
- Konftel
- Leasing
- Microsoft
- Mobile
- Mobility (including remote work)
- NEC
- Network Design
- Network Infrastructure
- Network Security
- News
- OTT VOIP
- Outsourcing
- Panasonic
- Peripherals
- PoE
- Polycom
- Power Management
- Product Review
- Productivity
- QoS
- Regulations
- Routers
- SD-WAN
- SIP
- SIP Phones
- Snom
- Software Integration
- Surveillance
- Switches
- Total Voice Solution
- TP-Link
- Trends
- Troubleshooting
- UCaaS
- Unified Communications
- Videoconferencing
- VLAN
- Voice Protocols
- Voicemail
- VoIP
- VoWi-Fi
- VTech
- WAN Technology
- Wi-Fi
- Wireless
- WISP
- Yealink
- Yeastar
- Zoom