Spoofing is the act of changing the source number on an inbound call. While some spoofing is legitimate, the days of trusting Caller ID are long gone.
An analysis of the Robocall Threat in Voice Network Security
TDoS Attacks flood and overwhelm a target’s voice lines and systems, preventing legitimate calls from getting through.
How to block TDoS Attacks, Toll Fraud, Voice Spam, Social Engineering and other common exploits.
In this report, we discuss the current, real-world state of security in the realms of enterprise Voice and Unified Communications (UC).
CTO Mark Collier talks real-world voice security on "No Jitter," a leading podcast on the converging networking worlds.
A downloadable introduction to the ETM technology platform.
A white paper overview of threats, procedures, and best practices for Enterprise Voice Network Security.
A downloadable brochure explaining the ETM Call Recorder Application.
A downloadable brochure explaining the PolicyGuru Meta-Policy Controller.
A downloadable brochure explaining the ETM Performance Manager Application.
A downloadable white paper explaining Telecom Security and NERC.
A downloadable brochure explaining SecureLogix's Managed Security Service for Voice.
A downloadable brochure explaining the ETM Voice IPS Application.
A downloadable whitepaper explaining SecureLogix's Enterprise Voice Network Security Solutions.
A downloadable whitepaper explaining SecureLogix's Enterprise Telecom Management Solutions.
A downloadable brochure explaining the ETM Usage Manager Application.
A downloadable white paper explaining Guarding Against Call Center Fraud and Attacks.
Downloadable product specifications explaining ETM 1024 Appliance Specifications.
Downloadable technical product discussion.