News Feed Item
SecureLogix Leadership Team to Keynote Enterprise Connect Conference with Session on 4th Annual State of Voice & UC Security Report
|By Business Wire
|March 18, 2014 07:01 AM EDT
SecureLogix’s Mark Collier and Rod Wallace will be keynote speakers,
highlighting the results of the company’s fourth Annual State of Voice &
UC Security report on Thursday, March 20, at Enterprise Connect at the
Gaylord Palms Convention Center in Orlando. Find the report here: http://securelogix.com/sos/
Learn About The State of Communications Security
What is the true state of communications security in 2014? Going
forward, where are the most serious threats and what is and what isn’t
being done to stop them? In this keynote, CTO Mark Collier and Rod
Wallace, VP Global Services, will share the results of this highly
anticipated annual report. This annual report has become a go-to source
for key attack examples and trends in Voice and UC Security, with
insights having been cited by The New York Times, Los Angeles
Times, Dark Reading, Krebs Report on Security and many
In this session, Collier and Wallace will offer real world findings from
extensive research conducted by SecureLogix documenting and observing
operational attacks against U.S. enterprises and their contact centers,
to provide a sense of what sorts of attacks pose the greatest risks to
communications services, infrastructure and business. “Our goal is to
have attendees come away with a much deeper understanding of the threats
to fixed and mobile communications that should concern them most and how
to tackle them,” stated Mark Collier, SecureLogix CTO.
About Mark Collier
Mark Collier is CTO and VP of engineering for SecureLogix. Collier is
responsible for technology research and development and related
intellectual property, with a special focus on UC security solutions. In
addition to his corporate R&D work, he has completed publicly funded
research into current and future threats to UC systems, protocols and
application services. Collier is a frequently quoted author and
presenter on the topic of voice and UC security, and has recently
co-authored the second edition of his book on VoIP security entitled
“Hacking Exposed: VoIP” (McGraw Hill, 2014). Collier is also an author
of the SANS VoIP Security course and a founding member of the VoIP
Security Alliance (http://www.voipsa.org/).
About Rod Wallace
Rod Wallace is VP of global services for SecureLogix, with management
responsibility over managed services, professional consulting, and
customer support. Wallace has worked in the information technology
sector for over 20 years, many of which were spent at Nortel building
and managing teams and resources to deliver network security consulting
and monitoring services to Fortune 100-level accounts. While at Nortel,
Wallace led Nortel’s Secure SIP Trunking Solutions team supporting
integrated product and service offers to strengthen Nortel’s position in
the enterprise VoIP and SIP trunking markets.
SecureLogix, a Gartner designated “Cool Vendor” is the leader in
enterprise voice/UC policy enforcement and ROI intelligence. SecureLogix
7th generation solutions enable customers to save money through securing
and optimizing UC/Voice networks, allowing cost efficient and confident
migration to SIP Trunking and Unified Communications. SecureLogix
solutions are currently protecting and managing over six-and-a-half
million enterprise phone lines. For more information, visit SecureLogix
on the Web at www.securelogix.com
Reader Contact Information
SecureLogix Corporation, 13750 San Pedro, Suite 820, San Antonio, Texas,
78232, 210-402-9669, fax 210-402-6996, [email protected],
[email protected], www.securelogix.com.
© Copyright 2014 SecureLogix Corporation. All Rights Reserved. ETM,
TeleWatch Secure, TWSA, We See Your Voice, SecureLogix, SecureLogix
Corporation, the SecureLogix Emblem and the SecureLogix Diamond Emblem
are trademarks and/or service marks or registered trademarks and/or
service marks of SecureLogix Corporation in the U.S.A. and other
countries. All other trademarks mentioned herein are believed to be
trademarks of their respective owners.
SecureLogix technologies are protected by one or more of the following
patents: US 6,226,372 B1, US 6,249,575 B1, US 6,320,948 B1, US 6,687,353
B1, US 6,718,024 B1, US 6,760,420 B2, US 6,760,421 B2, US 6,879,671 B1,
US 7,133,511 B2, US 7,231,027 B2, US 7,440,558 B2, US 8,150,013 B2, CA
2,354,149, DE 1,415,459 B1, FR 1,415,459 B1, and GB 1,415,459 B1.
Recommended Social Tags: Internet Security, Voice
Security, Hacking, IP Communications, VoIP, VoIP Security, TDOS, Unified
Communications, Telecom Fraud.
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT.
In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Sep. 28, 2016 05:00 PM EDT Reads: 1,712
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Sep. 28, 2016 04:45 PM EDT Reads: 337
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 28, 2016 04:30 PM EDT Reads: 2,799
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here
In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Sep. 28, 2016 04:15 PM EDT Reads: 2,420
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount.
In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 28, 2016 04:15 PM EDT Reads: 1,855
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Sep. 28, 2016 04:15 PM EDT Reads: 1,470
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud.
In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Sep. 28, 2016 04:00 PM EDT Reads: 1,479
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Sep. 28, 2016 03:15 PM EDT Reads: 347
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example:
Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest
Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry
The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 28, 2016 03:15 PM EDT Reads: 1,307
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things.
And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Sep. 28, 2016 03:15 PM EDT Reads: 4,139
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives.
Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 03:00 PM EDT Reads: 3,863
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics.
In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
Sep. 28, 2016 02:45 PM EDT Reads: 1,740
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley.
The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Sep. 28, 2016 02:30 PM EDT Reads: 3,318
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 28, 2016 02:30 PM EDT Reads: 2,924
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
Sep. 28, 2016 02:00 PM EDT Reads: 4,779