SIP Trunking - IP Telephony using your existing PBX
Enjoy the benefits and cost savings of IP Telephony without replacing your existing infrastructure.
SIP: the standard for flexible business communications
SIP (Session Initiation Protocol) is the international standard for IP Telephony (VoIP) systems.
Phil Dyson demonstrates why SIP Trunking is ideal for organisations that are looking to migrate to an IP Telephony (VoIP) infrastructure but need to keep an existing PBX infrastructure in place, or at least for the short term.
RecordedDec 9 200918 mins
Your place is confirmed, we'll send you email reminders
In this webcast, Redcentric's Len Sumner gives an overview to Managed Database Support. Over the course of the presentation, Len discusses what MDBS is, what the benefits are and, most importantly, how it can help your business.
In this webcast, Steve Mckee, Solutions Specialist at Cisco, discusses how businesses can achieve a better workforce experience through alignment of Real Estate, Information Technology and Human Resources functions.
Clive Atkins (Redcentric), Simon Williams (Brocade)
The New IP is the next dimension in networking. In this webcast, Simon Williams from Brocade and Clive Atkins from Redcentric discuss how the new IP will put customers in control of their own networks allowing them to evolve their networks on their time, their terms.
Clinical applications and software services support new programmes and practises for NHS healthcare professionals, increasing their patient care and efficiencies. Redcentric has 11 years’ experience of helping software providers to securely provide their services over the N3 network, discover how Redcentric can help your organisation in this webcast.
If your organisation wants to connect to the N3 network the processes involved are often considered complex. In this webcast our in-house expert discusses how you can become aligned with Governance requirements and operate effectively to meet the criteria needed to become connected and operate going forward within the N3 network.
The ability to share information and collaborate securely between Trusts, NHS entities and third parties is essential in the modern NHS. A simple concept, but the reality can be quite different. In Mark Hall’s latest webcast he looks at how the NHS can efficiently and securely share information and encourage collaboration with centralised N3 hosting services.
Healthcare professionals can increase mobility by utilising N3 remote access, providing a secure connection to N3 services, information and applications such as patient medical histories and Electronic Prescriptions Service (EPS). Mark Hall discusses how increased mobility within your workforce can benefit patient care and create cost-efficiencies.
Clive Atkins, Business Unit Director (Redcentric) and Simon Williams, Senior Architect (Brocade)
Join our latest webcast to hear Redcentric team up with Market-Leader Brocade to examine Software Defined Networks (SDN). Over the course of the presentation, we will look at use cases and what they promise for the data centre plus explore the journey to SDN and the building blocks you can establish to ready your data centre.
Over the course of this webcast, Paul Smith from Redcentric discusses the infrastructure considerations when looking for an enterprise wireless solution, the benefits of Redcentric’s managed wireless service and the features of our partner’s, Aruba Networks, technology.
As Redcentric faces increasing numbers of servers, applications and devices to manage, Jonathan Birch looks at how they keep control and maintain service delivery by using automation and orchestration. By doing so Redcentric are able to deliver new services faster to businesses whilst controlling cost as the business scales.
Historically IT asset management (ITAM) and IT service management (ITSM) have been managed as separate entities with separate teams and unconnected objectives. In reality they are highly dependent upon each other with intersecting processes and shared data. When processes, data and tools are combined, they bring considerable benefits - reflecting that the whole is considerably more effective than the sum of the parts. Ian Aitchison, ITSM&ITAM Product Director will explore the synergies between ITAM and ITSM, and the benefits an organisation can achieve with greater visibility into the assets that make up its business services.
Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.
With the widespread use of connected devices, hackers have configured new ways to access your smartphones and laptops, even without you knowing. The Pineapple is a router that stages a fake WIFI access point, compromising the security of any smart device that unknowingly connects to it. During the live webinar, Johan Hybinette, CISO at HOSTING, will be going over the following discussion points:
- The technical makeup of the pineapple router
- How the Pineapple hacks into connected devices
- What personal information is at the most risk
- What you can do to protect yourself from this malicious form of identity theft
Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.
At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
According to Forrester Research, customer obsession has
created a business environment of continual disruption. And in order to adapt in an environment where change is the new normal, PMO leaders are looking for ways to scale Agile across the enterprise and transform into a value-focused organization.
But scaling Agile to the enterprise requires a significant
shift in the way business is run. Join this webinar with Forrester Analyst, Margo Vistacion, and CA Technologies Director of Agile Management, James Chan, as they discuss best practices for making the transition to Agile and how to levrage a modern, value-based
portfolio management framework.
You will learn:
The changes modern PMOs can take to embrace Agile across the organization and bring
executives on board
How to adopt an Agile framework that is flexible enough to keep pace with your changing
How to transition your focus from project delivery to delivering value
Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
Packet flow switching for the new threat landscape.
Join our webinar to learn how to advance your security maturity with packet visibility using the the Cyber security Capability Maturity Model (C2M2). We’ll cover deployment case studies that explain how packet flow switches enable you to accelerate your security posture:
•Move from passive security to fail-safe active inline security, without network disruption
•Learn how to apply the model in concert with a packet flow architecture
•Accelerate your security infrastructure and enable smooth pilots and roll out of new security systems
With a strong track record in Education, find out how Snow Software provides a consolidated view of all licenses, enabling staff to use just one interface to manage multiple software vendors, device types and locations across all platforms.
Snow Software is an ideal choice for Education thanks to its multi-platform coverage and automatic software recognition of Software.