log4j vulnerability – is it a Risk?

by Alan Percy, CMO @TelcoBridges

Plenty of questions this last week about the log4j vulnerability and whether there is any risk within TelcoBridges ProSBC or Tmedia products.

In summary: TelcoBridges does not use log4j in our products and thus are not vulnerable to intrusion attacks through log4j.

Read on for more details:

Continue reading log4j vulnerability – is it a Risk?

Will the Edge Eat the Cloud?

By Alan Percy, TelcoBridges

An Interesting keynote this week from Fortinet’s CEO, Ken Xie sharing that we’re entering the fourth stage of network evolution, requiring greater intelligence closer to the edge. Xie predicts that the next round of major innovations will be at the edge.  We agree. Continue reading Will the Edge Eat the Cloud?

Can I use an SBC to perform load balancing? FAQ #6 of 10

Here’s question #6 from our “Session Border Controllers – TOP 10 FAQ” webinar, the 10 most frequently asked questions about SBCs. This video asks and answers the question can I use an SBC to perform load balancing?

Watch the full TOP 10 FAQ video here: https://youtu.be/f3JTrz0dcr8

What is topology hiding? Why do you need it? FAQ #5 of 10

Here’s question #5 from our “Session Border Controllers – TOP 10 FAQ” webinar, the 10 most frequently asked questions about SBCs. This video asks and answers the questions what is topology hiding, and why do you need it?

Watch the full TOP 10 FAQ video here: https://youtu.be/f3JTrz0dcr8

How do SBCs limit call traffic? FAQ #4 of 10

Here’s question #4 from our “Session Border Controllers – TOP 10 FAQ” webinar, the 10 most frequently asked questions about SBCs. This video asks and answers the question how do SBCs limit call traffic?

Watch the full TOP 10 FAQ video here: https://youtu.be/f3JTrz0dcr8

Can an SBC help stop Robocallers? FAQ #3 of 10

Here’s question #3 from our “Session Border Controllers – TOP 10 FAQ” webinar, the 10 most frequently asked questions about SBCs. This video asks and answers the question can an SBC help stop Robocallers?

Watch the full TOP 10 FAQ video here: https://youtu.be/f3JTrz0dcr8

How does an SBC detect and defend against DOS/DDOS attacks? FAQ #2 of 10

Here’s question #2 from our “Session Border Controllers – TOP 10 FAQ” webinar, the 10 most frequently asked questions about SBCs. This video asks and answers the question how does an SBC detect and defend against DOS/DDOS attacks?

Watch the full TOP 10 FAQ video here: https://youtu.be/f3JTrz0dcr8

FAQ# 1 of 10 – What’s the difference between an SBC and a SIP Proxy?

Here’s question #1 from our “Session Border Controllers – TOP 10 FAQ” webinar, the 10 most frequently asked questions about SBCs. This video asks and answers the question what’s the difference between an SBC and a SIP Proxy?

Watch the full TOP 10 FAQ video here: https://youtu.be/f3JTrz0dcr8