Network executives planning to deploy network access control should start with very specific goals, not intricate schemes to quarantine and remediate insecure devices, shut down badly behaving machines and record every connection each device attempts to make on the network.
While VoIP is susceptible to the same threats as other network applications, there are some potential VoIP-specific attacks, says David Endler, chairman and founder of the VoIP Security Alliance.
Businesses can benefit in several ways from the technology, from multicasting corporate announcements to videoconferencing to content on Web sites that can help explain products and services to customers.
Juniper recently introduced hardware and software that can speed remote-site and data centre traffic while helping customers reduce hardware and save money.
Wikis can improve corporate collaboration, reduce network traffic and even help meet regulatory record-keeping requirements - some day. But they are not perfected for corporate use now, they still warrant development and use in corporations to see what they can produce.