• SecureVoice™
  • Identity Assurance™
  • Smart Logging™
  • Partners
  • About Us
  • Resources
    • Blogs
    • Case Studies
    • Whitepapers
    • Security Reports
    • Trust Center
  • SecureVoice™
  • Identity Assurance™
  • Smart Logging™
  • Partners
  • About Us
  • Resources
    • Blogs
    • Case Studies
    • Whitepapers
    • Security Reports
    • Trust Center

Perimeter Security

Blocking Compromised Extensions for Protecting SIP Remote Workers

  • Srinivasan Narayanan Srinivasan Narayanan
  • December 16, 2024December 16, 2024

How to know if your Avaya SBCs are under attack?

  • Satyam Lad Satyam Lad
  • September 27, 2024October 3, 2024

Securing SIP Remote Worker with Assertion® Secure Voice™

  • Sanjay Sanjay
  • August 30, 2024August 30, 2024

The Dark Reality of Inbound Call Center Abuse 

  • Satyam Lad Satyam Lad
  • September 20, 2023September 29, 2023

How Public Datasets and Open-Source Tools Have Made the Web More Secure

  • Rajesh Kanade Rajesh Kanade
  • September 14, 2023September 14, 2023

How to use Call Behavior Analysis to Safeguard Customer Accounts from IVR Scams

  • Satyam Lad Satyam Lad
  • September 5, 2023September 5, 2023

How to use Real-Time Call Screening to Safeguard Against IVR Callback Scams  

  • Satyam Lad Satyam Lad
  • August 28, 2023August 28, 2023

Roles and responsibilities of a Certificate Authority 

  • Rajesh Kanade Rajesh Kanade
  • May 24, 2023May 24, 2023

The Need for a TLS Certificate in VoIP Security

  • Rajesh Kanade Rajesh Kanade
  • April 18, 2023April 18, 2023

An introduction to SSL / TLS cryptography 

  • Rajesh Kanade Rajesh Kanade
  • April 10, 2023April 10, 2023
  • 1
  • 2
  • 3
  • …
  • 5
  • Next »
Linkedin Envelope
Terms of use
Privacy Policy

Assertion Inc © 2024
All rights Reserved.