• SecureVoice™
  • Identity Assurance™
  • Smart Logging™
  • Partners
  • About Us
  • Resources
    • Blogs
    • Case Studies
    • Whitepapers
    • Security Reports
    • Trust Center
  • SecureVoice™
  • Identity Assurance™
  • Smart Logging™
  • Partners
  • About Us
  • Resources
    • Blogs
    • Case Studies
    • Whitepapers
    • Security Reports
    • Trust Center

SIP security

Blocking Compromised Extensions for Protecting SIP Remote Workers

  • Srinivasan Narayanan Srinivasan Narayanan
  • December 16, 2024December 16, 2024

How to know if your Avaya SBCs are under attack?

  • Satyam Lad Satyam Lad
  • September 27, 2024October 3, 2024

How to ensure 5 Star CMS Ratings with Assertion 

  • Srinivasan Narayanan Srinivasan Narayanan
  • September 25, 2024September 25, 2024

Securing SIP Remote Worker with Assertion® Secure Voice™

  • Sanjay Sanjay
  • August 30, 2024August 30, 2024
Scam calls and Robo calls

Shield Your Enterprise from Scam: How Assertion Secure Voice Stops Voice Attacks Dead in Their Tracks

  • Sanjay Sanjay
  • August 6, 2024August 30, 2024

The Dark Reality of Inbound Call Center Abuse 

  • Satyam Lad Satyam Lad
  • September 20, 2023September 29, 2023

How to use Call Behavior Analysis to Safeguard Customer Accounts from IVR Scams

  • Satyam Lad Satyam Lad
  • September 5, 2023September 5, 2023

How to use Real-Time Call Screening to Safeguard Against IVR Callback Scams  

  • Satyam Lad Satyam Lad
  • August 28, 2023August 28, 2023

The Hidden Risks of MS Teams Direct Routing

  • Satyam Lad Satyam Lad
  • August 28, 2023August 28, 2023

Solving the Unwanted Junk Calls on MS Teams Problem: Enhancing Enterprise UC Security with Assertion® Secure Voice™

  • Satyam Lad Satyam Lad
  • August 28, 2023August 28, 2023
  • 1
  • 2
  • 3
  • …
  • 5
  • Next »
Linkedin Envelope
Terms of use
Privacy Policy

Assertion Inc © 2024
All rights Reserved.