SYS-CON MEDIA Authors: Pat Romanski, Nikita Ivanov, Elizabeth White, Sean Houghton, Glenn Rossman

News Feed Item

SecureLogix Leadership Team to Keynote Enterprise Connect Conference with Session on 4th Annual State of Voice & UC Security Report

SecureLogix’s Mark Collier and Rod Wallace will be keynote speakers, highlighting the results of the company’s fourth Annual State of Voice & UC Security report on Thursday, March 20, at Enterprise Connect at the Gaylord Palms Convention Center in Orlando. Find the report here: http://securelogix.com/sos/

Learn About The State of Communications Security

What is the true state of communications security in 2014? Going forward, where are the most serious threats and what is and what isn’t being done to stop them? In this keynote, CTO Mark Collier and Rod Wallace, VP Global Services, will share the results of this highly anticipated annual report. This annual report has become a go-to source for key attack examples and trends in Voice and UC Security, with insights having been cited by The New York Times, Los Angeles Times, Dark Reading, Krebs Report on Security and many others.

In this session, Collier and Wallace will offer real world findings from extensive research conducted by SecureLogix documenting and observing operational attacks against U.S. enterprises and their contact centers, to provide a sense of what sorts of attacks pose the greatest risks to communications services, infrastructure and business. “Our goal is to have attendees come away with a much deeper understanding of the threats to fixed and mobile communications that should concern them most and how to tackle them,” stated Mark Collier, SecureLogix CTO.

About Mark Collier

Mark Collier is CTO and VP of engineering for SecureLogix. Collier is responsible for technology research and development and related intellectual property, with a special focus on UC security solutions. In addition to his corporate R&D work, he has completed publicly funded research into current and future threats to UC systems, protocols and application services. Collier is a frequently quoted author and presenter on the topic of voice and UC security, and has recently co-authored the second edition of his book on VoIP security entitled “Hacking Exposed: VoIP” (McGraw Hill, 2014). Collier is also an author of the SANS VoIP Security course and a founding member of the VoIP Security Alliance (http://www.voipsa.org/).

About Rod Wallace

Rod Wallace is VP of global services for SecureLogix, with management responsibility over managed services, professional consulting, and customer support. Wallace has worked in the information technology sector for over 20 years, many of which were spent at Nortel building and managing teams and resources to deliver network security consulting and monitoring services to Fortune 100-level accounts. While at Nortel, Wallace led Nortel’s Secure SIP Trunking Solutions team supporting integrated product and service offers to strengthen Nortel’s position in the enterprise VoIP and SIP trunking markets.

About SecureLogix

SecureLogix, a Gartner designated “Cool Vendor” is the leader in enterprise voice/UC policy enforcement and ROI intelligence. SecureLogix 7th generation solutions enable customers to save money through securing and optimizing UC/Voice networks, allowing cost efficient and confident migration to SIP Trunking and Unified Communications. SecureLogix solutions are currently protecting and managing over six-and-a-half million enterprise phone lines. For more information, visit SecureLogix on the Web at www.securelogix.com and www.voipsecurityblog.com.

Reader Contact Information

SecureLogix Corporation, 13750 San Pedro, Suite 820, San Antonio, Texas, 78232, 210-402-9669, fax 210-402-6996, [email protected], [email protected], www.securelogix.com.

© Copyright 2014 SecureLogix Corporation. All Rights Reserved. ETM, TeleWatch Secure, TWSA, We See Your Voice, SecureLogix, SecureLogix Corporation, the SecureLogix Emblem and the SecureLogix Diamond Emblem are trademarks and/or service marks or registered trademarks and/or service marks of SecureLogix Corporation in the U.S.A. and other countries. All other trademarks mentioned herein are believed to be trademarks of their respective owners.

SecureLogix technologies are protected by one or more of the following patents: US 6,226,372 B1, US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,718,024 B1, US 6,760,420 B2, US 6,760,421 B2, US 6,879,671 B1, US 7,133,511 B2, US 7,231,027 B2, US 7,440,558 B2, US 8,150,013 B2, CA 2,354,149, DE 1,415,459 B1, FR 1,415,459 B1, and GB 1,415,459 B1.

Recommended Social Tags: Internet Security, Voice Security, Hacking, IP Communications, VoIP, VoIP Security, TDOS, Unified Communications, Telecom Fraud.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, focused on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud platfo...