Tuesday, February 19, 2008

Enterasys Completes ShoreTel’s Technology Partner Program.

Enterasys Networks Inc., the Secure Networks Company™, announced today it is the first networking company to complete certification for ShoreTel’s Technology Partner Program. The ShoreTel Technology Partner Program provides market and innovation leaders the opportunity to expand their reach by connecting directly with ShoreTel's growing community of channel partners and customers.

“ShoreTel and Enterasys have proven themselves in our operations,” said Bob Glaze, Chief Technology Officer for the City of Oakland, California. “We have found them to be one of the best and simplest choices to use for unified communications.”

Security is among the top concerns of enterprises deploying voice over IP (VoIP) systems today. Enterprises need to detect unauthorized use of VoIP systems, prevent service disruptions and eavesdropping, and monitor for new threats against the voice infrastructure—all while ensuring reliability and quality of service. Rather than approaching VoIP security in a haphazard fashion, Enterasys recommends an intelligent, automated and integrated approach to enable and secure wired and wireless VoIP communications.

“As we celebrate our 25th anniversary in the networking industry, we’re proud to be a ShoreTel Certified Technology Partner,” said Mike Fabiaschi, Enterasys President & CEO. “Enterasys has developed a comprehensive approach to discover, classify, prioritize and secure the industry-leading unified communications solutions from ShoreTel.”

“With Enterasys, our customers will now have a tightly integrated security solution,” said Mark Arman, ShoreTel VP of Business Development. “Networking and security are clearly converging to proactively protect unified voice, video and data communications.”

Enterprises worldwide want to ensure the same reliability, quality, manageability, mobility and security of the traditional PBX with VoIP and unified communications solutions. The Enterasys Secure Open Convergence solution delivers a way to sense and automatically respond to security threats against the IP telephony infrastructure, enforce network access control policies, and comply with regulations for monitoring and safety such as CALEA and E911 in the United States.

Enterasys offers the ability to centrally manage a set of communication policy rules which can restrict the type and amount of network traffic directed at specific voice-related servers. Also, policy rules can be enforced to ensure that critical services are not “spoofed” causing service disruption or theft of critical communications. In addition to proactive security of VoIP resources, events occurring on the network that can compromise the voice service can be detected, and ultimately mitigated in order to preserve voice availability. Advanced Enterasys Dragon® security applications have the ability to detect specific threats against the voice infrastructure by using a strong set of VoIP attack signatures that include decoders for H.323, H.245, Session Initiation Protocol (SIP) and Media Gateway Control Protocol (MGCP). Once threats against voice services are detected, NetSight® automated security management can be used to locate the exact source of the threat and take appropriate action to resolve the issue.

The Enterasys Matrix® and SecureStack™ switches are network switching and routing devices which can automatically discover, classify and prioritize ShoreTel unified communications systems and traffic. Embedded security, priority and bandwidth control is provided for every user, device and application without sacrificing performance. The Enterasys standards-based open architecture interoperates with the existing infrastructure so enterprises can leverage the advantages of ShoreTel solutions while assuring reliability, service quality, manageability, mobility and security.

ShoreTel enables companies of any size to seamlessly integrate all communications – voice, data, messaging – with their business processes. Independent of device or location, ShoreTel’s distributed software architecture eliminates the traditional costs, complexity and reliability issues typically associated with other solutions.
tag: , , , , , , , , , , , , , , ,

0 comments:

Blog Widget by LinkWithin