Understanding containerised workloads for Telco

For telecommunications companies evaluating ways to transition and modernise their network infrastructure, cloud-native, container-based microservices architectures are a powerful solution in meeting requirements of compute needs through edge cloud and beyond. Understanding infrastructure implications and design considerations for open source hardware and software development platforms, while remaining carrier grade and Continue Reading

Prevent Leaks of Sensitive Business Data with Security Gateway

Businesses of all types must maintain records containing personal information about their employees and customers, and executives and clients alike have a mutual interest in protecting that data. But there’s no guarantee that every employee will treat confidential account numbers, Social Security numbers, passport numbers or other personal data with Continue Reading

Zero to Snap – Rev up your packaging

Software developers often have enough to worry about. Their focus is creating the best application they can, often without having to consider packaging. We recently discovered Akira, which illustrates this well. The small team of developers are hard at work on the application, so software packaging isn’t a high priority Continue Reading

Securing Legacy IT Systems from Modern Application Threats in the Financial Sector

The rhetoric surrounding mainframes and their uses in modern enterprises tends to be largely negative. Mainframes are seen by many as outdated legacy IT systems that are, or will be, obsolete in the near future as businesses increasingly move to the cloud. However, these notions are one-sided. The reality is Continue Reading

Cybersecurity Needs to be Seen as a Strategic Issue, Not Just an IT Investment

As organizations embark on their digital transformation journeys, they are seeking to tap new business opportunities, improve operational efficiencies, and deliver better services to customers. Digital transformation is driving businesses to embrace the cloud, the Internet of Things (IoT), big data, and other digital initiatives in ever-expanding waves, forcing them to reinvent and Continue Reading

Try Out the New 3CX SIP ALG – Firewall Check

3CX is calling all implementers to try and test the new SIP ALG and let us know their thoughts and results on our forums. With the beta of version 15.5 SP1 the firewall checker has been extended to check if the firewall executes SIP ALG or not. This feature will Continue Reading

The Evolution of the Firewall

As the Internet and Digital Economy have grown up, the humble Firewall has continued to serve as their go-to security appliance. In this first of a two-part series, we will examine how, in spite of the evolution of the Firewall through a number of shapes, functions, and roles, it remains Continue Reading

Opening the Welcome Email Attachment on the 3CX Client for Android

Some of our Android users are experiencing issues when provisioning the 3CX Client on their Android devices –  Welcome email attachment does not open – and therefore the client cannot be provision. With no way to create accounts manually this can become a blocking problem. Well the explanation (and solution) is very Continue Reading

Installing 3CX on Linux Version: Debian 9 Stretch

As you may have already heard, Debian released a new Linux version of their popular operating system “Stretch”. Those who tried to install 3CX on Linux version Stretch, quickly realised that the installation failed with a dependency error. Well, the reason is simple – 3CX repository was created to be compatible Continue Reading

>