30 Nov 2016 What will an Interactive Voice Response System (IVR) look like in 2017?

Companies such as Telesoft Technologies are making IVR’s more affordable and accessible to different sizes of businesses by offering a software-based IVR systems, improving customer service without replacing or installing new hardware or budgeting for extra resource. This is important for businesses in current times when the bottom line and customer service is king, and even more so to reduce OpEx and CapEx 2017. Read more

19 Oct 2016 Flow versus packet capture

As computer networks become more integral to the running of all major business and public infrastructure there has never been a better time to review the way that monitoring techniques have evolved over time to meet the ever-changing challenges facing network security teams. Read more

17 Oct 2016 Upcoming Tradeshows (Nov '16)

As a long-time supporter of Suricata and the OSIF, Telesoft is again sponsoring the annual user conference (SURICON) in Washington, DC for developers and security professionals. This year we will be discussing the Telesoft CERNE, a Suricata powered appliance for intelligent packet capture, built from a hybrid of hardware acceleration for shunting and signature scanning combined with optimized software, giving cost effective breach detection and forensics in the network core. Read more

14 Aug 2016 In Review: Black Hat USA 2016

Wow, Black Hat USA 2016 was a whirlwind of cutting edge technology, inventive marketing, passionate peer to peer discussions and proactive networking. As you may know Black Hat USA was held last week, this year’s event attracted over 15,000 attendees from the InfoSec community. Key themes from briefing, training sessions and the business hall were ‘Insider Threats’, ‘Behaviour Baselining’, ‘Active Response’, ‘Security Analytics’ and ‘Public key Cryptography’. Read more

18 May 2016 The changing role of packet capture in Network Security

As a Gartner cool vendor Telesoft recognises that computer network challenges from both a network and security operation perspective are vast and growing in complexity. Online applications are putting a strain on traditional network utilisation and the need for simplicity is driving up demand for smoother network operation. Though the network world is bowing to the inevitability of change, the techniques used are still very much the same. Read more