Webinars - Featured Articles

September 20, 2018

Webinar - Webinar to Explore the Benefits of SBCs




Session border controllers sit at the intersection of networks to offer security. But SBCs do a whole lot more.

To find out how your network can benefit from this type of solution, join Ingate Systems (News - Alert) and Technology Marketing Corp. for the upcoming webinar “8 Reasons to Use an SBC.”




This live online event will take place Tuesday, Oct. 2 at 11 a.m. pacific/2 p.m. eastern. The featured speaker is Steven Johnson, president of Ingate Systems. TMC’s (News - Alert) Editorial Director Erik Linask will introduce the topic and speaker, and manage the post-presentation Q&A session.

This event was created with the interests of system integrators, resellers, and distributors; call center telephony managers; enterprise managers of communication services; enterprise technical staff support VoIP networks; service provider marketing, network operations, and product management staff members; telecommunications equipment manufacturers seeking to enhance their product portfolios; and marketing and operations folks at hosted service providers in mind.

These individuals will learn what SBCs do, how they address security, and why they can future-proof your installation. Steven will offer details on SBCs apply diagnostics and allow for quality and reliability. He’ll offer up some case studies that illustrate what real-world interoperability solutions look like. And he’ll discuss what features you will get with a modern SBC.

To register for this webinar, click here.

"The SBC has evolved substantially since it was invented to allow inbound calls to a network protected by a firewall," Steven told no jitter earlier this year. "Our vision suggests that, in time, the SBC will become a node on the network which serves in all the capacities it does today, but as a decentralized intelligence point," Johnson said. "In this role, it will be used to enable traffic into and out of an enterprise, secure that traffic from malicious actions, route the traffic as appropriate, integrate various protocols, and capture the utilization of the network for billing purposes."