Generationswechsel bei Innovaphone Gateways

Generationswechsel bei Innovaphone Gateways

Nach der Abkündigung der bisherigen Innovaphone Gateways zum 15.01.2016 geht jetzt die neue Generation an den Start:

Die neuen Innovaphone VoIP Gateways  IP311, IP411, IP811, IP3011, IP0011 und IP1130

Die Innovaphone VoIP-Gateways bilden die Schnittstelle zu anderen Netzen und stellen gleichzeitig die Hardwareplattform für die Innovaphone PBX-Software für VoIP-Telefonanlagen dar. Alle VoIP-Gateways sind sehr robust konstruiert und kommen komplett ohne Festplatten oder Lüfter aus. Durch großzügig dimensionierte Komponenten und schlanke Software-Strukturen sind die VoIP-Gateways äußerst performant, auch wenn sie parallel noch die Aufgaben der VoIP-Telefonanlage innovaphone PBX erfüllen. Im Design des Telefongehäuses aus gebürstetem Edelstahl spiegelt sich die Stabilität der VoIP-Gateways wider.

Alle neuen Innovaphone Gateways (der Serie „IPXX11“ und IP1130) sind mit diesen Features ausgestattet:

  • Linux AP auf jedem Gateway
  • Größerer Speicher
  • Serienmäßig mit Gigabit-Ethernet
  • mSATA-Steckplatz für SSD-Festplatten
  • Sprachcodecs Opus und G.722

Das alles bei einem Formfaktor von 1HE bei nur halber Schrankbreite und der absolut energiesparenden Betriebsmöglichkeit mittels PoE ( Power over Ethernet mit nur 15 Watt). Trotzdem gibt es den gewohnten Leistungsumfang einer ISDN Anlage ohne Abstriche, verbunden mit den modernen Möglichkeiten einer IP-Lösung, z.B. Integration in Ihre EDV-Arbeitsplätze, Ihre Unternehmenssoftware oder Ihre Smartphone-Umgebung.

Mit den eigenen Augen sehen und sich vom Leistungspaket überzeugen – das ist unser Angebot an Sie. Einfach einen Termin vereinbaren:

Dirk Zurawski

02261 9155051
zurawski@oberberg.net

Sebastian Lutz
lutz@oberberg.net
Frank Erlinghagen

02261 9155055
erlinghagen@oberberg.net

Microsoft Patch Tuesday – March 2016

By Talos Group Patch Tuesday for March 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 13 bulletins addressing 44 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Edge, Graphic Fonts, Internet Explorer, Windows Media Player, and Window PDF. The remaining eight bulletins are rated important and address vulnerabilities in .NET, Office, and several other Windows components. Bulletins Rated Critical Microsoft bulletins MS16-023, MS16-024, and []

Source:: Cisco Security Notice

Microsoft Patch Tuesday – March 2016

By Talos Group Patch Tuesday for March 2016 has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 13 bulletins addressing 44 vulnerabilities. Five bulletins are rated critical and address vulnerabilities in Edge, Graphic Fonts, Internet Explorer, Windows Media Player, and Window PDF. The remaining eight bulletins are rated important and address vulnerabilities in .NET, Office, and several other Windows components. Bulletins Rated Critical Microsoft bulletins MS16-023, MS16-024, and []

Source:: Cisco Security Notice

FUJITSU Aktionsmodelle März 2016

FUJITSU Aktionsmodelle März 2016

Neuer Monat, neue Angebote unseres Technologiepartners FUJITSU.

Notebooks und Tablets gibt es hier.

Desktop-PCs und Bildschirme finden sich hier.

Sonderaktionen zum Thema Speicherlösungen und Serversysteme finden Sie hier.

 

Natürlich konfigurieren wir gerne auch Ihr individuelles System. Einfach den Hörer in die Hand nehmen und die Kollegen anrufen:

DSC_4805kk DSC_2131b klein DSC_2066 klein
Frank Erlinghagen

02261 9155055
erlinghagen@oberberg.net

Jörg Wegner

02261 9155052
wegner@oberberg.net

Daniel Wenzlau

02261 9155054
wenzlau@oberberg.net

Cisco recognized for security leadership at the 2016 RSA Conference

By Scott Harrell Best Security Company and Best Security Organization Awards for Cisco I speak with customers and partners frequently and I always hear common themes in the challenges that prevent them from achieving effective security. The diversity, rate of change, and complexity of what customers and partners are protecting continues to rapidly grow while the attackers continue to innovate on a global scale and become more efficient in exploiting this increasing complexity. Meanwhile resource-constrained security teams are struggling to operationalize dozens of []

Source:: Cisco Security Notice

Cisco recognized for security leadership at the 2016 RSA Conference

By Scott Harrell Best Security Company and Best Security Organization Awards for Cisco I speak with customers and partners frequently and I always hear common themes in the challenges that prevent them from achieving effective security. The diversity, rate of change, and complexity of what customers and partners are protecting continues to rapidly grow while the attackers continue to innovate on a global scale and become more efficient in exploiting this increasing complexity. Meanwhile resource-constrained security teams are struggling to operationalize dozens of []

Source:: Cisco Security Notice

Security and Trust

By John Stewart I’m proud to say that Cisco has joined other leading technology companies in an amicus brief arguing that the U.S. Government exceeded existing law in its demand that Apple write software to allow unlocking of the iPhone used by one of the San Bernardino terrorists. The brief argues that a vague, 225-year old statute – the All Writs act – should not be the basis for an open-ended government ability to demand that a company change its products. It also articulates that []

Source:: Cisco Security Notice

Security and Trust

By John Stewart I’m proud to say that Cisco has joined other leading technology companies in an amicus brief arguing that the U.S. Government exceeded existing law in its demand that Apple write software to allow unlocking of the iPhone used by one of the San Bernardino terrorists. The brief argues that a vague, 225-year old statute – the All Writs act – should not be the basis for an open-ended government ability to demand that a company change its products. It also articulates that []

Source:: Cisco Security Notice

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where it resides and is consumed thus becomes paramount. In my recent discussions with fellow conference attendees, a common thread has emerged: a major impediment to protecting data in []

Source:: Cisco Security Notice

Walking the Tightrope of Security and Usability

By Khelan Bhatt Here at the RSA Conference 2016, the theme this year is Connect to Protect. It is a fitting theme for a gathering of security professionals, given the widespread adoption of cloud and mobile technologies that make doing business and sharing information easier than ever. The need for securing data regardless of where it resides and is consumed thus becomes paramount. In my recent discussions with fellow conference attendees, a common thread has emerged: a major impediment to protecting data in []

Source:: Cisco Security Notice