Creating a Communications System Built for Hybrid work: How existing customers can transform their on-prem solution with cloud-based flexibility

Article by Mark Hebner, Vice President – Channel, Americas at NEC Corporation of America   Survey after survey keeps telling us that the in-office workplace is a thing of the past. Offices are not obsolete, but most companies admit that remote work didn’t cause any collapses of infrastructure, operations, or productivity. In fact, 83 percent …

Integrated NEC CONNECT and ENGAGE Application

NEC has integrated the NEC CONNECT and ENGAGE desktop applications into one single-pane experience.  Users now have one solution for BOTH internal and customer facing communications.   Single-Pane – Unify employee productivity and customer experience management into one application CONNECT – provide all th collaboration features your users need for internal communications. ENGAGE – customer-facing …

UNIVERGE BLUE CONNECT BRIDGE – Extend you existing SV9000 Communication System

What can UNIVERGE BLUE CONNECT BRIDGE do for your existing NEC SV9100/9300/9500? Add mobility Extend your existing phone system with video, chat, file sharing/back up and more! Create a seamless all-in-one communication experience that goes anywhere your employees go Protect your current investment on your on-premise PBX systems See UNIVERGE BLUE CONNECT BRIDGE in action. …

Apache Log4j Remote Code Execution Vulnerability – Mitel Statement to Vulnerability

As you may be aware, a critical security vulnerability affecting Apache Log4J was recently disclosed. The vulnerability in the Apache Log4J Java logging library allows attackers to remotely execute arbitrary code, potentially impacting businesses and governments across the globe. Mitel has not observed a successful exploitation of the vulnerability, however, through rigorous investigations and analysis …

Apache Log4j Remote Code Execution Vulnerability – TigerTMS Statement to Vulnerability

Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. …

Introducing UNIVERGE NEC BLUE CONNECT BRIDGE

The long awaited NEC CONNECT BRIDGE is now available!   What is NEC CONNECT BRIDGE? It extends your existing NEC phone system investment with cloud-based voice via desktop and mobile apps creating a seamless all-in-one communications experience.  Collaborate in the office, at home, or anywhere in between with integrated video conferencing, chat, and file sharing, …