UBM: TECH DIGITAL RESOURCE LIBRARY

FaceTime Communications

FaceTime Communications enables the safe and productive use of Unified Communications, Web 2.0 and Social Networks. Ranked #1 by IDC for five consecutive years, FaceTime solutions are used by more than 1,500 customers for the security, management and compliance of real-time communications.

Our Website: http://facetime.com


Latest Content From FaceTime Communications

Whitepaper: FINRA: Compliance Guide Social Networks, Web 2.0 and Unified Communications

by FaceTime CommunicationsSep 17, 2010

Securities traders, banks, investment advisors and others in the financial services industry have long embraced new communication tools. Regulators, such as the Financial Industry Regulatory Authority (FINRA), the National Futures Association (NFA), the Financial Services Authority (FSA) and others have established regulations regarding the appropriate use and management of the content generated using these tools.

However, financial services firms want and need to use new communication


Whitepaper: Integrated Management And Security For IM In The Enterprise: A Defense-In-Depth Approach

by FaceTime CommunicationsJan 01, 2008

Presenting a budget that lists the cost of an internal service provider?s deliverables, rather than internal expense factors, is the first step to making an ""Apples to apples"" comparison with an outsourcing vendor?s proposal. Once the ""Budget-by-deliverables"" approach is implemented, another problem becomes evident: Internal staff does things that outsourcing vendors do not (and should not) do. Specifically, there are two types of deliverables that internal staff delivers and outsourcing


Whitepaper: Spyware Prevention: Effective Network Protection Through Defense in Depth

by FaceTime CommunicationsJan 01, 2008

Spyware has rapidly become one of the most insidious and dangerous forms of malware. It’s not just script kiddies any more. Organized crime is busy harnessing the power of exploitative code to extort and launder money, redirect funds, hold intellectual property up for ransom, and more. This white paper takes a long, hard look at what’s really happening in the spyware underworld, brings together expert opinions on the impact spyware can and does have on corporate networks. The paper