New Webinar

Rethink Infrastructure and Security of Unified Communications

Request Download:

* Denotes a required field

By ticking this box, you consent to receive further information on our products and services.

By ticking this box, you consent to receive further information on our products and services.<br><br>Please check your inbox to confirm your consent to receiving Direct Marketing.

By clicking on the submit button, you consent to receive communications from Equinix in relation to our products and services.

By clicking on the submit button, you consent to receive communications from Equinix in relation to our products and services.<br>[Required] Consent to collection and use of personal information:<br>- Purpose of collection and use of personal information: Provision of information and service-related newsletters<br>- Items of personal information collected: Company email address, first name, last name, company name, country, position, industry<br>- Period of retention and use of personal information: 3 years after service provision (however, if customer consent is withdrawn, it will be destroyed without delay)<br><br>You have the right to refuse consent, and if you do, it will be impossible to provide the services specified in the purpose of use above.<br><br>[Optional] Consent to collection and use of personal information:<br>- Purpose of collection and use of personal information: Telephone consultation regarding information provision and service-related newsletters<br>- Items of personal information to be collected: phone number<br>- Period of retention and use of personal information: 3 years after service provision (however, if customer consent is withdrawn, it will be destroyed without delay)<br><br>If you do not want to collect phone numbers, please do not select the [Select] checkbox.<br><br>Equinix collects and uses your personal information as described above.<br><br>We are doing our best to protect your personal information and comply with laws related to personal information protection. You have read and agree to submit to Equinix's <a href='https://www.equinix.com/about/legal/privacy'>Global Privacy Policy</a> and <a href='https://www.equinix.kr/about/legal/privacy/korea'>Korea Privacy Policy</a>.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

video player poster transparent

In this webinar, experts from IDC, Equinix and Zoom Video Communications discuss how to rethink infrastructure scalability and strengthen its security. 

Networks have been under severe strain throughout the global pandemic, and video conferencing has increased by more than 400%. Traffic peaks are up by about 35% and some points of presence (POPs) have recorded increases of almost 200%. 

From a daily perspective, traditional peak hours have increased the most and peak hours are much more evenly distributed. Find out how enterprises are solving communication and business continuity challenges and the technologies that support the new digital business agenda.

Highlights

  • How to access cloud communications solution providers whilst optimizing WAN-to-cloud connections
  • Tips on how to ensure minimal latency
  • How to secure your communications and ensure regulatory compliance

In this webinar, experts from IDC, Equinix and Zoom Video Communications discuss how to rethink infrastructure scalability and strengthen its security. 

Networks have been under severe strain throughout the global pandemic, and video conferencing has increased by more than 400%. Traffic peaks are up by about 35% and some points of presence (POPs) have recorded increases of almost 200%. 

From a daily perspective, traditional peak hours have increased the most and peak hours are much more evenly distributed. Find out how enterprises are solving communication and business continuity challenges and the technologies that support the new digital business agenda.

Highlights

  • How to access cloud communications solution providers whilst optimizing WAN-to-cloud connections
  • Tips on how to ensure minimal latency
  • How to secure your communications and ensure regulatory compliance