RSS

A Reference for all Cisco UC and Security Professionals and Decision Makers

It’s always meddling when those pesky questions around design or deployment of a UC network’s security are raised. More often than not one finds him/her (self) amid a flurry of queries.

Now, there’s a guide, a reference, and a companion to be with you always when there are queries around Cisco IP Telephony / UC security. You won’t be left alone when the discussion is around securing the UC applications or underlying network. Cisco Press publication ‘Securing Cisco IP Telephony Networks’ will be with you to address any and all queries pertinent to secure Cisco UC design approach or deployment strategy.

The book is available in paperback and eBook format:

Cisco Press

Amazon

 
105 Comments

Posted by on November 3, 2012 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , ,

Security Keynote at Total Security Conference

Last week I delivered a Keynote at Total Security Conference in Hong Kong. This was to share today’s security trends and Juniper vision on cloud as the platform to deliver security. It was both really insightful and fun connecting with the audience; understanding the security landscape in the region and getting to know what the C-Level is looking from a solution perspective to tag along the business imperatives.

Get a sneak peak of the session at http://www.questexevent.com/TotalSecurityConference/2016/hongkong

The slides used for the keynote should be available shortly.

Here are a few photos from the event._DSC2109

 
Leave a comment

Posted by on May 17, 2016 in Events

 

CIPTV2, It’s Official. And its here!!!

Yes, that’s right. Of the two books which were soon to be published – one is published. And so, it’s official – my third book (this time as a co-author) in its physical self – hard cover, 450+ pages. Feeling excited and ecstatic!!!

If this topic interests you or someone you know, please read it or recommend it and provide your invaluable feedback. The book is available at following link.

http://click.linksynergy.com/deeplink?id=aV8WWcTd0Yc&mid=24808&murl=http%3A%2F%2Fwww.ciscopress.com/store/implementing-cisco-ip-telephony-and-video-part-2-ciptv2-9781587144554

 

ShowCover.asp

 
Leave a comment

Posted by on March 29, 2016 in CCNP Collaboration

 

Tags: , , , , , , , , ,

Third Time is a Charm!!! Upcoming CIPTV1 and CIPTV2 Books

It’s said that third time is a charm. Looks like it is indeed the case when it comes for me to author books.

After the first two books – Securing Cisco IP Telephony Networks and CCIE Collaboration Quick Reference, I’ve yet again conjured my author spirit and have co-authored two more Cisco Press books.

The first to hit the shelves in late Mar to early Apr 2016 is Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) followed by Implementing Cisco IP Telephony and Video , Part 1 (CIPTV1) which is set to be released in Jul 2016. These are part of the new CCNP Collaboration exam and are absolutely revamped from earlier avatars.

CIPTV1 addresses CCNP Collaboration Exam 300-070 while CIPTV2 addresses exam 300-075.

Both books are available for pre-order (both e-book and paperback) at following links:

Addressing CUCM architecture to design to deployment, Cisco VCS, Cisco Telepresence based Video Conferencing, Cisco Expressway, and many more topics – these books pack a punch!!! Of course, they’re aligned with the CCNP Collaboration exam blueprint so they are go to reference material to pass CIPTV1 and CIPTV2 exams with flying colours.

ShowCover.asp

 

ShowCover.asp2

I hope you enjoy reading these books as much as I enjoyed writing them🙂

 

P.S. More stuff to follow including webinars, excerpts, reviews and much more shortly.

 
Leave a comment

Posted by on March 14, 2016 in UC Security Posts

 

Tags: , , , , , , ,

Cisco IP Phones Cannot be Turned Into Listening Devices! – By Aurus

I was requested to post this topic by Aurus, a Cisco Solution Partner that develops software solutions on top of Cisco UCM, UCCX/UCCE and TelePresence. Remember the funtenna story? If you didn’t hear about it or missed it, I have it posted in one of my earlier blogs. Nevertheless – Enjoy this post🙂

Disclaimer: This post is written/edited by Aurus and represents their thoughts and products/services. The blog author makes no representations as to the accuracy or completeness of any information on this post. The blog author will not be liable for any errors or omissions in this information nor for the availability of this information.


 

Hello Everyone,

And thanks the blog author for posting this. Here is the story…

We’re Russians. For several years we develop apps which add extra features to Cisco collaboration solutions and some of them are used to improve the enterprise security (call recording, paging, secure conferences etc). Every month we receive a request from some Chief Security Officer asking whether its possible to turn the Cisco IP-Telephony into the network of microphones.

Ok, we are used to hear that question from Russian CSOs but last year we went global and started selling worldwide. Guess what? Yes, the same requests from other countries.

So, to all security chiefs in the world. With all respect to your job, please note…
You can:
• Record CUCM calls,
• Monitor (listen in real time) calls,
• Barge-in and “whisper”.

You can NOT:
• Turn on the IP phone external mic remotely to hear to what’s happening in the office WITHOUT indication on the phone (the yellow speakerphone led and the icon on the IP phone display)

You’re welcome to:
• Try our products,
• Discuss how to improve the corporate security with UC apps.

You’re NOT welcome to:
• Ask us to hijack the Cisco firmware,
• Ask us to turn the speakerphone led off.

Comparing to other major UC vendors Cisco provides the most powerful official developer tools allowing Cisco’s technology partners to build UC apps, including those improving the collaboration security:
• Call recording – total and on-demand,
• Text and audio paging – to the desktop and mobile phones,
• Cisco IP phone lock – to prevent its abuse when the phone owner is away,
• Protecting audio-conference with PIN or Caller ID,
• Extension Mobility Single-Sign-On.

More apps and case studies are available at Aurus website http://www.aurus5.com/

 
Leave a comment

Posted by on February 22, 2016 in UC Security Posts

 

Tags: , , , ,

A Book Edit I did and wasn’t aware of!

Yes, the title says it all – a book for which I was invited to be a contributing editor alongside my dearest / my better half – Kanika Behl. It’s so easy to do some quality work and forget about it amidst all the other usual and hectic work and non-work related chores and errands.

So how I came to know about it? I happened to browse Amazon looking for organizational dimensions on legal and technology aspects and amongst many other titles; came across this title: Organizational, Legal, and Technological Dimensions of Information System Administration (Advances in Systems Analysis, Software Engineering, and High) reading the content through which I saw my and my better half’s names in the Editorial Advisory Board.

http://goo.gl/acIhFY

the book we reviewed formatted

What!? I remember we did this sometime back but whoa – never knew it was already published and was available on Amazon.

Anyways, happy to see our contributions being called out and would like to wish the authors of the title best with the same.

 
Leave a comment

Posted by on June 9, 2015 in UC Security Posts

 

A Perspective on Cisco – Microsoft Interop

Hi there,

I happen to present a perspective on Cisco and Microsoft UC interop at MS Lync User group in Singapore. The presentation is around mostly the business and economies of scale when doing Cisco + MS however, for all you technical audience the good news is yes – it has a lot to offer from a technical stand point. Examples of Cisco UC with Lync interop from Voice and Video are covered. See for yourself and download the presentation.

Cisco Microsoft Interop

 
Leave a comment

Posted by on May 18, 2015 in UC Security Posts

 

Cisco EnergyWise – Making Unified Network Energy Management Matter

You’re invited to join me for an informative presentation hosted by Cisco Press – Meet the Authors on 07 Oct 2014 at 12:00 p.m PT  https://learningnetwork.cisco.com/community/learning_center/meet_authors.

As the title suggests, the presentation session is on Cisco EnergyWise and this is one of the subtopics covered in CCIE Collaboration written and lab exam topic: Cisco Collaboration Network Management.

For an in-depth insight of this topic and other CCIE Collaboration topic coverage read CCIE Collaboration Quick Reference by Cisco Press. Get your copy here http://click.linksynergy.com/fs-bin/click?id=aV8WWcTd0Yc&offerid=145238.10000399&type=3&subid=0

To read about session details and to register for the session please visit the following URL (scroll down on the registration page to read session objectives and other pertinent information)

http://goo.gl/hT9bZW

Happy learning!

 

 

 
Leave a comment

Posted by on September 18, 2014 in CCIE Collaboration

 

Tags: , , , , , , , , , , , ,