An Insight to Cisco UC Security Controls

18 Dec

It’s only natural to think about the security of your network or a network you have designed or deployed. Cisco IP Telephony networks are no different, and they need their share of security to ensure that things work out the way you planned them and not how an attacker plans them to work for his motives. With that said, it always comes as a surprise that security is not one of the first topics discussed when an IP Telephony network is planned or designed.

Why you may ask? For a few reasons: perhaps there is a lack of confidence to secure a relatively (compared to data networks) technology, or maybe it’s a scarcity of resources (monetary or manpower) or management support.

Let’s say you are able to overcome these initial hurdles when preparing, planning, and designing security for your Cisco IP Telephony network; are you sure what you have put down in the plan or design is the right set of security controls to help you ensure the sanctity and stability of  Cisco IP Telephony solution? Are you confident that the security you planned aligns well with your organization’s vision/goals? This article helps you answer these questions by exploring the security controls that help you to plan for and implement security for your Cisco IP Telephony solution.

To read the full article visit


Posted by on December 18, 2012 in UC Security Posts


Tags: , , , , , , , , , ,

2 responses to “An Insight to Cisco UC Security Controls

  1. Pingback: Webmaster Guide

    December 22, 2012 at 12:29 am

    There’s definately a great deal to find out about this issue. I like all the points you have made.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: