RSS

Category Archives: UC Security Posts

Third Time is a Charm!!! Upcoming CIPTV1 and CIPTV2 Books

It’s said that third time is a charm. Looks like it is indeed the case when it comes for me to author books.

After the first two books – Securing Cisco IP Telephony Networks and CCIE Collaboration Quick Reference, I’ve yet again conjured my author spirit and have co-authored two more Cisco Press books.

The first to hit the shelves in late Mar to early Apr 2016 is Implementing Cisco IP Telephony and Video, Part 2 (CIPTV2) followed by Implementing Cisco IP Telephony and Video , Part 1 (CIPTV1) which is set to be released in Jul 2016. These are part of the new CCNP Collaboration exam and are absolutely revamped from earlier avatars.

CIPTV1 addresses CCNP Collaboration Exam 300-070 while CIPTV2 addresses exam 300-075.

Both books are available for pre-order (both e-book and paperback) at following links:

Addressing CUCM architecture to design to deployment, Cisco VCS, Cisco Telepresence based Video Conferencing, Cisco Expressway, and many more topics – these books pack a punch!!! Of course, they’re aligned with the CCNP Collaboration exam blueprint so they are go to reference material to pass CIPTV1 and CIPTV2 exams with flying colours.

ShowCover.asp

 

ShowCover.asp2

I hope you enjoy reading these books as much as I enjoyed writing them 🙂

 

P.S. More stuff to follow including webinars, excerpts, reviews and much more shortly.

Advertisements
 
1 Comment

Posted by on March 14, 2016 in UC Security Posts

 

Tags: , , , , , , ,

Cisco IP Phones Cannot be Turned Into Listening Devices! – By Aurus

I was requested to post this topic by Aurus, a Cisco Solution Partner that develops software solutions on top of Cisco UCM, UCCX/UCCE and TelePresence. Remember the funtenna story? If you didn’t hear about it or missed it, I have it posted in one of my earlier blogs. Nevertheless – Enjoy this post 🙂

Disclaimer: This post is written/edited by Aurus and represents their thoughts and products/services. The blog author makes no representations as to the accuracy or completeness of any information on this post. The blog author will not be liable for any errors or omissions in this information nor for the availability of this information.


 

Hello Everyone,

And thanks the blog author for posting this. Here is the story…

We’re Russians. For several years we develop apps which add extra features to Cisco collaboration solutions and some of them are used to improve the enterprise security (call recording, paging, secure conferences etc). Every month we receive a request from some Chief Security Officer asking whether its possible to turn the Cisco IP-Telephony into the network of microphones.

Ok, we are used to hear that question from Russian CSOs but last year we went global and started selling worldwide. Guess what? Yes, the same requests from other countries.

So, to all security chiefs in the world. With all respect to your job, please note…
You can:
• Record CUCM calls,
• Monitor (listen in real time) calls,
• Barge-in and “whisper”.

You can NOT:
• Turn on the IP phone external mic remotely to hear to what’s happening in the office WITHOUT indication on the phone (the yellow speakerphone led and the icon on the IP phone display)

You’re welcome to:
• Try our products,
• Discuss how to improve the corporate security with UC apps.

You’re NOT welcome to:
• Ask us to hijack the Cisco firmware,
• Ask us to turn the speakerphone led off.

Comparing to other major UC vendors Cisco provides the most powerful official developer tools allowing Cisco’s technology partners to build UC apps, including those improving the collaboration security:
• Call recording – total and on-demand,
• Text and audio paging – to the desktop and mobile phones,
• Cisco IP phone lock – to prevent its abuse when the phone owner is away,
• Protecting audio-conference with PIN or Caller ID,
• Extension Mobility Single-Sign-On.

More apps and case studies are available at Aurus website http://www.aurus5.com/

 
Leave a comment

Posted by on February 22, 2016 in UC Security Posts

 

Tags: , , , ,

A Book Edit I did and wasn’t aware of!

Yes, the title says it all – a book for which I was invited to be a contributing editor alongside my dearest / my better half – Kanika Behl. It’s so easy to do some quality work and forget about it amidst all the other usual and hectic work and non-work related chores and errands.

So how I came to know about it? I happened to browse Amazon looking for organizational dimensions on legal and technology aspects and amongst many other titles; came across this title: Organizational, Legal, and Technological Dimensions of Information System Administration (Advances in Systems Analysis, Software Engineering, and High) reading the content through which I saw my and my better half’s names in the Editorial Advisory Board.

http://goo.gl/acIhFY

the book we reviewed formatted

What!? I remember we did this sometime back but whoa – never knew it was already published and was available on Amazon.

Anyways, happy to see our contributions being called out and would like to wish the authors of the title best with the same.

 
Leave a comment

Posted by on June 9, 2015 in UC Security Posts

 

A Perspective on Cisco – Microsoft Interop

Hi there,

I happen to present a perspective on Cisco and Microsoft UC interop at MS Lync User group in Singapore. The presentation is around mostly the business and economies of scale when doing Cisco + MS however, for all you technical audience the good news is yes – it has a lot to offer from a technical stand point. Examples of Cisco UC with Lync interop from Voice and Video are covered. See for yourself and download the presentation.

Cisco Microsoft Interop

 
Leave a comment

Posted by on May 18, 2015 in UC Security Posts

 

Cisco Press Meet the Author Webinar – Demystifying CUCM Security By Default

Join me for Cisco Press Meet the Author Webinar for one of the hottest topics in Cisco Unified Communications – Security by Default http://goo.gl/eJFWD3.

Register at http://goo.gl/tLwDQg to secure your seat!

The session will be recorded in case you miss the live webcast.

 
Leave a comment

Posted by on January 21, 2014 in UC Security Posts

 

Tags: , , , , , , , , ,

Live Webcast on – Understanding and Managing CUCM Certificates

Join me for the live webcast on Understanding and Managing Cisco Unified Communications Manager Certificates on 7 Jan 2014 at 11:30 a.m. India Standard Time (India UTC + 5:30 hours) 5 p.m. Sydney (UTC +10 hours), 10 p.m. PDT San Francisco (UTC -7 hours), and 7 a.m. CEST Paris (UTC +2 hours).

The live webcast will cover:

– An overview of Cisco Unified Communications PKI
– Insights into Cisco Unified Communications Manager certificates
– Understanding Cisco Unified Communications Manager certificates and their functions
– Managing Cisco Unified Communications Manager certificates

Please register at the following link:

http://tools.cisco.com/gems/cust/customerSite.do?METHOD=E&LANGUAGE_ID=E&SEMINAR_CODE=S19542&PRIORITY_CODE=
Or
https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=76107&tclass=popup

The webcast recording can be found at https://supportforums.cisco.com/videos/7855. You can also access FAQs at https://supportforums.cisco.com/docs/DOC-39466 and the slides at https://supportforums.cisco.com/docs/DOC-39186.

 
2 Comments

Posted by on January 2, 2014 in UC Security Posts

 

Tags: , , , , , , , , ,

Chalk Talk – An Insight to Cisco VPN Phone

So, this is my second chalk talk in two consecutive months (year end happy)!

This chalk talk featured on Cisco Support Community and Cisco Technical Services Newsletter focuses on Cisco VPN phone feature for small business to enterprises looking for a scalable and secure way to let the remote workers/telecommuters connect and leverage the corporate voice resources.

Here’s an excerpt from the article.

====================================================

In today’s world, organizations are striving to stay connected with their employees. With businesses going 24X7, no organization can afford to have employees disconnected from the enterprise network and not able to access corporate voice or data resources. Understanding that modern day organizations need secure connectivity for their remote employees as well as telecommuters, Cisco has come out with the concept of VPN client on physical Cisco Unified IP Phone. Yes, you read it right, it’s an SSL client installed on a Cisco IP Phone that enables remote workforce and on-the-go employees to get access to corporate UC resources.

Cisco VPN Phone Overview

This new feature is called Cisco VPN Phone, and it leverages Cisco AnyConnect SSL client built into an IP phone’s firmware to connect to enterprise edge firewall (Cisco ASA). Cisco VPN Phone feature has numerous benefits,such as:

  • No additional hardware is required by the end-user except for the IP Phone itself.
  • Cisco Unified IP Phone with Cisco VPN client can get online from wherever Internet access is available.
  • Cisco VPN Phone feature is supported with both Cisco ASA and Cisco IOS routers.
  • Cisco VPN Phone can secure voice and video media along with IP Phone service traffic. This gives additional flexibility to go from a voice-only call to a video call. VPN tunnel applies only to voice, video, and IP phone services. The PC connected to PC port is responsible for authenticating and establishing its own tunnel with VPN client software (Split Tunneling)
  • All settings are configured via CUCM administration, thereby providing ease of administration.

====================================================

For full article visit https://supportforums.cisco.com/docs/DOC-38492.

For a detailed insight to Cisco Collaboration/UC security read Securing Cisco IP Telephony Networks book that covers every aspect of UC security and beyond.

As always, your comments are welcome. Please share this article in your social network.

Happy holidays!

 
Leave a comment

Posted by on December 25, 2013 in UC Security Posts

 

Tags: , , , , , , , , ,