RSS

Tag Archives: IP Phone

Webcast recordings for: Essentials of Endpoint Security and Compliance Series

Last week I wrote about the ongoing webcast series for “Essentials of Endpoint Security and Compliance” which is being hosted by Stephen Welsh (CTO UnifiedFx) and myself. In case you were not able to attend the live session(s) you can view the recording for each session.

The Essentials of Endpoint Security & Compliance

• Session 1: The Impact of Security by Default – Recording is available at: http://goo.gl/2yJaKm

• Session 2: Understanding and Managing ITL & CTL Files – Recording is available at following URL http://goo.gl/w05Dqh

• Session 3: Leading Practices for Endpoint Security & Compliance – Recording is available at following URL http://goo.gl/GuXy2P

I hope you enjoy the sessions and can put the knowledge gained to good use in your organization or for a customer project.

You can download the presentation used for the session from the following link.

The Essentials of Endpoint Security Compliance Presentation

If you wish to demystify the intricacies of Cisco’s Collaboration Network Security Securing Cisco IP Telephony Networks is your single resource for all Cisco UC Security, Network Security and Security Strategy queries.

Advertisements
 
Leave a comment

Posted by on September 12, 2013 in UC Security Posts

 

Tags: , , , , , , , , ,

Free Webinars on CUCM Endpoint Security and Compliance

Please join Stephen Welsh (UnifiedFX CTO) and myself for a series of educational webinars on Cisco Unified Communications Manager (CUCM) Endpoint Security and Compliance.

This series of webinars is aimed at helping UC and Security community understand, uncomplicate and achieve security for Cisco UC endpoints (IP Phones, Softphones) Learn key principles, leading practices and how to effectively manage Cisco UC endpoints for security compliance.

The Essentials of Endpoint Security and Compliance is a 3 session series with following sessions –

• Session 1: The Impact of Security by Default (5th Sept)

• Session 2: Understanding and Managing ITL & CTL Files (12th Sept)

• Session 3: Leading Practices for Endpoint Security & Compliance (19th Sept)

You can register for the webinars at http://events.unifiedfx.com

Unifed FX’s webinar page http://goo.gl/IPZvQg

These sessions will be recorded so in case you’re unable to join for the live session(s) you can view the recording later.

Keep up the security!

 
Leave a comment

Posted by on September 1, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , ,

Understanding Cisco UC Security

Understanding Cisco UC Security

VoIP Security is top of mind concern for CIO’s, IT managers, UC engineers, and security professionals. This video highlights the various potential threats that exist in real world around VoIP networks and the remediation methods, Cisco UC solution defense construct, UC PKI, Security by Deafult (SBD) and much more.

https://supportforums.cisco.com/videos/5584

The video is accompanied by a blog (and you can also download the slide deck for your future reference)

 
4 Comments

Posted by on March 13, 2013 in UC Security Videos

 

Tags: , , , , , , , , , , , , , , , , , , ,

Securing Cisco IP Telephony Networks – Review by www.firewall.cx

Securing Cisco IP Telephony Networks was recently reviewed by www.firewall.cx, the first and only approved official reviewer of Cisco Press books.

The book got a 100% review score and five stars!

Here’s an excerpt of the review:

The days of staring at a mess of wires under the desk coming out of a PSTN Master Socket are truly over. The advent of VoIP has broken the stranglehold of a telephone cable and the network has finally taken over. I would not say that IP Telephony has revolutionised the telephony sector. That momentous transition happened years ago. We currently are going through a phase where it is common to have IP Telephony integrated into any enterprise and network administrators are actively implementing security measures and policies to it. Network security is of paramount importance and IP Telephony is not to be left behind. The fact is that Cisco, the market leader in network technology, also happens to be leading the IP Telephony field. Hence it has rightly decided that establishing robust security architecture is core to Cisco IP Telephony.

The latest Cisco title addresses the aforementioned issue promptly and efficiently. Whenever a technology becomes efficient, scalable and portable and is seen as an improvement on the incumbent technology, it is deemed indispensable. From that moment it also becomes a point of failure that can cripple a business because it has now inherited security vulnerabilities and threats. The same can be said about Cisco IP Telephony. What this books aims to achieve is, and I quote, “to explain an End-to-End IP Telephony Security approach and architecture…” And I assure you, this title does plenty of justice to that aim. So let’s dig deeper into the way this book deals with the issues and how it tackles security policies, principles and their respective implementations.

Salient Features

In the introductory section of ‘Who should read this book?’, it is touted that “anyone who is interested in Cisco IP Telephony and network security” should be reading this book. Even though I would not wholly reject this point, I would prefer people reading this title have some form of experience in IP Telephony, especially Cisco products. Things become easier to comprehend. That should not mean that I am restricting the readership, it only means that this is not strictly a beginner’s guide on IP Telephony itself. However I would definitely put this book down as a reference and as a guide for IP Telephony security. The typical hallmarks of a Cisco publication are all present in this title. The entire book is neatly partitioned into 4 major sections. I will do my best to present these chapters. I don’t really have a hard job to do here, as the chapters speak for themselves.

Read the full review at Review of Securing Cisco IP Telephony Networks

Buy Securing Cisco IP Telephony Networks (Amazon) Paper back or eBook

 
1 Comment

Posted by on November 11, 2012 in UC Security Posts

 

Tags: , , , , , , , , , , ,