RSS

Tag Archives: ip telephony security

Understanding Cisco Unified Communications Manager Express Security – Voice Encryption

Voice over IP (VoIP) is not just need of hour for most enterprises; it’s something their business depends on to a degree that without IP communications in place, their business processes and revenue streams will fall apart. In such case, it goes without saying; security of voice networks is one of the chief concerns when it comes to security of intellectual capital and customer data. More often than not, one of the first thoughts is how to secure the VoIP network itself which is leveraged by IP Telephony / Unified Communication (UC) applications.

So what is that may be the most commonly sought after yet elusive security control which plays an indispensable role in securing a VoIP network? Your guess is as good as mine, it is encryption! Now, you are well within your rights to ask why elusive? The simple answer is – where encryption can help you succeed and protect the privacy of communications, it can also be detrimental for various functions / organizations e.g. monitoring secure calls is not a trivial task and encrypting all endpoints has an impact on platform sizing and performance.

In this article we discuss about the security of Cisco Unified Communications Manager Express (CUCME) which is an integral part of Cisco UC; and more so of Cisco Express Call processing regime.

To read the full article visit http://www.firewall.cx/cisco-technical-knowledgebase/cisco-voice/956-cisco-voice-cme-secure-voip.html

To learn in depth about Cisco Collaboration Infrastructure, endpoint, device and application security refer to Securing Cisco IP Telephony Networks http://www.amazon.com/dp/1587142953

Advertisements
 
1 Comment

Posted by on May 12, 2013 in UC Security Posts

 

Tags: , , , , , , , , , ,

Best Practices for Deploying Secure Cisco IP Telephony Solutions

IP telephony is slowly but surely becoming part of the modern day organization’s day-to day-operations. In fact, some organizations depend on it to the extent of their core business or processes based on IP communications. Sadly though, the security aspect pertinent to IP based communications network, applications, and underlying infrastructure is usually not taken into consideration (or is ignored) when enterprises and businesses think of deploying unified communications.

On the same lines of thought, why should anyone for that matter think of securing an IP telephony network? The answer is simple however manifold:

  1. To protect the information flowing in IP communication channels from eavesdropping and reconnaissance attacks as well as from manipulation or injection attacks.
  2. To ensure that the investment in their on-premise or off-premise infrastructure pays off (ROI) and doesn’t end up in a rogue’s hands, utilizing it for malicious purposes.
  3. To lower Total Cost of Ownership (TCO) by leveraging IP communications to offset PSTN/Toll calls and reducing Moving, Addition, Configuration, and Deletion (MACD) and at the same time, keeping conversations safe.
  4. Attacks on the telephony network may result in monetary and reputation loss. Moreover, it can directly or indirectly impact the business continuity and clientage.

Today, many organizations depend on a number of IP telephony services like voice calls, instant messaging, conferencing, and video conferencing. A typical IP telephony network can face several threats like toll fraud, reconnaissance attacks, eavesdropping, Denial of Service (DoS) attack, and call hijack. While most organizations do consider that their network needs protection from internal or external threats, such a notion is missing (usually) when it comes to their IP telephony applications/devices.

Read the full article at http://www.ciscopress.com/articles/article.asp?p=1966660

For more insight to Cisco IP Telephony Security refer to Cisco Press book Securing Cisco IP Telephony Networks

 
Leave a comment

Posted by on April 8, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , , , , ,

Audio review and intro of ‘Securing Cisco IP Telephony Networks’

I’ve to admit, this is pretty cool!

There’s now an audio review and intro available for the book ‘Securing Cisco Telephony Networks’ thanks to ComputerBookMix.com

To listen to audio preview click here Audio Preview of Securing Cisco IP Telephony Networks

 
Leave a comment

Posted by on April 3, 2013 in UC Security Audio

 

Tags: , , , , , , , , , , , , , , , , , ,

Have you ever experienced a security breach in your VoIP network?

 
1 Comment

Posted by on April 3, 2013 in Polls

 

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Interested in UCSEC (Implementing Cisco Unified Communications Security)?

Interested in Cisco’s new course on securing Cisco UC networks, better known as – UCSEC or Implementing Cisco Unified Communications Security?

This course is conducted by various Cisco Learning Partners and focuses on security of Cisco UC network, from an end to end point of view. This course is comprehensive and covers almost all major aspects of Cisco UC security. I haven’t taken the course myself ( I should be teaching it 🙂 ) however, on first impression from table of contents, the course ware will help you understand the topics covered during the ILT course.

However, to gain more insight and build on real world security model – ground up you need a guide and a reference which you can take with you in those grilling sessions with customer and use during design, implementation, consulting, maintenance, or during discovery milestones of the project.

You guessed it right! You need – Securing Cisco IP Telephony Networks which will guide you through various stages of building, deploying, and maintaining a secure Cisco UC solution. This book is your true companion, guide, and reference to learning and implementing Cisco UC Security.

http://www.amazon.com/dp/1587142953

http://www.ciscopress.com/title/9781587142956

So, if you are planning to take UCSEC course, be sure to pick up your copy of Securing Cisco IP Telephony Networks and use it as a reference, as a text, as a guide, and as a companion.

 
16 Comments

Posted by on March 16, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Understanding Cisco UC Security

Understanding Cisco UC Security

VoIP Security is top of mind concern for CIO’s, IT managers, UC engineers, and security professionals. This video highlights the various potential threats that exist in real world around VoIP networks and the remediation methods, Cisco UC solution defense construct, UC PKI, Security by Deafult (SBD) and much more.

https://supportforums.cisco.com/videos/5584

The video is accompanied by a blog (and you can also download the slide deck for your future reference)

 
4 Comments

Posted by on March 13, 2013 in UC Security Videos

 

Tags: , , , , , , , , , , , , , , , , , , ,

Security Cisco IP Telephony Networks – Download Sample Content

Securing Cisco IP Telephony Networks provides an all-in-one reference to Cisco UC, IP Telephony and security professionals as well as decision makers. Here’s your chance to grab two free chapters offered by Cisco Press as sample content from the newly released book.

While Chapter 1 introduces you to the world of Cisco IP Telephony security as well as various threats, business challenges, and so on Chapter 4 gives an insight to a Security Framework around Cisco IP Telephony / Unified Communications which will enable you/your organization to successfully implement the right level of security for Cisco UC applications, underlying network, devices, and so on.

You can access the free content here:

Chapter 1 courtesy Cisco Press

Index and Chapter 4 courtesy Cisco Press

If you enjoyed the free sample chapters, you can buy the eBook or grab a paperback copy @

Cisco Press (Paperback)

Cisco Press (eBook)

Amazon (Paperback)

Amazon (Kindle edition, eBook)

For Indian Subcontinent/AsiaPac readers Infibeam (Paperback)

 
1 Comment

Posted by on November 15, 2012 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , , , ,