RSS

Tag Archives: presence

Understanding Cisco UC Security

Understanding Cisco UC Security

VoIP Security is top of mind concern for CIO’s, IT managers, UC engineers, and security professionals. This video highlights the various potential threats that exist in real world around VoIP networks and the remediation methods, Cisco UC solution defense construct, UC PKI, Security by Deafult (SBD) and much more.

https://supportforums.cisco.com/videos/5584

The video is accompanied by a blog (and you can also download the slide deck for your future reference)

 
4 Comments

Posted by on March 13, 2013 in UC Security Videos

 

Tags: , , , , , , , , , , , , , , , , , , ,

CSC Tech-Talk Series – Understanding Cisco Unified Communications Security

Cisco Unified Communications Solution Security – Overview

The long waged war between TDM and IP Telephony is over and the winner is: VoIP! Long ago seen down upon IP based communications and UC adoption have changed and continue to change the communications paradigm. As more and more organizations adopt IP Telephony / Unified Communication (UC) solutions, they savor the potential of – power of connectivity, lower costs, and improved productivity. It can’t be denied that business agility is the mantra for success in an increasingly competitive and global environment and UC allows organizations supporting attainment of internal and external stakeholder satisfaction by enabling organizations to embed communications and collaboration into business processes. Collaboration with customers, employees, contractors, and strategic partners help accelerate time‐to-market, conscious decision making, and innovation hence, resulting in world class business agility.

However, with obvious benefits of UC there’re a number of threats that come to life when the essence of VoIP is based on data networks, which have been under attack ever since the conception of the Internet. There’s not one but many threats when it pertains to your UC solution, as simple as eavesdropping to as complex as a Denial of Service (DOS) attack. Within the context of UC solution, the whole ecosystem must be secured from business process driven communications to network infrastructure to UC applications to endpoints to management. And that too in a manner that – the security implied upholds protection of intellectual property and proprietary information, preserves corporate brands and reputations, and complies with all applicable laws and regulations.

This blog is dedicated to help you understand the need for UC security and to comprehend the various intricacies of securing a Cisco UC solution.

To read more and watch the video go to https://supportforums.cisco.com/community/netpro/collaboration-voice-video/ip-telephony/blog/2013/02/24/community-tech-talk-series–understanding-cisco-unified-communications-security

Video for tech talk available at https://supportforums.cisco.com/videos/5584

For more info on Unified Communications and Cisco IP Telephony, Network, Management security you can refer to Securing Cisco IP Telephony Networks

http://www.amazon.com/dp/1587142953

http://www.ciscopress.com/title/9781587142956

 

 
Leave a comment

Posted by on March 11, 2013 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , , , ,

Cisco IP Communicator / IP Phone – Exploiting built-in web server

Here’s a video on how someone rogue can exploit the web server of an IP Phone / Soft Phone installed in your organization and get information about call processing server, TFTP, network information and so on.

CIPC / IP Phone Web Server Exploit – Revealing Ton of Information

To know about more attacks on the same lines and how you can defend your turf, read Cisco Press publication Securing Cisco IP Telephony Networks

 
8 Comments

Posted by on November 16, 2012 in UC Security Videos

 

Tags: , , , , , , , , , , , , ,

Securing Cisco IP Telephony Networks – Review by www.firewall.cx

Securing Cisco IP Telephony Networks was recently reviewed by www.firewall.cx, the first and only approved official reviewer of Cisco Press books.

The book got a 100% review score and five stars!

Here’s an excerpt of the review:

The days of staring at a mess of wires under the desk coming out of a PSTN Master Socket are truly over. The advent of VoIP has broken the stranglehold of a telephone cable and the network has finally taken over. I would not say that IP Telephony has revolutionised the telephony sector. That momentous transition happened years ago. We currently are going through a phase where it is common to have IP Telephony integrated into any enterprise and network administrators are actively implementing security measures and policies to it. Network security is of paramount importance and IP Telephony is not to be left behind. The fact is that Cisco, the market leader in network technology, also happens to be leading the IP Telephony field. Hence it has rightly decided that establishing robust security architecture is core to Cisco IP Telephony.

The latest Cisco title addresses the aforementioned issue promptly and efficiently. Whenever a technology becomes efficient, scalable and portable and is seen as an improvement on the incumbent technology, it is deemed indispensable. From that moment it also becomes a point of failure that can cripple a business because it has now inherited security vulnerabilities and threats. The same can be said about Cisco IP Telephony. What this books aims to achieve is, and I quote, “to explain an End-to-End IP Telephony Security approach and architecture…” And I assure you, this title does plenty of justice to that aim. So let’s dig deeper into the way this book deals with the issues and how it tackles security policies, principles and their respective implementations.

Salient Features

In the introductory section of ‘Who should read this book?’, it is touted that “anyone who is interested in Cisco IP Telephony and network security” should be reading this book. Even though I would not wholly reject this point, I would prefer people reading this title have some form of experience in IP Telephony, especially Cisco products. Things become easier to comprehend. That should not mean that I am restricting the readership, it only means that this is not strictly a beginner’s guide on IP Telephony itself. However I would definitely put this book down as a reference and as a guide for IP Telephony security. The typical hallmarks of a Cisco publication are all present in this title. The entire book is neatly partitioned into 4 major sections. I will do my best to present these chapters. I don’t really have a hard job to do here, as the chapters speak for themselves.

Read the full review at Review of Securing Cisco IP Telephony Networks

Buy Securing Cisco IP Telephony Networks (Amazon) Paper back or eBook

 
1 Comment

Posted by on November 11, 2012 in UC Security Posts

 

Tags: , , , , , , , , , , ,

A Reference for all Cisco UC and Security Professionals and Decision Makers

It’s always meddling when those pesky questions around design or deployment of a UC network’s security are raised. More often than not one finds him/her (self) amid a flurry of queries.

Now, there’s a guide, a reference, and a companion to be with you always when there are queries around Cisco IP Telephony / UC security. You won’t be left alone when the discussion is around securing the UC applications or underlying network. Cisco Press publication ‘Securing Cisco IP Telephony Networks’ will be with you to address any and all queries pertinent to secure Cisco UC design approach or deployment strategy.

The book is available in paperback and eBook format:

Cisco Press

Amazon

 
105 Comments

Posted by on November 3, 2012 in UC Security Posts

 

Tags: , , , , , , , , , , , , , , ,