Unified Communications Security News
March 10, 2017
Historically, cloud technology has scared off large enterprises due to security concerns. Now, as cloud security improves, enterprise cloud migration is on the rise.
February 22, 2017
UC security is not a priority, according to a survey of IT professionals. But security should not be overlooked, as cloud UC creates new risks.
January 13, 2017
Here's some advice for a Skype for Business deployment: Plan, plan, plan. Doing your homework upfront and allotting enough network capacity should alleviate headaches later.
January 12, 2017
In UC news, Microsoft team collaboration tools garner more interest among organizations. Plus, email encryption services see increased demand to mitigate data breaches.
Unified Communications Security Get Started
Bring yourself up to speed with our introductory content
The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001. Continue Reading
Make sure potential UCaaS providers address multi-tenancy management, end-to-end encryption and session border controller issues for added security. Continue Reading
UC expert Carrie Higbie explains the purpose of Port 9875 and why a network manager would need to direct traffic to this port in a VoIP setup. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Unified Communications Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises face potential threats every day, whether it's an office shooting or cyberattack. Critical communication tools, however, can help protect employees and operations. Continue Reading
In the new year, expect the use and security of phone numbers to expand to accommodate customer-facing operations. Also, cloud-based telephony is cleared for takeoff. Continue Reading
Open source collaboration can be rife with risk. Learn about the open source security requirements to consider and who should be responsible for security and support. Continue Reading
Manage Unified Communications Security
Learn to apply best practices and optimize your operations.
Enterprises need to ensure session border controllers are up to date to combat the changing landscape of voice attacks. Here are seven questions to ask about SBC security. Continue Reading
Proper voice security in the network requires voice gateway isolation, patch protection, next-generation firewalls, traffic encryption and limiting certain VoIP features. Continue Reading
When migrating a unified communications system to the cloud, investigate providers' security practices, ensure redundant Internet connections and consider using proxy servers. Continue Reading
Problem Solve Unified Communications Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Unified communications security is venturing into unknown territory with the growing trend of embedding communications into business applications. New security challenges could emerge for IT as ... Continue Reading
Security is a priority when moving communications to the cloud. Organizations must do their due diligence when evaluating cloud providers' UC security expertise. Continue Reading
A UC cloud-based architecture has similar network needs as on-premises systems. Networking expert Carrie Higbie Goetz explains why SBC services are necessary in a cloud environment. Continue Reading