With all of the concerns about data security, do enterprises need to make sure their unified communications (UC) platforms are locked down securely?
Ask the expert
Do you have a question for Carrie Higbie or any of our other experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
Yes. Any data, ingress or egress (that is, going in or out) from a network should be properly secured. This includes your unified communications platform. Having a secure communications platform may mean more than using the security measures that are built in the system. You may also need to provide another layer or two of security to flank that system, such as additional security appliances or firewalls that understand all packet types and realize that the calls that come in from outside may take different routes into the premise. Efficiently securing communications really is a matter of measuring risk and providing the correct solutions to address that risk.
Learn more about how to secure communications:
- The UC network threats facing enterprises today: SecureLogix CTO Mark Collier discusses the findings of the company's 2014 Voice and UC State of Security report.
- Securing VoIP networks to prevent toll fraud: Learn what security measures vendors are adding to their services to prevent malicious attacks.
- Could WebRTC pose security threats? Learn how enabling WebRTC applications could expose UC networks to new security threats.
- Three use cases for Wireshark forensics: Learn the different ways you can use Wireshark to add additional security to your UC network.
- Telephony denial of service attacks on the rise: Learn how TDoS attacks can affect your UC network and what you should do when your enterprise is under attack.
- Anatomy of common UC network attacks: In this book chapter download, learn the details of how hackers gain access to UC systems and expose their vulnerabilities.
Dig Deeper on Unified Communications Security
Related Q&A from Carrie Higbie Goetz
An unguarded VoIP system could be vulnerable to attack. Learn what security measures can help prevent VoIP security threats from affecting your ... Continue Reading
Traditional and cloud SIP trunking perform the same tasks of initiating and ending call sessions, but the method and costs of access create distinct ... Continue Reading
The rules around E911 location tracking have evolved as more businesses move away from traditional wired connections to VoIP. Here's how to stay ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.