New & Notable
Unified Communications Security News
July 11, 2018
The U.S. Department of Homeland Security and vendor SecureLogix are making 'rapid progress' in developing a TDoS attack defense. The technology is expected in the coming months.
December 19, 2017
New Microsoft telephony tools put some pressure on Skype for Business users to switch to Teams. Meanwhile, Cisco Spark security gets a key certification.
June 13, 2017
Analysts discuss IBM strengthening Connections by acquiring an intranet platform, Mitel's IoT and collaboration application, and the growing need for cloud-based security services.
March 10, 2017
Historically, cloud technology has scared off large enterprises due to security concerns. Now, as cloud security improves, enterprise cloud migration is on the rise.
Unified Communications Security Get Started
Bring yourself up to speed with our introductory content
Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with ... Continue Reading
With greater use of cloud, unified communications platforms are now inherent to all the security risks of other parts of IT. UC security must become an IT priority. Continue Reading
The Snowden effect is an increase in public awareness about information privacy and security due to Edward Snowden's revelations about the U.S. National Security Agency's surveillance initiatives after the events of September 11, 2001. Continue Reading
Evaluate Unified Communications Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SIP trunking vendors are using security features to differentiate themselves in a crowded market. Our expert explains what types of SIP trunking security you can expect. Continue Reading
Learn how your data may be at risk when deploying CPaaS and communication APIs and how to protect your organization from potential data security risks. Continue Reading
Blockchain in communications can provide additional layers of UC security by reinforcing voice identity and privacy, while also protecting companywide collaboration. Continue Reading
Manage Unified Communications Security
Learn to apply best practices and optimize your operations.
Navarino Infinity, a satellite communication system, found and fixed a flaw that exposed an unauthenticated script. Discover what threats this flaw enabled with Judith Myerson. Continue Reading
Cloud-based collaboration software offers productivity benefits, but carries security risks. Learn about three collaboration security threats facing organizations and how to address them. Continue Reading
As UC platforms become more open to the outside world, IT leaders need to heed newer threats, including guest-access features, federation capabilities and cloud services. Continue Reading
Problem Solve Unified Communications Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Understanding how APIs work and how they are used is essential when formulating security policies. Our expert outlines four steps to set up a first line of defense. Continue Reading
The European Union General Data Protection Regulation sets tighter controls on businesses and how they handle customers' personally identifiable information. Continue Reading
Unified communications security is venturing into unknown territory with the growing trend of embedding communications into business applications. New security challenges could emerge for IT as ... Continue Reading