blog




  • Essay / Unified Communications Security

    As organizations have begun to rely more on unified communications, managing voice, video, and messaging through a unified system has raised security concerns of this IP-based communications infrastructure. This is because UC is IP-based, but there are many potential modes of communication, from video, instant messaging, and web collaboration to presence, email, and voicemail. . Over time, we see that the situation has developed a proliferation of mobile devices that are used more frequently in business environments and devices that are not as secure as those hosted in the organization's business environment (Manyika , Chui, Brown, Bughin, Dobbs, Roxburgh). , & Byers, 2011).Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay The main security problem in unified communications is eavesdropping. This is the idea that external parties can infiltrate the IP connection to listen to a web conference, receive an instant message exchange, or other communication medium. Therefore, the greatest concern arises when organizations extend their unified communications capabilities across borders, that is, to external partners. Additionally, SIP Trunking is another service that allows organizations to use Voice over IP over the Internet connection. This has caused a lot of concern as the organization moves from a digital connection to an IP connection in order to receive and make phone calls regarding hacking increases. The best way to mitigate this problem is to ensure that the system includes SIP-enabled firewalls or session boundary control as protection mechanisms. Additionally, there are many products in the SIP security market that will help mitigate risks. Another growing concern is denial of service. This is an attack method most commonly identified with the Internet, although it has become a growing threat to unified communications. This caused the proliferation of mobile devices within the workforce, ushering in a new entrant to the unified communications infrastructure. This is a valuable addition, allowing workers to participate in meetings and collaborative activities from anywhere, but it also presents challenges. In most organizations, this allows employees to use their own cell phones. For example, there are concerns about password protection as well as how to erase phone data if lost and how to ensure call data records are intact. t compromised. For the device, best practices include closing unused services and ports and changing default passwords. For networking, best practices include deploying firewalls, router access control lists, virtual LANs, port-level switch security, and authenticated network access. Securely authenticate all mobile users of the organization's assets. Implement remote security management. Implement end-to-end encryption of messages and data. Install remote device locking and remote device disposal in case of theft or loss. Keep in mind: this is just an example. Get a personalized document from our expert writers now. Get a trial, 2010).