Deployment Planning

In this blog article I will provide some best practices for deployment planning that our UC platform will need, to work as expected. When a new UC system is installed, users will need to spend a considerable amount of time and resources learning

Overview of Platforms with SIP / XMPP Support

What follows is an incomplete list of leading vendors who are using the main protocols described in one of the previous blog articles: SIP and XMPP. This list is based on my personal knowledge. I apologize in advance for any exclusions. The goal

What You Should Know to Evaluate UC Platform

In this blog article I will describe some essential characteristics that should be taken into consideration to evaluate UC platform. Backwards Compatibility Some UC solutions are still developed and managed without foreseeing a need for backwards compatibility. So, after a major upgrade of

What are the Requirements for Unified Communications System

In the  following article I will present a list of requirements that should help you in understanding which platform is better suited to an organization’s needs. Number and Location of Sites The quality of the connectivity is crucial for good voice and video

Reviewing Deployment Scenarios of UC systems

A Unified Communication solution can be deployed either in an environment controlled by the customer, as a corporate data center, or in a third-party data center. Let’s review such deployment scenarios in more detail. In most scenarios, a solution deployed in a cloud

Streamlined And Effective Communication: UC That Works

Why should we have leaner communication? Because the goal of a modern communication system is to help the company remove waste by facilitating higher quality and less frequent communication. Let’s see how. We live in an age that offers a record number of

Analyzing Unified Communications Market

In this blog article we will analyze modern Unified Communications market trends in detail, and discuss how they actually compare with the UC solution features and the technical characteristics. Hosted, Managed, or Cloud? Or Something Else? Whether you are looking for a ready-to-buy

Reviewing Security Concerns of UC solutions

VoIP communications are completely safe if implemented correctly. As with any other technologies, there are best practices which must be followed to achieve the best possible results. You must address security concerns while developing or selecting your UC solution. While many vendors delegate

How Two-Factor Authentication and Single Sign-On improve Security?

Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security. Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login

Secure Media Transmission

Besides signaling when projecting and deploying Unified Communications system, we might also be interested in encrypting the media transferred between devices. There are three popular RTP encryption modes: SRTP MIKEY / SDES (requires TLS encryption of signaling) SRTP DTLS ZRTP SRTP The Secure

Protecting devices connected to the UC system

Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be secured using the best available policies. Many currently available UC systems still do not implement proper policies or

Inspecting signaling over TLS/ SSL

Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret. For TCP connections, the de facto standard is Transport Layer Security (TLS) and, its predecessor, Secure Sockets Layer (SSL). Both of these are frequently referred to collectively

What is SCRAM Authentication Type?

In the previous blog article (Basic and Digest Authentication Types) we have started reviewing authentication types . This time we will focus on SCRAM which is a family of HTTP authentication mechanisms. XMPP supports plaintext, digest password exchanges and also SCRAM (Salted Challenge

Basic and Digest Authentication Types

Authentication is the process in which the system identifies logged in users from unauthorized users. The effectiveness of this process is determined by the authentication protocols and mechanisms being used. In this article we will start reviewing authentication types that are used to

Introducing Unified Communications Security

Security is a serious topic and, unfortunately, it is either overlooked, exposing organizations to risks, or incorrectly addressed through cumbersome solutions. In the series of blog articles I will try to shed light on what you should pay attention to, in terms of security,