How Two-Factor Authentication and Single Sign-On improve Security?

Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security. Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login

Partner Story from Austria: TOOL IT

“I learned about Wildix from the recommendation of a Swiss business partner, who said: ‘Look at what these people do!’” – Hannes Jauk, CEO Tool IT was founded in 1996 in Café Sperl in Vienna, between an apple strudel and a coffee –

Secure Media Transmission

Besides signaling when projecting and deploying Unified Communications system, we might also be interested in encrypting the media transferred between devices. There are three popular RTP encryption modes: SRTP MIKEY / SDES (requires TLS encryption of signaling) SRTP DTLS ZRTP SRTP The Secure

Make the right choice! The 8 steps that will help lead you to success with a UC&C partnership

Having worked in the communications industry for over 25 years, it’s great to see a technical advancement that meets the requirements of the consumer; to have smarter solutions for communications rather than just voice. Sure, Voice over IP changed many things but it

Protecting devices connected to the UC system

Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be secured using the best available policies. Many currently available UC systems still do not implement proper policies or

How to use the bravado of the adversary to drag him by his jersey to score a goal in his own goal post

I am about to tell you a story about something that happened to me a few days ago. Steve Osler and I had a few laughs ‘sitting at the Kite bar,’ and this is how the idea of sharing my experience with the

Inspecting signaling over TLS/ SSL

Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret. For TCP connections, the de facto standard is Transport Layer Security (TLS) and, its predecessor, Secure Sockets Layer (SSL). Both of these are frequently referred to collectively

The 6 obstacles that block the growth of the system integrator

There is a common uneasiness among “classic” system integrators: “We are unable to grow” Regardless of the daily effort, abilities and experience, year after year profit is stagnant. Sales never really take-off as you would like, and the books cry month after month.

Your target is the dictator of your activities

Over the years, I’ve studied, put into practice and questioned a great number of activities that were aided and assisted by books, courses and consultations. Some actions worked, others not so much. Today, I would like to share with you the teaching that

What is SCRAM Authentication Type?

In the previous blog article (Basic and Digest Authentication Types) we have started reviewing authentication types . This time we will focus on SCRAM which is a family of HTTP authentication mechanisms. XMPP supports plaintext, digest password exchanges and also SCRAM (Salted Challenge

Basic and Digest Authentication Types

Authentication is the process in which the system identifies logged in users from unauthorized users. The effectiveness of this process is determined by the authentication protocols and mechanisms being used. In this article we will start reviewing authentication types that are used to

Introducing Unified Communications Security

Security is a serious topic and, unfortunately, it is either overlooked, exposing organizations to risks, or incorrectly addressed through cumbersome solutions. In the series of blog articles I will try to shed light on what you should pay attention to, in terms of security,

Hospitality software Integrations via FIAS

This time we will talk about integrations with hospitality management systems via FIAS network protocol. FIAS As we saw in the blog article Vertical Solutions for Retail, Education, Hospitality, Healthcare, integration with hospitality software automates operations such as: Check-ins / check-outs Minibar charges

Monitoring and analyzing the UC system history

In this blog article we will examine which tools are available for monitoring and analyzing the communication history of the system. The UC system typically provides one or more of the following resources: CDR (Call Data Record) – information about calls Call Groups

Using TAPI and Web API for integration of UC capabilities

In the previous blog article (TAPI Windows and Web APIs Integrations) we investigated the definition of TAPI and Web API. This time we will discover which Unified Communication capabilities can be integrated using these technologies. Smart Routing Even before a user answers the customer’s