What You Should Know to Evaluate UC Platform

In this blog article I will describe some essential characteristics that should be taken into consideration to evaluate UC platform. Backwards Compatibility Some UC solutions are still developed and managed without foreseeing a need for backwards compatibility. So, after a major upgrade of

What are the Requirements for Unified Communications System

In the  following article I will present a list of requirements that should help you in understanding which platform is better suited to an organization’s needs. Number and Location of Sites The quality of the connectivity is crucial for good voice and video

Reviewing Deployment Scenarios of UC systems

A Unified Communication solution can be deployed either in an environment controlled by the customer, as a corporate data center, or in a third-party data center. Let’s review such deployment scenarios in more detail. In most scenarios, a solution deployed in a cloud

Analyzing Unified Communications Market

In this blog article we will analyze modern Unified Communications market trends in detail, and discuss how they actually compare with the UC solution features and the technical characteristics. Hosted, Managed, or Cloud? Or Something Else? Whether you are looking for a ready-to-buy

Reviewing Security Concerns of UC solutions

VoIP communications are completely safe if implemented correctly. As with any other technologies, there are best practices which must be followed to achieve the best possible results. You must address security concerns while developing or selecting your UC solution. While many vendors delegate

How Two-Factor Authentication and Single Sign-On improve Security?

Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security. Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login

Secure Media Transmission

Besides signaling when projecting and deploying Unified Communications system, we might also be interested in encrypting the media transferred between devices. There are three popular RTP encryption modes: SRTP MIKEY / SDES (requires TLS encryption of signaling) SRTP DTLS ZRTP SRTP The Secure

Protecting devices connected to the UC system

Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be secured using the best available policies. Many currently available UC systems still do not implement proper policies or

Inspecting signaling over TLS/ SSL

Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret. For TCP connections, the de facto standard is Transport Layer Security (TLS) and, its predecessor, Secure Sockets Layer (SSL). Both of these are frequently referred to collectively

What is SCRAM Authentication Type?

In the previous blog article (Basic and Digest Authentication Types) we have started reviewing authentication types . This time we will focus on SCRAM which is a family of HTTP authentication mechanisms. XMPP supports plaintext, digest password exchanges and also SCRAM (Salted Challenge

Basic and Digest Authentication Types

Authentication is the process in which the system identifies logged in users from unauthorized users. The effectiveness of this process is determined by the authentication protocols and mechanisms being used. In this article we will start reviewing authentication types that are used to

Introducing Unified Communications Security

Security is a serious topic and, unfortunately, it is either overlooked, exposing organizations to risks, or incorrectly addressed through cumbersome solutions. In the series of blog articles I will try to shed light on what you should pay attention to, in terms of security,

Hospitality software Integrations via FIAS

This time we will talk about integrations with hospitality management systems via FIAS network protocol. FIAS As we saw in the blog article Vertical Solutions for Retail, Education, Hospitality, Healthcare, integration with hospitality software automates operations such as: Check-ins / check-outs Minibar charges

Monitoring and analyzing the UC system history

In this blog article we will examine which tools are available for monitoring and analyzing the communication history of the system. The UC system typically provides one or more of the following resources: CDR (Call Data Record) – information about calls Call Groups

Using TAPI and Web API for integration of UC capabilities

In the previous blog article (TAPI Windows and Web APIs Integrations) we investigated the definition of TAPI and Web API. This time we will discover which Unified Communication capabilities can be integrated using these technologies. Smart Routing Even before a user answers the customer’s