dcsimg

Seven Tips for Effective Unified Communications Security

  • Seven Tips for Effective Unified Communications Security-

    Many SMB networking devices, such as routers and firewalls, come with built-in VPN capability. Quality VPN devices are now available at affordable prices. For remote users, and while connecting remote SMB offices, the simplest option is to deploy a VPN device at both ends. The connected devices form an encrypted “tunnel” over the public Internet. This “virtual” network keeps all traffic safe.

    VPNs have many benefits: In addition to VoIP, the remote user can access other local network resources such as network shares and intranet Web applications; the traffic is encrypted to maintain privacy; network address translation (NAT) issues are eliminated or diminished; and ports can be opened to all networks because the VPN requires authentication before establishing a connection.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Seven Tips for Effective Unified Communications Security

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
  • Seven Tips for Effective Unified Communications Security-3

    Many SMB networking devices, such as routers and firewalls, come with built-in VPN capability. Quality VPN devices are now available at affordable prices. For remote users, and while connecting remote SMB offices, the simplest option is to deploy a VPN device at both ends. The connected devices form an encrypted “tunnel” over the public Internet. This “virtual” network keeps all traffic safe.

    VPNs have many benefits: In addition to VoIP, the remote user can access other local network resources such as network shares and intranet Web applications; the traffic is encrypted to maintain privacy; network address translation (NAT) issues are eliminated or diminished; and ports can be opened to all networks because the VPN requires authentication before establishing a connection.

Unified communications (UC) presents unique security challenges because it brings together disparate technologies. A UC business phone system combines VoIP, video, chat, email and presence together into one unified messaging system. As the technology has become more complex and more accessible from the public Internet, the security threat has increased. In many ways it is easier than ever to attack business communications. Companies must be diligent to protect their communications as they are vital to business operations.

While large businesses can often dedicate substantial resources toward securing their communications, those in the SMB space need solutions that are both effective and simple to manage security. Despite being in a niche field, securing UC as an SMB follows many of the same security best practices that are effective in the enterprise for a variety of technologies. In this slideshow, Digium shares seven best practices that can help SMBs keep communications flowing.