Streamlined And Effective Communication: UC That Works

Why should we have leaner communication? Because the goal of a modern communication system is to help the company remove waste by facilitating higher quality and less frequent communication. Let’s see how.

We live in an age that offers a record number of possibilities to communicate. Landlines, mobile phones, email, social media, faxes, public messengers including Skype, Whatsapp, Viber, WeChat, and Facebook Messenger…just to name a few. In addition to these applications, we have access to corporate CRMs, ticketing systems, chat systems, blogs, and forums. Often the use of new medias do not necessarily lead to the dismissal of the old ones.
Continue reading “Streamlined And Effective Communication: UC That Works”

Analyzing Unified Communications Market

Market analysis
In this blog article we will analyze modern Unified Communications market trends in detail, and discuss how they actually compare with the UC solution features and the technical characteristics.

Hosted, Managed, or Cloud? Or Something Else?

Whether you are looking for a ready-to-buy UC solution or thinking about building one, the question of hosted, managed, or cloud is usually the first question that arises when a new service is added.

Let’s first review what each category means.

Continue reading “Analyzing Unified Communications Market”

Reviewing Security Concerns of UC solutions

VoIP communications are completely safe if implemented correctly. As with any other technologies, there are best practices which must be followed to achieve the best possible results.

You must address security concerns while developing or selecting your UC solution. While many vendors delegate security to separate entities, such as VPNs, this approach is not necessary nor recommended as a substitution to the security policies.

The system must protect itself from attacks that attempt to guess user and password combinations. This can be achieved by blocking repeated failed attempts. The IP address that is generating the attack must be added to a ban list for an ever-increasing period of time.

Continue reading “Reviewing Security Concerns of UC solutions”

How Two-Factor Authentication and Single Sign-On improve Security?

Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security.

Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login and password check, the system will always ask for a security code.

The security code is generated either in real-time (by the authentication system) and sent over SMS, email, or via applications such as Google Authenticator or Microsoft Authenticator.

Continue reading “How Two-Factor Authentication and Single Sign-On improve Security?”

Secure Media Transmission

Besides signaling when projecting and deploying Unified Communications system, we might also be interested in encrypting the media transferred between devices.

There are three popular RTP encryption modes:

  • SRTP MIKEY / SDES (requires TLS encryption of signaling)
  • SRTP DTLS
  • ZRTP

SRTP

The Secure Real-Time Transport Protocol (or SRTP) defines a profile of RTP (Real-Time Transport Protocol) intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast applications. It was first published by the IETF in March 2004 as RFC 3711.

Continue reading “Secure Media Transmission”