Category Archives: Blog @en

Reviewing Security Concerns of UC solutions

VoIP communications are completely safe if implemented correctly. As with any other technologies, there are best practices which must be followed to achieve the best possible results.

You must address security concerns while developing or selecting your UC solution. While many vendors delegate security to separate entities, such as VPNs, this approach is not necessary nor recommended as a substitution to the security policies.

The system must protect itself from attacks that attempt to guess user and password combinations. This can be achieved by blocking repeated failed attempts. The IP address that is generating the attack must be added to a ban list for an ever-increasing period of time.

Continue reading

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

How To Offer Your Services And Not Lose Customers

Losing customers costs money.

Primarily because earning new ones is a strain that is impossible to get used to.

And every day we wake up with the aim of finding new customers, despite the frustrations that we accumulate each night.

Care for our current customers, on the other hand, is so simple, that we often forget to even do it. The point I’m trying to make here is that, typically, once we have sold the product, it ends there. We send the technician for installation and we don’t worry about how our customer has experienced their product experience post-purchase. Continue reading

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...

How Two-Factor Authentication and Single Sign-On improve Security?

Let’s explore how two-factor authentication and single sign-on mechanisms are being used for improving security.

Two-Factor Authentication introduces an additional security layer to protect accounts whose password has been compromised (for example, in case the password has been stolen). After the usual login and password check, the system will always ask for a security code.

The security code is generated either in real-time (by the authentication system) and sent over SMS, email, or via applications such as Google Authenticator or Microsoft Authenticator.

Continue reading

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Partner Story from Austria: TOOL IT

“I learned about Wildix from the recommendation of a Swiss business partner, who said: ‘Look at what these people do!’” – Hannes Jauk, CEO

Tool IT was founded in 1996 in Café Sperl in Vienna, between an apple strudel and a coffee – and this is not by chance if you think of the cultural tradition of Viennese coffee houses, places for communicating and exchanging ideas. Tool IT’s “leitmotiv” is precisely that, of providing the most efficient tools for company communication. In the beginning, the company was a classic IT business with a wide portfolio of services, but 10 years ago, it chose to direct itself towards VoIP and Unified Communication. Continue reading

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...

Secure Media Transmission

Besides signaling when projecting and deploying Unified Communications system, we might also be interested in encrypting the media transferred between devices.

There are three popular RTP encryption modes:

  • SRTP MIKEY / SDES (requires TLS encryption of signaling)
  • SRTP DTLS
  • ZRTP

SRTP

The Secure Real-Time Transport Protocol (or SRTP) defines a profile of RTP (Real-Time Transport Protocol) intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast applications. It was first published by the IETF in March 2004 as RFC 3711.

Continue reading

1 Star2 Stars3 Stars4 Stars5 Stars (5 votes, average: 5.00 out of 5)
Loading...