Partner Story from Austria: TOOL IT

“I learned about Wildix from the recommendation of a Swiss business partner, who said: ‘Look at what these people do!’” – Hannes Jauk, CEO

Tool IT was founded in 1996 in Café Sperl in Vienna, between an apple strudel and a coffee – and this is not by chance if you think of the cultural tradition of Viennese coffee houses, places for communicating and exchanging ideas. Tool IT’s “leitmotiv” is precisely that, of providing the most efficient tools for company communication. In the beginning, the company was a classic IT business with a wide portfolio of services, but 10 years ago, it chose to direct itself towards VoIP and Unified Communication. Continue reading “Partner Story from Austria: TOOL IT”

Secure Media Transmission

Besides signaling when projecting and deploying Unified Communications system, we might also be interested in encrypting the media transferred between devices.

There are three popular RTP encryption modes:

  • SRTP MIKEY / SDES (requires TLS encryption of signaling)
  • SRTP DTLS
  • ZRTP

SRTP

The Secure Real-Time Transport Protocol (or SRTP) defines a profile of RTP (Real-Time Transport Protocol) intended to provide encryption, message authentication and integrity, and replay protection to the RTP data in both unicast and multicast applications. It was first published by the IETF in March 2004 as RFC 3711.

Continue reading “Secure Media Transmission”

Make the right choice! The 8 steps that will help lead you to success with a UC&C partnership

Having worked in the communications industry for over 25 years, it’s great to see a technical advancement that meets the requirements of the consumer; to have smarter solutions for communications rather than just voice.

Sure, Voice over IP changed many things but it still majored on Voice being the main method of communication whereas Unified Communications and Collaboration allows a much greater array of communication solutions.

Spending a majority of my career in technical Roles, starting as an apprentice installation engineer, before progressing to Support Manager and Presales roles, many would believe my main focus to be technological, however I do not consider technology as the primary consideration. Continue reading “Make the right choice! The 8 steps that will help lead you to success with a UC&C partnership”

Protecting devices connected to the UC system

Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be secured using the best available policies.

Many currently available UC systems still do not implement proper policies or do not apply them by default. What security risks can this cause?

If TFTP is used, simply knowing the MAC address of the device allows acquisition of the provisioning file, which contains the SIP credentials to connect to any device.

Continue reading “Protecting devices connected to the UC system”

How to use the bravado of the adversary to drag him by his jersey to score a goal in his own goal post

I am about to tell you a story about something that happened to me a few days ago.

Steve Osler and I had a few laughs ‘sitting at the Kite bar,’ and this is how the idea of sharing my experience with the group came to be.

In all honesty, there isn’t much to tell, but the dynamics with which it occurred is quite funny (and even educational). No soda and popcorn needed, I will be brief…

As I was saying earlier, a few days ago I went to meet with a client. A multinational player in the hotel industry, who is the owner of a structure on 7 hectares with approximately 1,000 rooms.

The purpose of my trip was just a simple visit, but I found myself casually, and indirectly, in a confrontation with the competition: Mitel. Continue reading “How to use the bravado of the adversary to drag him by his jersey to score a goal in his own goal post”