Having worked in the communications industry for over 25 years, it’s great to see a technical advancement that meets the requirements of the consumer; to have smarter solutions for communications rather than just voice.
Sure, Voice over IP changed many things but it still majored on Voice being the main method of communication whereas Unified Communications and Collaboration allows a much greater array of communication solutions.
Spending a majority of my career in technical Roles, starting as an apprentice installation engineer, before progressing to Support Manager and Presales roles, many would believe my main focus to be technological, however I do not consider technology as the primary consideration. Continue reading
Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be secured using the best available policies.
Many currently available UC systems still do not implement proper policies or do not apply them by default. What security risks can this cause?
If TFTP is used, simply knowing the MAC address of the device allows acquisition of the provisioning file, which contains the SIP credentials to connect to any device.
I am about to tell you a story about something that happened to me a few days ago.
Steve Osler and I had a few laughs ‘sitting at the Kite bar,’ and this is how the idea of sharing my experience with the group came to be.
In all honesty, there isn’t much to tell, but the dynamics with which it occurred is quite funny (and even educational). No soda and popcorn needed, I will be brief…
As I was saying earlier, a few days ago I went to meet with a client. A multinational player in the hotel industry, who is the owner of a structure on 7 hectares with approximately 1,000 rooms.
The purpose of my trip was just a simple visit, but I found myself casually, and indirectly, in a confrontation with the competition: Mitel. Continue reading
Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret.
For TCP connections, the de facto standard is Transport Layer Security (TLS) and, its predecessor, Secure Sockets Layer (SSL). Both of these are frequently referred to collectively as “SSL” and are cryptographic protocols that provide communications security over a computer network.
The primary goal of the TLS protocol is to provide privacy and data integrity between two communicating computer applications. When secured by TLS, connections between an SIP, XMPP, or HTTP client (for example, a web browser) and a server (for example, wikipedia.org) have one or more of the following properties:
There is a common uneasiness among “classic” system integrators:
“We are unable to grow”
Regardless of the daily effort, abilities and experience, year after year profit is stagnant.
Sales never really take-off as you would like, and the books cry month after month.
Have you ever thought about the obstacles that prevent you from growing like other companies in your area? Continue reading