Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be secured using the best available policies.
Many currently available UC systems still do not implement proper policies or do not apply them by default. What security risks can this cause?
If TFTP is used, simply knowing the MAC address of the device allows acquisition of the provisioning file, which contains the SIP credentials to connect to any device.
Continue reading “Protecting devices connected to the UC system”
I am about to tell you a story about something that happened to me a few days ago.
Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret.
There is a common uneasiness among “classic” system integrators:
A contribution to the health sector and the Wildix solution become a fundamental part in a nursing home