Practical Cisco Unified Communications Security

Practical Cisco Unified Communications Security

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Master the foundations of modern Cisco Unified Communications (UC) system security This guide helps you build foundational knowledge for securing modern Cisco Unified Communications environments that support voice, video, messaging, and meetings, and support different types of real-time collaboration capabilities based on mobile/remote access and mobile devices based on bring-your-own-device (BYOD) initiatives. Writing for administrators and managers, two Cisco collaboration experts bring together methods and insights to illuminate both the “why” and the “how” of effective collaboration security. Using the proven “Explain, Demonstrate, and Verify” methodology, they explain each threat, demonstrate remediation, and show how to confirm correct implementation. You'll walk through securing each attack surface in a logical progression, across each Cisco UC application domain. The authors address key updates to Cisco collaboration architecture, including Expressway, Cisco Meeting Server, encryption enhancements, and advanced business-to-business collaboration. You'll find quick-reference checklists in each chapter, and links to more detail wherever needed. Begin by protecting your workforce through basic physical security and life/safety techniques Understand how attackers seek to compromise your UC system's network environment—and your best countermeasures Maintain security across all UC deployment types n Protect core UC applications by locking down and hardening the core operating system Use encryption to protect media and signaling, and enforce secure authentication Secure Cisco Unified Communications Manager, Cisco Unity Connection, and Cisco Meeting Server Deploy Session Border Controllers to provide security controls for VoIP and video traffic Provide additional protection at the edge of the network Safeguard cloud-based and hybrid-cloud services Enable organizations to seamlessly and securely connect to cloud UC services Allow remote teleworker users to connect safely to local UC resources

Table of Contents:
    Introduction xix Chapter 1 The Importance of Practical UC Security 1     Identifying the Threat Landscape 2     The Danger of Shadow IT 4     Balancing Operations and Security 5     Minimizing Complexity 7     Visibility and Management 10     Introduction to ACME: Case Study 11     Summary 13     Additional Resources 14 Chapter 2 Physical Security and Life Safety 15     Introduction to Physical Security and Life Safety 15     Life and Safety Considerations 28     Summary 53     Additional Resources 54 Chapter 3 Security Through Network Fundamentals 55     Introduction to Network Security 57     Segmentation 58     Micro Segmentation 59     Secure Network Access 64     Security Features 75     Firewalls and Access Controls 84     Continuous Monitoring 86     Summary 86     Additional Resources 87 Chapter 4 Maintaining Security Across UC Deployment Types 89     Common Enterprise Collaboration Deployment Models and Security Considerations 90     An Overview of How to Secure Cluster Communications 96     NTP Authentication Enablement and Verification 100     Securing Intra-Cluster Signaling and Traffic 103     Securing the Signaling Traffic to IOS Voice and Analog Gateways 110     Securing the Integration with Cisco Emergency Responder 118     Summary 123     Additional Resources 124 Chapter 5 Hardening the Core Cisco UC Appliance Operating Systems 125     Defining the Core UC Applications 126     Hardening the Voice Operating System 138     Performing OS Lockdown via CLI 147     Summary 159     Additional Resources 159 Chapter 6 Core Cisco UC Application Lockdown 161     Types of Users in Cisco Unified Communications Manager and Cisco Unity Connection 162     Strengthening Local User Account Controls 163     Importing End Users from a LDAP Directory 175     Using Single Sign-On to Simplify the Login Experience 186     Synching End Users Between Unity Connection and Unified CM Using     Locking Down the GUI 201     Enabling System Monitoring Using SNMP and Syslog 204     Disaster Recovery Planning and Best Practices 213     Summary 214     Additional Resources 214 Chapter 7 Encrypting Media and Signaling 217     Licensing (Encryption License) and Allowing Export Restrictions Requirements 218     FIPS Considerations When Enabling Secure Signaling and Media Encryption 222     Public Key Infrastructure Overview 222     TFTP File Encryption 237     Overview of the Endpoint Registration Process 239     Applying the Secure Phone Profiles and LSC to the Phones 264     Summary 271     Additional Resources 271 Chapter 8 Securing Cisco Unified Communications Manager (Cisco) 273     Endpoint Hardening 274     Secure Conferencing 276     Conference Now 298     Smart Licensing 298     Summary 302     Additional Resources 303 Chapter 9 Securing Cisco Unity Connection 305     Baseline Security Considerations Overview 306     Securing User Access to the Unity Connection 311     Securely Integrating Unity Connection with Unified CM 316     Preventing Toll Fraud in Unity Connection 325     Summary 336     Additional Resources 337 Chapter 10 Securing Cisco Meeting Server 339     CMS Overview and Deployment Modes 340     Operating System Hardening 342     Infrastructure Considerations 347     Securing CMS Connections 351     Certificate Verification 356     Certificate Assignment 360     Application Programming Interfaces (APIs) 367     Inbound and Outbound Calling 370     Summary 381     Additional Resources 382 Chapter 11 Securing the Edge 383     Business Requirements for the Collaboration Edge 383     Cisco's Collaboration Edge Architecture 384     Deploying CUBE 388     Security Features Within Expressway 403     Deploying Mobile and Remote Access 406     Defending Against Attacks at the Edge 420     B2B Connectivity 422     Summary 424     Additional Resources 425 Chapter 12 Securing Cloud and Hybrid Cloud Services 427     Business Drivers for Cloud and Hybrid UC Services 428     Coordinating for Governance and Compliance 430     Considerations for Secure Calling 433     Securing Messaging Services 446     Meeting Management and Security Controls 456     Security Across Emerging Features 463     IoT Security 467     Summary 470     Additional Resources 470 Afterword 471 TOC, 9780136654452, 11/5/2020


Best Sellers


Product Details
  • ISBN-13: 9780136654445
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • ISBN-10: 0136654444
  • Publisher Date: 15 Mar 2021
  • Binding: Digital download
  • No of Pages: 528


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Practical Cisco Unified Communications Security
Pearson Education (US) -
Practical Cisco Unified Communications Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Practical Cisco Unified Communications Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA