End of guidelines
This marks the end of the guidelines to deploy a secure UC/VVoIP solution. These guidelines address security concerns in four areas (network, perimeter, enterprise session controller, and UC/VVoIP endpoints) of a UC/VVoIP solution. Following these guidelines, deploying UC/VVoIP features and services can be achieved in a secure manner.▪
Table of Contents
- Executive summary
- Part I - Network security best practices and mitigations
- Part II - Perimeter security best practices and mitigations
- Part III - Enterprise session controller security best practices and mitigations
- Part IV - UC/VVoIP endpoint best practices and mitigations
- End of guidelines