Securing Business Communications Applications in Converged Networks - Best Practices

Securing Business Communications Applications in Converged Networks - Best Practices

Cover
As enterprise networks migrate to converged and integrated architectures in order to achieve new business flexibility and efficiencies, enterprise IT planners are discovering an increased need to ramp up security considerations. Security must be planned for and built into converged communications networks and applications to achieve their design objectives.

One of the results of security and business planning is to develop and adopt an appropriate communications architecture that can deliver a systematic approach to secure and continuous communications. A systematic approach helps ensure that the best practices of creating security in depth are applied across all dimensions of enterprise communications including:

  • Secure infrastructure elements
  • Secure access, authentication and authorization
  • Secure applications
  • Survivability and failover
Vendor:
Avaya Inc.
Posted:
10 Jun 2008
Published:
01 Jul 2005
Format:
PDF
Length:
14 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy