Securing Business Communications Applications in Converged Networks - Best Practices

Securing Business Communications Applications in Converged Networks - Best Practices

As enterprise networks migrate to converged and integrated architectures in order to achieve new business flexibility and efficiencies, enterprise IT planners are discovering an increased need to ramp up security considerations. Security must be planned for and built into converged communications networks and applications to achieve their design objectives.

One of the results of security and business planning is to develop and adopt an appropriate communications architecture that can deliver a systematic approach to secure and continuous communications. A systematic approach helps ensure that the best practices of creating security in depth are applied across all dimensions of enterprise communications including:

  • Secure infrastructure elements
  • Secure access, authentication and authorization
  • Secure applications
  • Survivability and failover
Avaya Inc.
10 Jun 2008
01 Jul 2005
14 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor