sponsored by Polycom, Inc.
Posted:  07 Sep 2012
Published:  30 Mar 2012
Format:  PDF
Length:  5  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective, it is very similar to other IP data services. This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom’s recommendations for implementing secured UC.






BROWSE RELATED RESOURCES
Access Control | Access Rights | Authentication | Collaboration | Data Security | Encryption Standards | Mobile Workers | Network Address Translation | Network Security | Remote Access Security | Remote Users | Unified Messaging | Unified Messaging Systems

View All Resources sponsored by Polycom, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement