O'Reilly logo

Understanding Session Border Controllers: Comprehensive Guide to Designing, Deploying, Troubleshooting, and Maintaining Cisco Unified Border Element (CUBE) Solutions by Gonzalo Salgueiro, Kaustubh Inamdar, Steve Holl, Chidambaram Arunachalam, Arunachalam Chidambaram, Kyzer Davis, Felipe Garrido

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13

Security Threat Mitigation

Data, as a top asset of a business, must be protected to uphold both the business’s competitive advantage and reputation. Collaboration through voice and video is at the core of modern business conduct, which means the collaboration infrastructure is a fundamental carrier of sensitive information. Information security best practices must therefore be a foundational practice in the deployment and operation of the collaboration solution.

This chapter covers both policy and technical defense mechanisms for reducing the risk of attacks on collaboration systems where SBCs are deployed. The following specific topics are discussed:

  • An Overview of Security Threats to Collaboration Solutions—This section provides ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required