Chapter 13

Security Threat Mitigation

Data, as a top asset of a business, must be protected to uphold both the business’s competitive advantage and reputation. Collaboration through voice and video is at the core of modern business conduct, which means the collaboration infrastructure is a fundamental carrier of sensitive information. Information security best practices must therefore be a foundational practice in the deployment and operation of the collaboration solution.

This chapter covers both policy and technical defense mechanisms for reducing the risk of attacks on collaboration systems where SBCs are deployed. The following specific topics are discussed:

  • An Overview of Security Threats to Collaboration Solutions—This section provides ...

Get Understanding Session Border Controllers: Comprehensive Guide to Designing, Deploying, Troubleshooting, and Maintaining Cisco Unified Border Element (CUBE) Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.