SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Secure Network
Infrastructures for Unified
     Communications
       Deployments
         Craig Sanderson
   Solutions Manager—Cisco®
      crsander@cisco.com
Agenda
• Secure Unified Communications Overview
• Secure Unified Communications
  Best Practices
• Secure Unified Communications
  Infrastructure
  – Eavesdropping
  – Denial of Service
Secure Unified
Communications

    Overview
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments
Secure Network Infrastructures for Unified Communications Deployments

Contenu connexe

Tendances

Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPublic Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Pia Waugh
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
Marce Torres
 

Tendances (19)

Why Cisco-for-Security
Why Cisco-for-SecurityWhy Cisco-for-Security
Why Cisco-for-Security
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
The Need for Cloud-Driven Work Infrastructure
The Need for Cloud-Driven Work InfrastructureThe Need for Cloud-Driven Work Infrastructure
The Need for Cloud-Driven Work Infrastructure
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015ICS Cyber Security Europe 2015
ICS Cyber Security Europe 2015
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPublic Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart Weeks
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information InfrastructureCybersecurity for Critical National Information Infrastructure
Cybersecurity for Critical National Information Infrastructure
 
Microstrategy Mobile
Microstrategy MobileMicrostrategy Mobile
Microstrategy Mobile
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Cyber resilience and secure information sharing with third parties amsterdam...
Cyber resilience and secure information sharing with third parties  amsterdam...Cyber resilience and secure information sharing with third parties  amsterdam...
Cyber resilience and secure information sharing with third parties amsterdam...
 
Security and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systemsSecurity and-cybersecurity-of-information-systems
Security and-cybersecurity-of-information-systems
 

En vedette

Pwc entertainment and-media-outlook-registration
Pwc entertainment and-media-outlook-registrationPwc entertainment and-media-outlook-registration
Pwc entertainment and-media-outlook-registration
Praful Baweja
 
what-drives-a-movie-goer-to-wach-movies
 what-drives-a-movie-goer-to-wach-movies what-drives-a-movie-goer-to-wach-movies
what-drives-a-movie-goer-to-wach-movies
Praful Baweja
 
Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...
Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...
Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...
Praful Baweja
 
Next Generation Desktop
Next Generation DesktopNext Generation Desktop
Next Generation Desktop
digitallibrary
 
Branding And Merchandise
Branding And MerchandiseBranding And Merchandise
Branding And Merchandise
Praful Baweja
 
online and offline reputation management
online and offline reputation managementonline and offline reputation management
online and offline reputation management
Praful Baweja
 
Ticketplease gift voucher
Ticketplease gift voucherTicketplease gift voucher
Ticketplease gift voucher
Praful Baweja
 
Wizcraft International Entertainment credentials 2014
Wizcraft International Entertainment credentials 2014Wizcraft International Entertainment credentials 2014
Wizcraft International Entertainment credentials 2014
Praful Baweja
 

En vedette (18)

How to be a ROBO Cop: Patty Then Frank Jablonski April 2008 Reducing Business...
How to be a ROBO Cop: Patty Then Frank Jablonski April 2008 Reducing Business...How to be a ROBO Cop: Patty Then Frank Jablonski April 2008 Reducing Business...
How to be a ROBO Cop: Patty Then Frank Jablonski April 2008 Reducing Business...
 
Pwc entertainment and-media-outlook-registration
Pwc entertainment and-media-outlook-registrationPwc entertainment and-media-outlook-registration
Pwc entertainment and-media-outlook-registration
 
what-drives-a-movie-goer-to-wach-movies
 what-drives-a-movie-goer-to-wach-movies what-drives-a-movie-goer-to-wach-movies
what-drives-a-movie-goer-to-wach-movies
 
The Relationship Between Wireless Security & Management
The Relationship Between Wireless Security & ManagementThe Relationship Between Wireless Security & Management
The Relationship Between Wireless Security & Management
 
Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...
Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...
Introduction to Ticketplease - one of India's Largest Ticketing Solution Prov...
 
Platforms for Mobile
Platforms for MobilePlatforms for Mobile
Platforms for Mobile
 
Open Source Networking
Open Source NetworkingOpen Source Networking
Open Source Networking
 
Crazy Does It: Brand Your Program As Fun
Crazy Does It: Brand Your Program As FunCrazy Does It: Brand Your Program As Fun
Crazy Does It: Brand Your Program As Fun
 
Next Generation Desktop
Next Generation DesktopNext Generation Desktop
Next Generation Desktop
 
The Evolution of Threats and their Impact upon Technology
The Evolution of Threats and their Impact upon TechnologyThe Evolution of Threats and their Impact upon Technology
The Evolution of Threats and their Impact upon Technology
 
Branding And Merchandise
Branding And MerchandiseBranding And Merchandise
Branding And Merchandise
 
online and offline reputation management
online and offline reputation managementonline and offline reputation management
online and offline reputation management
 
Virtualization Technology Primer
Virtualization Technology PrimerVirtualization Technology Primer
Virtualization Technology Primer
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
 
Ticketplease gift voucher
Ticketplease gift voucherTicketplease gift voucher
Ticketplease gift voucher
 
Wizcraft International Entertainment credentials 2014
Wizcraft International Entertainment credentials 2014Wizcraft International Entertainment credentials 2014
Wizcraft International Entertainment credentials 2014
 
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby StepsHow to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
How to Scope Your Enterprise CMDB Project Successfully: Big Vision, Baby Steps
 
Fashion2020 sponsor
Fashion2020 sponsorFashion2020 sponsor
Fashion2020 sponsor
 

Similaire à Secure Network Infrastructures for Unified Communications Deployments

Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
Schneider Electric
 
QSG Ltd Co Brochure 2007
QSG Ltd Co Brochure 2007QSG Ltd Co Brochure 2007
QSG Ltd Co Brochure 2007
granthumphrey
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
nmullen
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
 

Similaire à Secure Network Infrastructures for Unified Communications Deployments (20)

Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Sahara petrochemicals cisco
Sahara petrochemicals  ciscoSahara petrochemicals  cisco
Sahara petrochemicals cisco
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Belden Total Enterprise Network White Paper
Belden Total Enterprise Network White PaperBelden Total Enterprise Network White Paper
Belden Total Enterprise Network White Paper
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
VET4SBO Level 1 module 2 - unit 4 - v1.0 en
VET4SBO Level 1   module 2 - unit 4 - v1.0 enVET4SBO Level 1   module 2 - unit 4 - v1.0 en
VET4SBO Level 1 module 2 - unit 4 - v1.0 en
 
QSG Ltd Co Brochure 2007
QSG Ltd Co Brochure 2007QSG Ltd Co Brochure 2007
QSG Ltd Co Brochure 2007
 
Mondi Group
Mondi GroupMondi Group
Mondi Group
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Topdanmark- Cisco
Topdanmark- CiscoTopdanmark- Cisco
Topdanmark- Cisco
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 

Plus de digitallibrary

Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,
digitallibrary
 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendor
digitallibrary
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centers
digitallibrary
 

Plus de digitallibrary (20)

SOA: State of the Union
SOA: State of the UnionSOA: State of the Union
SOA: State of the Union
 
How to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on TrackHow to Get (and Keep) Your ITSM Initiative on Track
How to Get (and Keep) Your ITSM Initiative on Track
 
Physical Security & IT
Physical Security & ITPhysical Security & IT
Physical Security & IT
 
Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?Application Virtualization: What its all about and how do you manage it?
Application Virtualization: What its all about and how do you manage it?
 
How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...How taking a strategic approach to WAN optimization supports application deli...
How taking a strategic approach to WAN optimization supports application deli...
 
FAN - An Architecture for Data Management
FAN - An Architecture for Data ManagementFAN - An Architecture for Data Management
FAN - An Architecture for Data Management
 
10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision10GE Challenges, Opportunities, Vision
10GE Challenges, Opportunities, Vision
 
Virtualization and WAN Optimization
Virtualization and WAN OptimizationVirtualization and WAN Optimization
Virtualization and WAN Optimization
 
The Industrialisation of Software Development
The Industrialisation of Software DevelopmentThe Industrialisation of Software Development
The Industrialisation of Software Development
 
The Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware TechnologiesThe Impact of SOA on Traditional Middleware Technologies
The Impact of SOA on Traditional Middleware Technologies
 
Software 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaSSoftware 2008: The Convergence of Open Source & SaaS
Software 2008: The Convergence of Open Source & SaaS
 
The Open Source & SaaS Revolution
The Open Source & SaaS RevolutionThe Open Source & SaaS Revolution
The Open Source & SaaS Revolution
 
Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,Sinking like a BRIC: Better Choices than Brazil, Russia,
Sinking like a BRIC: Better Choices than Brazil, Russia,
 
Lost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendorLost in Translation: Unique issues in tech vendor
Lost in Translation: Unique issues in tech vendor
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
 
Virtualized Data Centers
Virtualized Data CentersVirtualized Data Centers
Virtualized Data Centers
 
The On-Demand Project Execution Company
The On-Demand Project Execution CompanyThe On-Demand Project Execution Company
The On-Demand Project Execution Company
 
Architectures for IP Telephony Deployment
Architectures for IP Telephony DeploymentArchitectures for IP Telephony Deployment
Architectures for IP Telephony Deployment
 
Outsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software ProductsOutsourcing 3.0: India the Market and the Factory for Software Products
Outsourcing 3.0: India the Market and the Factory for Software Products
 
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
Virtualization: The Best Initiative to Alleviate the Power Crisis in the Data...
 

Secure Network Infrastructures for Unified Communications Deployments