UC Security Problems You Haven’t Thought Of… But Should
Location: Sun C
Date: Monday, March 12
Time: 8:00am - 8:45am
Pass type: Entire Event - Get your pass now!
Track: Unified Communications & Collaboration
Hot Topic: Security/Compliance
Vault Recording: TBD
Without proper oversight, communications tools can become a weak link in an enterprise security plan. In this session, learn about the latest challenges and the best ways to stay ahead of the risks.
In this era of blistering fast change and a hyper-connected reality, communications tools are everywhere -- on mobile devices, software-based desk phones, laptops, and more. Options have exploded, with team collaboration, video, chat, file sharing, and integration with other enterprise applications. Devices -- be they corporate or employee owned and managed -- are connecting on internal and external networks. Likewise, applications and communications platforms may be hosted within the enterprise or in the cloud, out of IT’s direct control. These all significantly expand the security attack surface, creating new challenges for enterprises.
In the past, organizations could manage communications (and security) by controlling the endpoints and the connectivity, but additional measures are now required. Are Two-Factor Authentication (2FA), Unified Endpoint Management (UEM), Next Generation Firewalls (NGFW), and Session Border Controllers (SBC) the answers, or is building zero trust networks and systems required for communications?
All companies must address cybersecurity. They can't hide their heads in the sand and let the risk continue to grow. In this session, gain insight into the challenges, and discover some ways to manage these real UC security risks.
* As UC&C implementations continue to shift from the premises into hybrid or all-cloud deployments, what changes must organizations make in their security architectures?
* What are the security risks associated with integrating communications into CRM and other line-of-business applications?
* Which traditional security technologies still apply in this new world of communications everywhere, and which don't?
*What are some new techniques to consider for securing communications?
* What are some of the newest threats and potential gotchas, and best ways to protect against them?