Protecting devices connected to the UC system
Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be
Devices connected to the UC system, such as SIP user terminals (VoIP phones and FXS Media Gateways) and SIP trunk media gateways, must also be
Any UC solution must use state-of-the-art cryptographic tools to make sure that information exchanged remains secret. For TCP connections, the de facto standard is Transport
In the previous blog article (Basic and Digest Authentication Types) we have started reviewing authentication types . This time we will focus on SCRAM which
Authentication is the process in which the system identifies logged in users from unauthorized users. The effectiveness of this process is determined by the authentication
Security is a serious topic and, unfortunately, it is either overlooked, exposing organizations to risks, or incorrectly addressed through cumbersome solutions. In the series of blog