Secure Unified Communications
Kevin Flynn speaks with Rob Boyd of TechWiseTV about securing a voice network. (Audio - 8:00 min)
Connect and Collaborate Securely
Confidential information passes through your data, voice, video, and mobile applications, across both fixed and mobile networks. Such data should be:
- Protected against theft or interception
- Inspected to help ensure that it complies with policy
With Cisco secure unified communications solutions, people in any campus, branch, or remote workspace can securely connect and collaborate across a wide array of communications applications. These solutions integrate a comprehensive security strategy with a unified communications network to protect data and resources.
Design and Deploy a Secure Solution
Proper design, configuration, and implementation of a secure unified communications solution all require a wide range of technical expertise. To help your organization with this process, subject matter experts throughout Cisco have assembled guides that cover:
- Design issues
- Security best practices
Cisco Unified Communications Solutions Reference Network Design Guide
The official Cisco Unified Communications Manager security design guide provides recommendations based on extensive testing.
Cisco Unified CallManager Express Security Best Practices
The official design guide for securing Cisco Unified Communications Manager Express deployments.
Securing Unified Contact Center Enterprise
Get design guidance for securing Cisco Intelligent Contact Management and IP Contact Center Enterprise and Hosted editions.
Cisco Unified Communications Manager Security Guide
Access detailed configuration instructions for Cisco Unified Communications Manager, Cisco phones, gateways, and Cisco Unified Communications applications.
Cisco Unified Call Manager Express Security Configuration Guide
Access detailed configuration instructions for Cisco Unified Call Manager Express security.
Cisco Unity Server Security Configuration Guide
Access detailed configuration instructions for securing Cisco Unity Servers and the operating system.
Gain an In-Depth Defense with Secure Unified Communications
Cisco provides a range of secure unified communications platforms, products, and solutions, to augment the security services already available within Cisco Unified Communications Manager.
Adaptive Security Appliances
Protect your small business or remote office with the Cisco ASA 5505 Series (Video - 4:51 min) Secure real-time unified communications applications such as voice and video.
Cisco ASA 5500 for Secure Unified Communications
For more information on the ASA 5500 Series Adaptive Security Appliances, see:
Choose from among three options for firewall technology:
- Unified Communications Trusted Firewall
- IOS Firewall
- Firewall Services Module
Control the flow of calls in the network and facilitate secure voice and video communications with Cisco Unified Communications Trusted Firewall (Video - 5:26 min). Protect against threats such as toll fraud and denial of service attacks.
Cisco Unified Communications Trusted Firewall
Integrate industry-certified firewall functions with Cisco IOS Firewall. (Video - 4:16 min)
Cisco IOS Firewall
Cisco Firewall Services Module for Secure Unified Communications
This high-speed, integrated firewall module for Cisco Catalyst 6500 switches and Cisco 7600 Series routers provides the fastest firewall data rates in the industry.
For more information on firewalls, see:
Security That Powers Your Success
As you deploy secure unified communications more widely, you'll need to enhance your existing security technology. Secure unified communications protocols and applications have unique requirements which are being addressed by security vendors.
The following documents can help you understand new security technologies and enhancements, and the differences between various Cisco security platforms, products, and solutions.
- Unified Communications Firewall Positioning Guide
- Unified Communications Encryption and Confidentiality Positioning Guide
- Transport Layer Security Proxy and Phone Proxy Comparison