Integration of Networking and Security School

UC: Securing the converged infrastructure

To cut costs and increase efficiency, many enterprises are combining disparate communications systems, including email, IM, video conferencing, desk and mobile telephony and voice messaging. In this lesson, learn how to properly secure this new and evolving enterprise commuications environment.

In this part:

Video: Unified communications: Securing a converged infrastructure

With so many different communications systems being combined, it can be tough to know where to start when it comes to security. In this video, John Burke explains the basics of securing this new type of infrastructure.

Tip: Unified communications infrastructure threats and defense strategies

Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing unified communications and how to defend against them.

Podcast: How to layer security within your messaging architecture

Adding security in layers is one side of securing your unified communications environment, including networks, phones, PCs and servers. Securing layers is the other side, with attention not just to the base of the network stack but also to the top, where applications rule and new attacks now roam. In this "fact or fiction" Podcast, you'll learn what parts of the infrastructure and what kinds of tools to examine as you select the best layered security toolkit to protect your company's messaging architecture.

Quiz: Securing the converged infrastructure

A five-question multiple-choice quiz to test your understanding of the content presented by expert John Burke in this lesson of SearchSecurity.com's Integration of Networking and Security School.

Take the quiz