Community Tech-Talk series is designed to bring technical Experts from Cisco to share their insights on specific topics, selectively chosen based on most-common conversation themes on our technology area on community from our technology communities.
This Tech-Talk focuses on Understanding Cisco Unified Communications Security to help you with design, deployment, troubleshooting, and maintenance of Cisco UC solution.
I hope this has been an informative session and proves useful for understanding the intricacies behind deploying a secure Cisco Unified Communications Solution. Please do share your feedback and opinion via the comments session below.
For more insight to Cisco UC security and leading practices for designing, deploying, and maintaining a secure Cisco UC network refer to book Securing Cisco IP Telephony Networks by Cisco Press
I'm just looking for advice/direction on an odd issue I'm running into with a Cisco WebEx Room 55. I'm starting the process of registering the WebEx Room 55 (SPARK-BOARD55) in CUCM and made sure the device wasn't already regi...
Is it possible to force Cisco Phones to re-download background image file from CUCM 11.5???
I need to update company logo, so I've made a new file with the same name as old one and replaced it in TFTP. However, phones don't want to re...
Is there a way to deploy SMS & MMS to Jabber Clients, and IP Phones? Is there Text Capable DID numbers delivered by the service provider?
Most of my users will not use Jabber, because they tell me that its totally useless to them, because there...
A agent is assigned to attributes x,y.In some special occasions if the agent is assigned an additional attribute z.At that time agent should get calls only on attribute z.
If Z is removed then agent should get calls from x and y.Is ...