Secure your video conferencing system
Source: Cisco Press
To be effective, a video deployment requires multiple layers of security to protect against internal and external threats. However, some layers of the security infrastructure can interfere with video conferencing protocols and prevent those protocols from establishing a connection to endpoints in other enterprises over the public Internet. Identify security threats affecting video conferencing deployments and learn best methods for protection video communication from these attacks in this chapter download from Voice and Video Conferencing Fundamentals.
Title: Voice and Video Conferencing Fundamentals
Author: Scott Firestone, Thiya Ramalingam, Steve Fry
Publisher: Cisco Press
Chapter 8: Security Design in Conferencing
ISBN: 1-58705-268-7; Copyright 2007, Cisco Press. All rights reserved.
Used with permission from the publisher. Available from booksellers or direct from Cisco Press