This document discusses the differing encryption solutions available for providing confidentiality in a unified communications deployment. It is important to note that the scope is not exclusive to IP voice. Rather, the guide encompasses the increasing number of other communication and collaboration mediums used by organizations, such as video and instant messaging.
The document begins with a discussion of the broad topological options before considering the different architectures that make up the potential solutions. Features and benefits of each solution are discussed, including the positioning of each solution based on typical confidentiality requirements. Finally, the guide provides a comparison of Cisco® security platforms to assist in the selection of the appropriate platform for a given solution.
Vendors (Listed Alphabetically):
Advertising Info |
Contact Us |
Submit a White Paper