ITEXPO West 2010 - Communications Conference

ITEXPO
October 4-6, 2010 Los Angeles Convention Center, CA
Share

IMPORTANT LINKS

QUESTIONS ?

Exhibit Sales Team

Conference Team

Speaker Contact

Operations Contact

TMC University
- Network Security



View More Courses:
TMC University - Microsoft OCS


View Past Graduates

Secure Voice Communications:
It's Not Small Talk

Dates/Times TBA

Are your mobile phone conversations secure? Unless you are President Obama or another high-level government official, your conversations are likely to be exposed to eavesdropping and
intercept, putting the integrity of your conversation at risk. In this
session, the speaker will cover secure voice communications
from identifying this active and global threat to exploring tools
and solutions to remediate.


Secure, Real-Time Enablement of Unified Communications

Dates/Times TBA

Enterprises are embracing VoIP and Unified Communications (UC) to increase productivity, lower communications costs and improve collaboration. While UC is being deployed as a simple, ubiquitous and cost-effective channel for communication, security and granular control of UC endpoints and control of enterprise assets are top priorities for the seamless expansion of UC. The true potential of UC applications, including IM and video cannot be realized if enterprises deploy applications in a closed network. Cost-savings, business continuity, employee mobility and other UC benefits are compelling enterprises to examine opening up their UC communications beyond the enterprise perimeter with rapid expansion of SIP remote users and SIP Trunks.

To make UC a reality, comprehensive security, enablement of WiFi/dual-mode remote phones, extension mobility, and call admission control are key requirements. This session will address:

  • Remote worker configurations, and related firewall and NAT issues
  • Voice and Data VLAN separation with layer-7 application knowledge
  • VoIP/UC-specific vulnerabilities and media anomalies that are risks in all deployments
  • Privacy issues that are magnified with road warriors accessing enterprise networks via remote Internet connections
  • Fine-grained policy enforcement based on UC network, user, device and time of day


Secure Threat Mitigation in Enterprise Telephony Environments

Dates/Times TBA

Increasingly, large enterprises in North America are moving Unified Communications (UC) applications out of the lab and into production environments. But UC's long-touted benefits aren't free. The real-time IP technologies and VoIP infrastructure elements that underlie UC provide many new inroads for criminal attackers (both inside and outside the enterprise) and unwitting bearers of malware. Further, it's clear that many current countermeasures cannot defend the new attack surfaces presented by real-time VoIP, instant messaging, video, and collaboration applications.

Failure to quash these new security threats can mean lost revenue, diminished customer loyalty, corporate brand devaluation, liability exposure, and regulatory non-compliance penalties. This session builds a risk assessment taxonomy for UC security; ranks the criticality and value of UC resources at risk; rates the reality, imminence, and success probability of various UC security attacks; and identifies specific technologies that can be deployed to deflect or mitigate the impact of those attacks on business-critical applications and networks.


Who's Listening? The Truth About Enterprise SIP Security

Dates/Times TBA

Session Initiation Protocol (SIP) has emerged as the predominant protocol for VoIP deployments. While SIP is gaining headway in the IP communications market, any new technology brings with it some inherent security challenges. In this webinar, we discuss these challenges, the misconceptions surrounding SIP Security, and examine the tools available to counter them. This session will also explore robust solutions that not only tackle security threats, but also empower businesses to proactively protect their networks from current and future attacks. Included in this webinar, we will examine the Interactive Intelligence suite of products as a communications platform case study that empowers businesses to tackle security threats while maintaining affordability and performance.


TMC University Exam

Dates/Times TBA

At the conclusion of the program, you will sit for an exam covering the course topics. Those who receive a passing grade on the exam receive TMC University's Certificate of Achievement, certifying that you have successfully completed the course and received a comprehensive education regarding IP Network Security.

Sponsored Ad

Diamond Sponsors

Platinum Sponsors

Gold Sponsors

Platinum Media Sponsors

 
   

Media Sponsors

Chinese Media Partner

           

Association Partners

 

Supporting Organizations