Collaboration and communication security
With persistent security risks that continue to evolve, unified communications security mechanisms -- such as end-to-end encryption, meeting access management and content sharing security -- can help safeguard business data.
New & Notable
Collaboration and communication security News
-
August 24, 2022
24
Aug'22
Apple's hybrid work plans draw worker pushback
Apple's executives say in-person collaboration is essential to the company's innovative culture. Employees have asked the company to rethink forced hybrid work.
-
June 14, 2022
14
Jun'22
Cisco links Webex to ThousandEyes internet intelligence
Integration between the Cisco Webex Control Hub and ThousandEyes lets IT administrators spot internet problems before they can affect video conferences.
-
August 02, 2019
02
Aug'19
Cisco security flaw leads to $8.6M payout in whistleblower case
The settlement resolves allegations that a Cisco security flaw left governments vulnerable to hackers for years without the company taking action.
-
May 24, 2019
24
May'19
Expanded deal with Collab9 brings Avaya cloud to governments
Avaya has expanded its partnership with Collab9 to bring Avaya cloud UC and contact center products to federal, state and local governments.
Collaboration and communication security Get Started
Bring yourself up to speed with our introductory content
-
Understanding WebRTC security architecture
WebRTC is a secure technology for real-time communications, but security also depends on the application using it. Find out how developers can maintain that security. Continue Reading
-
Where do Zoom recordings go? How to find saved recordings
Zoom meeting recordings are saved and stored on your desktop or the Zoom cloud. But your organization may have security rules that restrict meeting recordings. Continue Reading
-
parameter tampering
Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization. Continue Reading
Evaluate Collaboration and communication security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
How end-to-end encryption supports secure team collaboration
End-to-end encryption provides secure collaboration but limits certain productivity features. Learn how end-to-end encryption fits in a team collaboration security strategy. Continue Reading
-
As user ranks grow, governance of collaboration tools is a must
Even as companies evaluate more unified communications tools, they aren't keeping pace with ways to effectively govern how these applications are managed and deployed. Continue Reading
-
How secure is Zoom video conferencing?
Companies can take some simple steps to protect their Zoom meetings, but they should also consider ways to better educate their employees on how to use the software. Continue Reading
Manage Collaboration and communication security
Learn to apply best practices and optimize your operations.
-
Why organizations need to revisit end-user device policies
Now that WFH collaboration is established at many organizations, companies need to review and revise their end-user device policies to manage security and IT support. Continue Reading
-
security information management (SIM)
Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources. Continue Reading
-
3 ways to retool UC platform security architecture models
The security gap created when remote workers use unified communications to collaborate can be erased through tools designed to augment traditional security mechanisms. Continue Reading
Problem Solve Collaboration and communication security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
4 Microsoft Teams security issues and how to prevent them
As collaboration platforms become essential to everyday operations, understanding Microsoft Teams security issues is more important than ever. Continue Reading
-
Collaboration tool security: How to avoid common risks
As the use of collaborations tools and platforms surges, new research from Metrigy emphasizes organizations need to focus on collaboration tool security to reduce risk. Continue Reading
-
Video conferencing security and why it's so hard to attain
As the number of remote workers soars, video conferencing security has become a critical issue. What do you need to know about securing your conferencing platform? Continue Reading