19.07.2013 Views

Cisco Unified Contact Center Enterprise Solution Reference ...

Cisco Unified Contact Center Enterprise Solution Reference ...

Cisco Unified Contact Center Enterprise Solution Reference ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

OL-8669-05<br />

Securing <strong>Unified</strong> CCE<br />

CHAPTER<br />

<strong>Cisco</strong> <strong>Unified</strong> <strong>Contact</strong> <strong>Center</strong> <strong>Enterprise</strong> 7.x SRND<br />

7<br />

This chapter describes the importance of securing the <strong>Unified</strong> CCE solution and points to the various<br />

security resources available. It includes the following sections:<br />

Introduction to Security, page 7-1<br />

Security Layers, page 7-3<br />

Platform Differences, page 7-4<br />

Security Best Practices, page 7-5<br />

Network Firewalls, page 7-7<br />

Active Directory Deployment, page 7-9<br />

IPSec Deployment, page 7-13<br />

Host-Based Firewall, page 7-14<br />

Virus Protection, page 7-16<br />

Intrusion Prevention, page 7-17<br />

Patch Management, page 7-18<br />

Endpoint Security, page 7-20<br />

Introduction to Security<br />

Achieving <strong>Unified</strong> CCE system security requires an effective security policy that accurately defines<br />

access, connection requirements, and systems management within your contact center. Once you have a<br />

good security policy, you can use many state-of-the-art <strong>Cisco</strong> technologies and products to protect your<br />

data center resources from internal and external threats and to ensure data privacy, integrity, and system<br />

availability.<br />

<strong>Cisco</strong> has developed a set of documents with detailed design and implementation guidance for various<br />

<strong>Cisco</strong> networking solutions in order to assist enterprise customers in building an efficient, secure,<br />

reliable, and scalable data and voice network. Chief among these resources is <strong>Cisco</strong>'s secure blueprint<br />

for enterprise networks and the SAFE Blueprint portal, which may be accessed at<br />

http://www.cisco.com/go/safe<br />

The SAFE Blueprint is a flexible, dynamic blueprint for security and VPN networks, based on<br />

<strong>Cisco</strong> <strong>Unified</strong> Communications, which enables businesses to securely and successfully take advantage<br />

of e-business economies and the power of the Internet.<br />

7-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!