Applications Security
Use the questions listed in Notes/Comments" section.
Do you require encrypted communication between the Cisco IP Phones?
Do you want Cisco IP Phones and other devices to authenticate to the call-processing servers before registration?
Do all the applications have antivirus software installed?
Notes/Comments
By using the information collected in Table C-10, you should be able to design an IPT system that meets the organization's security requirements.