Unify V3R3 Specifications Page 6

  • Download
  • Add to my manuals
  • Print
  • Page
    / 44
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 5
Introduction
A31003-D3000-P100-01-76A9, 10-2013
6 OpenStage and Desk Phone IP SIP V3, Security Checklist, Planning Guide
Security Strategy for Unify Products
During installation/setup of the solution
During operation
During installation and during major enhancements or software
upgrade activities:
The Customer specific Product Security Checklists are used by a technician
to apply and/or control the security settings of every individual product.
Figure: Usage of Security Checklists (SCL)
Update and Feedback
By their nature, security-relevant topics are prone to continuous changes and
updates. New findings, corrections and enhancements of this checklist are
being included as soon as possible.
Therefore, we recommend using always the latest version of the Security
Checklists of the products that are part of your solution.
They can be retrieved from the Unify partner portal http://www.unify.com/us/
partners/partner-portal.aspx for the entire product .
We encourage you to provide feedback in any cases of unclarity, or problems
with the application of this checklist.
Please contact the Openscape Baseline Security Office (obso@unify.com).
Related Topics
1.3 Security Strategy for Unify Products
Reliability and security is a key requirement for all products, services and
solutions delivered by Unify. This requirement is supported by a comprehensive
security software development lifecycle that applies to all new products or product
versions being developed from design phase until end of life of the product.
Page view 5
1 2 3 4 5 6 7 8 9 10 11 ... 43 44

Comments to this Manuals

No comments