Secure Voic Transcription: Speech to Text with Cisco Unity Connection Voice Messages
|
|
|
- Kerry Williams
- 10 years ago
- Views:
Transcription
1 Solution Overview Secure Voic Transcription: Speech to Text with Cisco Unity Connection Voice Messages This solution overview explains how the Cisco SpeechView (speech-to-text) feature of the Cisco Unity Connection unified messaging solution handles security for voice message transcriptions. You will learn about: Security during message transport Security measures in effect with the third-party external transcription service You do not need any prior knowledge of Cisco SpeechView or the Cisco Unity Connection unified messaging solution to understand the security discussion in this paper. Cisco SpeechView Introduction Cisco SpeechView converts voice messages to text and delivers the text version of the voice message to your inbox, allowing you to read your voice messages and take immediate action. The application is a feature of the Cisco Unity Connection unified messaging solution, so the original audio version of each voice message remains available to you anywhere, anytime with Cisco Unity Connection. Cisco SpeechView transcribes and sends voice messages within minutes of being left in your Cisco Unity Connection voice mailbox - you do not need to learn any commands or take special action to receive text versions of your voice messages. You can learn more about Cisco SpeechView at Challenge Accurate voic transcription services generally require human intervention to transcribe complex voice messages because even the most powerful computers cannot accurately decipher the intricacies in the way we speak to each other in our everyday language. Therefore, many organizations seeking voic transcription are faced with a choice: use an automated service or use human assistance to improve accuracy. Often, transcription services involve sending voice messages to a third-party service, causing security concerns within most organizations around the measures in place that secure the message during transport to and from the service and protection of the message content during transcription. Business Benefits Cisco SpeechView solves these challenges and removes the trade-offs that organizations must make with typical voic transcription services. Cisco has partnered with a third-party external transcription service, SpinVox Ltd. (a subsidiary of Nuance Communications, Inc.), to provide accurate, secure transcriptions of voice messages left in Cisco Unity Connection voice mailboxes, which are then delivered to your inbox. Easy to use and secure, Cisco SpeechView improves responsiveness Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 9
2 Cisco SpeechView benefits include: You can learn who called and what they said at a glance You do not need to dial in to retrieve messages, or take notes on the message content You have nothing new to learn - your experience is the same as for regular messages Messages delivered in both audio and text formats allow you to decide the best way to manage them You can prioritize and sort both voice and messages from a single inbox Cisco SpeechView security features follow: All data that is transmitted, processed, and stored is encrypted Security measures that comply with ISO Certification and data protection and privacy protocols are applied at the physical, network, and application layers User data is kept anonymous The next sections provide details about how Cisco and SpinVox partner to provide security throughout the entire message transcription process. Initial Service Registration When Cisco SpeechView is initially configured, the Cisco Unity Connection server registers with SpinVox. Figure 1 illustrates the following process: 1. The Cisco Unity Connection server generates the Client-Private and Client-Public keys. a. Cisco and root certifications are 2048-bit RSA.g. b. SpinVox and Client keys are 1024-bit RSA. c. Client keys may be refreshed periodically by reregistering through the Cisco Unity Connection Administration GUI. 2. The Client-Public key, registration request, and voucher are packaged in a signed Secure/Multipurpose Internet Mail Extensions (S/MIME) message and delivered to SpinVox. Refer to the Outbound Request section of this document for an example of the registration request. 3. SpinVox acknowledges the message and validates the voucher. 4. When the voucher is validated by SpinVox, a registration response is sent back to the Cisco Unity Connection server. Refer to the Inbound Response section of this document for an example of the registration response. 5. When the Cisco Unity Connection server receives the response, the Cisco SpeechView feature is active and ready to begin transmission of messages to SpinVox. For specifications of the S/MIME standard, please visit the IETF RFC 3851 at Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 9
3 Figure 1. Cisco SpeechView Service Registration Outbound Request The following is an example of the XML file sent to SpinVox in the initial registration request from Cisco Unity Connection: <?xml version= 1.0?> <request> <interface-version>10</interface-version> <id> abcdefghijklmnopqrstuvwxyz</id> <registration> <registration-request> <registration-acknowledgement>true</registration-acknowledgement> <enterprise-name>acme</enterprise-name> <name>joe Bloggs</name> <contact-phone-number> </contact-phone-number> <voucher-code> abcdef </voucher-code> <language>en-us</language> <language>es-es</language> <codec>g711-a</codec> <date-timestamp>wed, 30 Jan :34: </date-timestamp> </registration-request> </registration> </request> 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 9
4 Inbound Response The following is an example of the XML file received by Cisco Unity Connection from SpinVox indicating a successful registration: <?xml version= 1.0?> <request> <interface-version>10</interface-version> <id> abcdefghijklmnopqrstuvwxyz</id> <registration> <registration-response> <response-acknowledgement>true</response-acknowledgement> <enterprise-name>acme</enterprise-name> <registration-request-id>zyxwvu9876</registration-request-id> <enterprise-identification>1725acme</enterprise-identification> <status>accepted</status> <text>activation successful</text> <language>en-us</language> <injection-address>[email protected]</injectionaddress> <codec>g711-a</codec> </registration-response> </registration> </request> Message Flow After successfully registering with SpinVox, the Cisco Unity Connection users configured for the SpeechView feature will begin to receive voice message transcriptions. All message flow to and from SpinVox uses S/MIME. The process follows: 1. A Cisco Unity Connection user receives a voice message. 2. Cisco Unity Connection packages the message and encrypts it using the SpinVox-Public key, and signs it with the Client-Private key. The following is an example of the encrypted message sent by Cisco Unity Connection to SpinVox: Encrypted Date: Wed, 30 Jan :34: Message-Id: < [email protected]> From: [email protected] To: [email protected] Subject: New message Content-Type: multipart/mixed;boundary= ---- =_NextPart_000_0001_01C7F52D.834C7D30 Content-Transfer-Encoding: 7bit =_NextPart_000_0001_01C7F52D.834C7D30 Content-Type: application/pkcs7-mime; smime-type=enveloped-data; 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 9
5 ------=_NextPart_000_0001_01C7F52D.834C7D30 Content-Type: application/pkcs7-mime; smime-type=signed-data; The following is the preceding message decrypted: Decrypted Date: Wed, 30 Jan :34: Message-Id: From: To: Subject: New message Content-Type: multipart/mixed;boundary= ---- =_NextPart_000_0001_01C7F52D.834C7D30 Content-Transfer-Encoding: 7bit This is a multi-part message in MIME format =_NextPart_000_0001_01C7F52D.834C7D30 Content-Type: audio/wav Content-Transfer-Encoding: base64 Content-Duration: 18 Content-Disposition: inline; filename= example.wav UklGRi9QAABXQVZFZm10IBQAAAAxAAEAQB8AAFkGAABBAAAAAgBAAWZhY3QEAAAAwIkBAGRhdGH =_NextPart_000_0001_01C7F52D.834C7D30 Content-Type: text/xml Content-Disposition: inline; filename= message.xml <?xml version= 1.0?> <request> <interface-version>10</interface-version> 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 9
6 <id> abcdefghijklmnopqrstuvwxyz</id> <conversion> <conversion-request> <conversion-acknowledgement>false</conversion-acknowledgement> <enterprise-identification>site1234</enterprise-identification> <message-class>voic </message-class> <audio-max-length>180</audio-max-length> <audio-offset>100</audio-offset> <confidence> <threshold>95</threshold> <low-confidence-action>0</low-confidence-action> </confidence> <user-language>en-us</user-language> <message-language>en-us</message-language> <alt-language-support>true</alt-language-support> <priority>1</priority> <text-max-length>500</text-max-length> <result-case>proper</result-case> <return-audio>false</return-audio> <source-device>cell</source-device> <user-information> <calling-party>k8mnjkdngbnhars0mvhpca0ct</calling-party> <called-party>akszikcyj0yu0oaeakszikcyj</called-party> </user-information> </conversion-request> </conversion> </request> =_NextPart_000_0001_01C7F52D.834C7D The message is transcribed and returned to the Cisco Unity Connection server encrypted with the Client- Public key, and signed with the SpinVox-Private key. The following is an example of the encrypted response followed by the same message decrypted: Encrypted Date: Wed, 30 Jan :34: Message-Id: From: To: Subject: New message Content-Type: multipart/mixed;boundary= ---- =_NextPart_000_0001_01C7F52D.834C7D30 Content-Transfer-Encoding: 7bit 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 9
7 ------=_NextPart_000_0001_01C7F52D.834C7D30 Content-Type: application/pkcs7-mime; smime-type=enveloped-data; =_NextPart_000_0001_01C7F52D.834C7D30 Content-Type: application/pkcs7-mime; smime-type=signed-data; Decrypted Date: Wed, 30 Jan :34: Message-Id: From: To: Subject: New message Content-Type: multipart/mixed;boundary= ---- =_NextPart_000_0001_01C7F52D.834C7D30 Content-Transfer-Encoding: 7bit This is a multi-part message in MIME format =_NextPart_000_0001_01C7F52D.834C7D30 Content-Type: text/xml Content-Disposition: inline; filename= message.xml <?xml version= 1.0?> <request> <interface-response>1.0.1</interface-response> <id> abcdefghijklmnopqrstuvwxyz</id> <conversion> <conversion-response> <response-acknowledgement>false</response-acknowledgement> <enterprise-identification>site1234</enterprise-identification> is the converted text </text> <count> </count> <word>5</word> <character>26</character> <user-information> <calling-party>k8mnjkdngbnhars0mvhpca0ct</calling-party> <called-party>akszikcyj0yu0oaeakszikcyj</called-party> </user-information> <scrid> xxxxxxxx </scrid> <text> This 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 9
8 <status-code>1</status-code> <status-description>converted</status-description> </conversion-response> </conversion> </request> =_NextPart_000_0001_01C7F52D.834C7D When the message is returned to the Cisco Unity Connection server, it is deleted from SpinVox s databases within 48 hours. Message Processing A message arriving at SpinVox is flagged for automated transcription, and the following steps occur in the transcription: 1. Audio is processed and transcription is performed by the machine. 2. Transcription is written to the SpinVox database. 3. The message is returned to the Cisco Unity Connection server. 4. Data is deleted from the SpinVox database within 48 hours. The data is kept for 48 hours to allow time for troubleshooting, if necessary. Agent Security information Numerous security policies are in place to govern the transcription process at SpinVox: Audio stays on the central processing system Facilities undergo a rigorous selection process and are subject to regular security audits Nuance and SpinVox personnel: Are screened, tested, and vetted Undergo security, privacy, and compliance training Sign nondisclosure and confidentiality agreements with SpinVox PC hardware at quality-control facilities: Is hardened as per generally accepted industry best practices Has only essential programs and services enabled Has working files flushed after use Has Cut, Copy, and Paste functions disabled Has controlled Internet access The security measures in place for the Cisco SpeechView solution should satisfy any organization s concerns about sending voice messages outside of the company firewall in order to use a third-party external transcription service. Cisco has worked closely with SpinVox to help ensure that security is a priority throughout every step of the transcription process. As a result, Cisco SpeechView offers our Cisco Unity Connection customers an accurate, secure, and easy-to-use speech-to-text solution. For more information about Cisco SpeechView, please visit Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 9
9 Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 9
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Unity Error Message: Your voicemail box is almost full
Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from
4.1: Securing Applications Remote Login: Secure Shell (SSH) E-Mail: PEM/PGP. Chapter 5: Security Concepts for Networks
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.1:
Internet Technology 2/13/2013
Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Electronic Mail Security
Electronic Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
File Transfer Service (Batch SOAP) User Guide. A Guide to Submitting batches through emedny FTS
File Transfer Service (Batch SOAP) User Guide A Guide to Submitting batches through emedny FTS June 1, 2013 TABLE OF CONTENTS TABLE OF CONTENTS 1 Introduction... 4 2 Requirements... 5 2.1 Exchange mailboxes...
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Hosted Fax Mail. Hosted Fax Mail. User Guide
Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages
6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...
FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2
Electronic Service Agent TM. Network and Transmission Security And Information Privacy
Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Voicemail Plus User Guide
Voicemail Plus User Guide Version: 2.0_US Revised: 25 September 2007 Notices Copyright 2007 Vonage. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used
Technical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
BUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
Pre-configured AS2 Host Quick-Start Guide
Pre-configured AS2 Host Quick-Start Guide Document Version 2.2, October 19, 2004 Copyright 2004 Cleo Communications Refer to the Cleo website at http://www.cleo.com/products/lexihubs.asp for the current
Fax and Oracle Collaboration Suite. An Oracle White Paper August 2005
Fax and Oracle Collaboration Suite An Oracle White Paper August 2005 Fax and Oracle Collaboration Suite Introduction... 3 Fax Support in Oracle Collaboration Suite... 4 Outbound Fax Configuration... 7
Dragon Solutions Transcription Workflow
Solutions Transcription Workflow summary Improving Transcription and Workflow Efficiency Law firms have traditionally relied on expensive paralegals, legal secretaries, or outside services to transcribe
Unity Express Voice Mail Transfer Behavior
Unity Express Voice Mail Transfer Behavior Document ID: 97825 Contents Introduction Prerequisites Requirements Components Used Conventions Problem 1 Calls Transfer to Reception Solution 1 Transfer to AutoAttendant
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
GFI White Paper: GFI FaxMaker and HIPAA compliance
GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax
GlobalPhone Voice to Text User Guide
GlobalPhone Voice to Text User Guide Welcome to GlobalPhone Voice to Text Voice to Text service allows voicemails at your office, mobile, or home to be converted into emails that can easily be displayed
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Avaya IP Office Unified Communications for Small Business
Avaya IP Office Unified Communications for Small Business Unified Communications for Small Business is a suite of applications that: Turns a home phone into an IP Office telephone with the Phone Manager
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
Introducing Cisco Unified Communications Express
CHAPTER 1 Introducing Cisco Unified Communications Express Cisco Unified Communications Express is an award-winning communications solution that is provided with the Cisco Integrated Services Router portfolio.
alternative solutions, including: STRONG SECURITY for managing these security concerns. PLATFORM CHOICE LOW TOTAL COST OF OWNERSHIP
9.0 Welcome to FirstClass 9.0, the latest and most powerful version of the one of the industry s leading solutions for communication, collaboration, content management, and online networking. This document
Unified Messaging and Fax
April 25, 2007 Telecom White Paper Presented By: Toshiba Telecommunications Systems Division www.telecom.toshiba.com Unified Messaging and Fax Toshiba s Stratagy Enterprise Server Overview: Unified Messaging
AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010
AS2 Disaster Recovery Implementation Guide Issue 1, Approved, 18-Nov-2010 18-Nov-2010, Issue 1 All contents copyright GS1 Page 1 of 19 Document Summary Document Item Document Title Date Last Modified Current
Cisco Unified MobilityManager Version 1.2
Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.1, Release 1.2 The Cisco Unified Communications system of voice and IP communications products and applications enables
NuPoint Unified Messaging
MITEL NuPoint Unified Messaging User Guide Release 5.0 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks Corporation (MITEL
Move Your Transcription Business From Tape to Digital A How-To Guide From My Docs Online
Move Your Transcription Business From Tape to Digital A How-To Guide From My Docs Online My Docs Online, Inc. 9148 Bonita Beach Road Suite 201 Bonita Springs, FL 34109 239.495.1181 888.686.1181 www.mydocsonline.com
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
VoIP CONFIGURATION GUIDE FOR MULTI-LOCATION NETWORKS
VoIP CONFIGURATION GUIDE FOR MULTI-LOCATION NETWORKS INTRODUCTION About this guide This guide is designed to help you plan and configure a TalkSwitch multi-location network for Voice over IP (VoIP). NOTE:
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Achieve more with less
Energy reduction Fax Server Integrations: Exchange 2010 UM - Benefits and configuration - Guide Achieve more with less Send and Receive Faxes with Outlook Faxing Support Active Directory Synchronization
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Getting Started with Exchange Unified Messaging
Getting Started with Exchange Unified Messaging Welcome to Exchange Unified Messaging. This system will replace Clark s existing voice mail system and provide additional functionality. Microsoft Exchange
Prof. Sead Muftic Feng Zhang. Lecture 10: Secure E-mail Systems
Prof. Sead Muftic Feng Zhang Lecture 10: Secure E-mail Systems Lecture 10 : Secure E mail Systems Subjects / Topics : 1. Secure E mail systems 2. Secure, Trusted, Authorized and Reliable E Mail System
A Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
Microsoft Exchange Server 2007, Upgrade from Exchange 2000/2003 (3938. 3938/5049/5050) Course KC3065 5 Days OVERVIEW COURSE OBJECTIVES AUDIENCE
Microsoft Exchange, Upgrade from Exchange 2000/2003 COURSE OVERVIEW This instructor-led course offers Microsoft Exchange Server administrators with the skills they need to manage a Microsoft Exchange infrastructure.
Getting Started with UM
Getting Started with UM PREFACE Welcome to Exchange Unified Messaging. This system will replace the legacy voice mail system and provide additional functionality. Our Exchange Servers will provide voice
APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices
Data Sheet Cisco IronPort C370 for Medium-Sized Enterprises and Satellite Offices Medium-sized enterprises face the same daunting challenges as the Fortune 500 and Global 2000 - higher mail volumes and
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
BlackBerry Mobile Voice System
BlackBerry Mobile Voice System Mobile Unified Communications BlackBerry Mobile Voice System (BlackBerry MVS) brings desk phone features to BlackBerry smartphones. Work with one business number at the office
Dragon Solutions Enterprise Profile Management
Dragon Solutions Enterprise Profile Management summary Simplifying System Administration and Profile Management for Enterprise Dragon Deployments In a distributed enterprise, IT professionals are responsible
Print Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
Chapter 6: Send and Receive Instant Messages
Microsoft Office Communicator 2007 Getting Started Guide 33 Chapter 6: Send and Receive Instant Messages With Communicator, you can start an instant messaging session with a single contact or multiple
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
The Cisco Smart Business Communications System
The Cisco Smart Business Communications System Connect Your Employees to Suppliers and Customers, and Your Business to the World. For a small business like yours to communicate effectively with suppliers
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
Plans Comparison. 855.900.KUMO (5866) [email protected]. [email protected] www.joinkumo.com 855.900.KUMO
Plans Comparison 855.900.KUMO (5866) [email protected] Page 1 of 5 Elevate your business with scalable solutions and accessible services in the cloud. ON-DEMAND FLEXIBILITY Fully On-Demand Cloud Services
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
Sending MIME Messages in LISTSERV DISTRIBUTE Jobs
Whitepaper Sending MIME Messages in LISTSERV DISTRIBUTE Jobs August 25, 2010 Copyright 2010 L-Soft international, Inc. Information in this document is subject to change without notice. Companies, names,
EMC CLARiiON Secure Remote Support Solutions Technical Notes P/N 300-006-009 REV A03 October 5, 2010
EMC CLARiiON Secure Remote Support Solutions Technical Notes P/N 300-006-009 REV A03 October 5, 2010 This technical note discusses the benefits, value, and implementation of EMC Secure Remote Support solutions
What s New in Exchange 2010?
What s New in Exchange 2010? A quick guide to the most significant changes you will see when your account is migrated to Exchange 2010 The Top 10 Changes in Exchange 2010..2 Email Retention and Archives..3
Electronic mail security. MHS (Message Handling System)
Electronic mail security Diana Berbecaru < diana.berbecaru @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MS MS MUA MUA (Message Transfer ) MS (Message Store)
Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program
for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
Spambrella Email Archiving Service Guide Service Guide
April 4, 2013 Spambrella Email Archiving Service Guide Service Guide Spambrella and/or other noted Spambrella related products contained herein are registered trademarks or trademarks of Spambrella and/or
Voice Messaging. Reference Guide
Voice Messaging Reference Guide Table of Contents Voice Messaging 1 Getting Started 3 To Play a Message 4 To Answer a Message 5 To Make a Message 6 To Give a Message 7 Message Addressing Options 8 User
Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations
Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support
White Paper UC for Business - Fax Messaging
UC for Business - Fax Messaging NEC Australia nec.com.au Table of Contents Introduction...3 Overview...3 Unified Messaging...3 Paperless Fax...3 Business Drivers...3 User Benefits...3 Administrator Benefits...4
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
Introduction to HIPAA Compliance Checklist:
Introduction to HIPAA Compliance Checklist: HIPAA Compliance Checklist The following is a comprehensive HIPAA Compliance Checklist created to provide guidance to treatment providers utilizing voice and
Telesystem Visual Voicemail Android User Guide
Telesystem Visual Voicemail Android User Guide Visual Voicemail - Android The Visual Voicemail app allows you to listen/delete/read your messages 1 from your Android device. Before downloading the app
Corepoint Community Exchange Features and Value - Overview
Corepoint Community Exchange Features and - Overview Connect Quickly to EMRs Use CareAgent at remote locations to easily retrieve and send patient data, rapidly expanding your points of care network. Corepoint
Using Avaya Aura Messaging
Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the
Balamaruthu Mani. Supervisor: Professor Barak A. Pearlmutter
Balamaruthu Mani Supervisor: Professor Barak A. Pearlmutter Plain email text Mail Server Mail Server Encrypted on transfer Encrypted on transfer Sender Email Communication Encryption over network Recipient
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
IP Office - Voice Communications Capabilities
IP Office - Voice Communications Capabilities IP Office offers full voice functionality with a comprehensive list of features and benefits for the small and mid-sized business and branch office, including:
Cisco Unity Express 8.5 Voice-Mail System User s Guide for Advanced Features
Cisco Unity Express 8.5 Voice-Mail System User s Guide for Advanced Features First Published: January 18, 2011 This guide provides information about using some of the advanced voice-mail features of your
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Cisco IP Communications Express: Cisco Unified Callmanager Express with Cisco Unity Express
Cisco IP Communications Express: Callmanager Express with Cisco Unity Express Cost-Effective IP Communications Solution for the Small Office Cisco Unified CallManager Express provides call processing for
1 Introduction 10 1.1 About 10 1.2 How GFI FaxMaker works - Sending faxes 11 1.3 How GFI FaxMaker works - Receiving faxes 12
Administrator Guide Find out how you can manage and customize GFI FaxMaker. Tweak settings according to your requirements and troubleshoot any issues encountered. The information and content in this document
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition Open Text Fax and Document Distribution Group October 2009 2 White Paper Contents Introduction...3 Who Should
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Cisco Unity Connection Voicemail User Guide:
Cisco Unity Connection Voicemail User Guide: Your Unity Voicemail Mailbox The Cisco Unity Connection Voicemail system provides each user a Voicemail Box. Messages in your Voicemail Box are not stored indefinitely.
E Mail Encryption End User Guide
E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Implementing Cisco IOS Telephony and Unified Communications Express (IITUCX)
Implementing Cisco IOS Telephony and Unified Communications Express (IITUCX) Course Objectives Explain the benefits and components of a Cisco Unified Communications system Describe how traditional telephony
