Effective Endpoint Security – More than Meets the Eye

By Jason Lamar One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several websites, […]

Source:: Cisco Security Notice

Effective Endpoint Security – More than Meets the Eye

By Jason Lamar One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several websites, […]

Source:: Cisco Security Notice

Guidelines and Practices for Multi-Party Vulnerability Coordination Open to Review

By Omar Santos Recent cyber attacks on organizations around the world have demonstrated the need for consistency in managing security vulnerabilities. To answer that demand, the Industry Consortium for the Advancement of Security on the Internet (ICASI) and the Forum of Incident Response and Security Teams (FIRST) created the FIRST Vulnerability Coordination Special Interest Group (SIG). This is […]

Source:: Cisco Security Notice

Guidelines and Practices for Multi-Party Vulnerability Coordination Open to Review

By Omar Santos Recent cyber attacks on organizations around the world have demonstrated the need for consistency in managing security vulnerabilities. To answer that demand, the Industry Consortium for the Advancement of Security on the Internet (ICASI) and the Forum of Incident Response and Security Teams (FIRST) created the FIRST Vulnerability Coordination Special Interest Group (SIG). This is […]

Source:: Cisco Security Notice

Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats

By Veronica Valeros This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid pace of change that is challenging us as defenders, but the scale of attacks. With the continuous flood of threats that we are facing, detection is just the first step. In […]

Source:: Cisco Security Notice

Closing One Learning Loop: Using Decision Forests to Detect Advanced Threats

By Veronica Valeros This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid pace of change that is challenging us as defenders, but the scale of attacks. With the continuous flood of threats that we are facing, detection is just the first step. In […]

Source:: Cisco Security Notice

Scoring Cisco Security Vulnerabilities with CVSSv3

By Omar Santos The Cisco Product Security Incident Response Team (PSIRT) is now scoring all security advisories addressing security vulnerabilities that affect Cisco products and multivendor vulnerability alerts using the Common Vulnerability Scoring System version 3 (CVSSv3). The stakeholders at the Forum of Incident Response and Security Teams (FIRST) have done a great job in this new version […]

Source:: Cisco Security Notice

Scoring Cisco Security Vulnerabilities with CVSSv3

By Omar Santos The Cisco Product Security Incident Response Team (PSIRT) is now scoring all security advisories addressing security vulnerabilities that affect Cisco products and multivendor vulnerability alerts using the Common Vulnerability Scoring System version 3 (CVSSv3). The stakeholders at the Forum of Incident Response and Security Teams (FIRST) have done a great job in this new version […]

Source:: Cisco Security Notice

Ausblick auf Innovaphone PBX V12r2

Ausblick auf Innovaphone PBX V12r2

Als Beta bereits verfügbar, naht die V12r2 mit großen Schritten. Das dürfen Sie in der neuen Version erwarten:

Eine der großen Neuerungen in der Version 12r2 sind die innovaphone Apps. Sie erweitern den myPBX Client um zusätzliche Funktionalitäten, die über den Unified Communications-Bereich herausgehen können. Das kann z.B. ein Kalender sein oder auch Reporting oder Voice Recording. Die innovaphone Apps werden direkt aus dem myPBX Client gestartet.

  • PBX Boolean: in dieser App können Zeitschaltungen wie z.B. „Weihnachtsferien“ oder Umleitungen gesteuert werden
  • PBX Conference: ein eigener Konferenzraum für den myPBX User. Der Konferenzmaster sieht welche Personen sich in der Konferenz befinden, kann diese bei Gefallen stummschalten oder aus der Konferenz ausschließen.
  • PBX User Settings: hier können z.B. dynamische Gruppen verwaltet werden. Der User sieht alle seine dynamischen Gruppen und kann diese per einfachem Häkchen setzen ein- oder ausschalten

Smartphone Integration – Call through
Neben Call back bietet innovaphone mit der Version 12r2 auch Call through an. Der GSM Call geht zuerst in die Anlage und wird dann nach außen weitervermittelt. Nutzer der innovaphone Apps for iOS und Android können nun selbst entscheiden, welche Variante – Call back oder Call through – sie bevorzugen.

Einfache Outlook Kontaktsuche
Als Teil der Office Integration hat innovaphone in der PBX Version 12r2 die Outlooksuche im Launcher aktiviert. Private Outlook-Kontakte können nun mit myPBX durchsucht werden.

Hyper-V Unterstützung
Dem Feature Request die IPVA auch auf anderen Virtualisierungsplattformen zu unterstützen sind wir nachgekommen. Ab 12r2 wird die IPVA auch auf Hyper-V unterstützt. Der Vorteil davon liegt darin, dass Hyper-V eine Freeware von Microsoft ist und die IPVA bei bestehender Windows-Server-Infrastruktur leicht installiert werden kann.

SDK Headset-Unterstützung
Durch das Software-Development-Kit wird die Kompatibilität von Headsets (Sennheiser, Jabra, Plantronics) mit innovaphone deutlich vereinfacht und eine flächendeckende Interoperabilität gewährleistet.

Weitere Features

  • Filter for IPv6 Interfaces
  • TURN über TCP
  • Thai Sprachunterstützung
  • myPBX Client über den Windows Launcher verwendet nun Chromium

Zum Thema Innovaphone für Sie da:

Sebastian Lutz

lutz@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

Without Necurs, Locky Struggles

By Talos Group This post authored by Nick Biasini with contributions from Jaeson Schultz Locky has been a devastating force for the last year in the spam and ransomware landscape. The Locky variant of ransomware has been responsible for huge amounts of spam messages being sent on a daily basis. The main driver behind this traffic is the […]

Source:: Cisco Security Notice