The NextPlane UC Exchange policy enforcement features give organizations control over which types of traffic (IM, presence, voice, video, and file transfer) are allowed or denied across any of the federated domains and/or users (internal and/or external) within their domains.
For instance, UC Exchange can enforce a policy that allows only specific users (by SIP or XMPP address) from a federated domain to IM only with select employees within an organization, or block designated employees from communicating with select federated domains while allowing the rest of the organization to communicate and collaborate with them.
UC Exchange supports secure-SIP for federation traffic. As a result the federation traffic is encrypted end-to-end.
UC Exchange supports both XMMP over TLS and dial-back. All XMPP servers support dial-back security, and Jabber and OpenFire can be configured to use TLS as well. The combination of server dial-back and TLS provides both authentication and encryption for XMPP communication between UC Exchange and XMPP servers.
UC Exchange uses public certificates that have been signed by a certificate authority to make TLS over SIP connections to establish federation.
To join the UC Exchange, contact NextPlane today.