Lotus Sametime Unified Telephony' software delivery process protects the integrity of software running on the Telephony Control server to defend against known viruses, worms, or trojans. This protection includes incorporation of standard security procedures to be applied during the production, delivery, and installation of Lotus Sametime Unified Telephony software.
Those protection mechanisms include:
Scanning of the software package for known viruses
Digitally signing the scanned software package
Delivering the scanned software package via trusted channels
Additionally, Lotus Sametime Unified Telephony respects the right of its customers to protect and monitor their networks through the installation and use of third-party application software packages designed to perform such functions. However, Lotus Sametime Unified Telephony' server-based products are designed to meet specific criteria and performance requirements that can be impacted by the installation of such software packages.
Because of this, Lotus Sametime Unified Telephony assumes no responsibility or liability for the performance of the third-party software, nor for any negative impacts caused to Lotus network elements specifically or to the network in general.
File Authentication and Integrity Protection MechanismsParent topic: Security topics
All files delivered to a service provider or customer, including third-party files, are protected by secure authentication and integrity protection mechanisms, such as digital signatures or symmetric message authentication, that assure that the files received are exactly the files that Lotus Sametime Unified Telephony produced. The installation procedure for all releases, upgrades, patches, etc., includes mechanisms to authenticate the delivered files.