When it comes to deploying VoIP systems, making security a top priority can save an organization the expensive and headache of having to retrofit protection after a network is built; not to mention avoiding the pain caused by any VoIP-specific exploit. One way to ensure security is a priority from the start is to choose VoIP infrastructure products ? namely IP PBXes ? that include security measures or that integrate well with outside security offerings. The level of security that's integrated with different VoIP infrastructure products can vary greatly. "Because of VoIP's proprietary nature, the security of a Cisco VoIP system is different from one from Avaya, which is different from securing Nortel," says Lawrence Orans , a research director at Gartner. The following are just some of the questions enterprises should ask their VoIP infrastructure vendors to help them understand the level of security offered by their products: 1.) Does the vendor sell security appliances that sit in front of the IP PBX to protect voice traffic? If so, what protocols does the appliance work with? If not, is there an adequate selection of third-party security products that work with the vendor's infrastructure equipment? 2.) Is the security appliance default-configured to work with VoIP traffic? According to Orans, Nortel is the only big North American IP PBX vendor that sells a firewall preconfigured to work with VoIP traffic. "This shows a lack of maturity in the market; only one vendor has taken the steps to do it," he says. Since VoIP security expertise is still an emerging specialty, it's worth it to have the vendors do the preconfiguring for these products to work together than possibly having to hire an outside consultant to do it. 3.) Do these products also offer features such as encryption and authentication of VoIP traffic? Such features are particularly important if an enterprise is planning to run VoIP traffic across the Internet. Customers should also determine how complex configuring these features can be. 4.) Do the VoIP applications that run on these offer adequate security, such as multilevel administration features so that access to all management features aren't granted to administrators when they're not necessary? For example, an application should be able to grant one administrator rights to user management and another to dialing plans without having to expose all rights to all managers. 5.) Enterprises should ask if perspective VoIP security products work with the IETF's Session Initiation Protocol (SIP), the standard towards which many experts believe the market will eventually shift, as well as the proprietary protocol used by the vendor's IP PBX. As VoIP installations multiply across the corporate landscape, so do products aiming to secure these communications. While many of the vendors that manufacture VoIP infrastructure products sell dedicated security products as well, there is also a market of third-party security offerings designed specifically for VoIP equipment that look to add much of the same protection to voice traffic that traditional firewalls, intrusion-protection systems, and other security offerings do in the data world. Highlighted by startups with significant venture-capital funding behind them, such as Sipera Networks and Covergence, this market for third-party VoIP security products is gaining ground. Third-party VoIP security products offer features ranging from firewall protection to intrusion prevention to encryption and authentication ? all designed to heighten VoIP security to a level of enterprise acceptance. In order to ensure an organization is getting the most protection possible from its third-party VoIP security products, the following questions should be asked of any potential vendor: 1.) Which types of threats does your product protect against? Ideally an organization wants to secure itself from all of the threats known to the data world -- including spam, phishing, viruses, intrusion, information theft, and others ? as well as exploits specific to voice communications, such as eavesdropping. If multiple products are necessary to achieve this coverage, ask how well they would work together. 2.) What voice protocols does your product work support? Listen closely to the answer of this question, as protocol support can be a confusing issue in the voice world. "There are multiple flavors of SIP [the IETF's Session Initiation Protocol], so even if two companies say they support SIP, they may not interoperate," warns Mark Slaga, chief technology officer with Dimension Data, and IT services company that has installed enterprise VoIP systems and also offers security testing of existing systems. 3.)What kinds of advanced security features are offered? Encryption is emerging as a must for VoIP communications, particularly when voice traffic travels out across the open Internet. Other advanced security features include authentication; spam and virus filtering, and enabling security policies based on user, group, device, or other characteristic. 4.)How difficult is it to implement the advanced security features? If these features, particularly encryption and granular policy control, require a customer to call in VoIP security experts to configure, it's best to find that out up front.
Most Popular Reviews
- 1 Review: TCL C1 series 4K TV
- 2 Sony 75-inch UHD TV (X9400C) review: Sony and Android are a winning duo
- 3 LG 55EG960T OLED UHD TV
- 4 Panasonic Viera UHD TV review: good hardware, fragmented software
- 5 Microsoft Lumia 640 review: Honouring Nokia's legacy
Best Deals on Good Gear Guide
Latest News Articles
- Synology DS216+ Review
- Microsoft dials back Windows 10 upgrades to 2X a year
- No more passwords with Google's Trust API
- Spotify takes on Apple and Google with family plan
- How to go back to Windows 7 or 8 after an unwanted Windows 10 upgrade
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- CCAgile Coach / Agile Training ManagerNSW
- CCSenior Business Analyst - NV1VIC
- CCProgram Business AnalystVIC
- CCIBM Sterling Developer + IBM Sterling Team LeaderNSW
- CCSenior Business AnalystNSW
- FTFront End DeveloperACT
- CCBusiness Analyst, ReportingNSW
- FTProject Manager - Web ContentVIC
- CCEnd to End Project Manager - PMO and GovernanceVIC
- FTSOE SpecialistACT
- CCNV1 Consultant | Groundbreaking Defence decision support applicationACT
- CCRelease Manager, InfrastructureNSW
- CCProject Coordinator-IT Application Software Implementation BckgNSW
- CCChange manager/Change LeadNSW
- FT.NET Developer (Angular JS/ SQL)WA
- CCSenior BA - Enterprise DataNSW
- CCDigital Business Analyst (iOS & Android / Web Projects)NSW
- FTGeospatial Support AnalystQLD
- CCBusiness Intelligence (BI) AnalystQLD
- CCICT Contracts and Procurement SpecialistACT
- CCLMS Administrator and e- Learning Development Project OfficerSA
- CCIT Systems AnalystACT
- CCData Engineer (Java, Scala, Scripting, Hadoop, Spark)NSW
- CCData Engineer | Real Time StreamingNSW
- CCContract Programmer (HTML/JAVA/SQL) 160525/P/013Asia