Author: Mac McCarver – Content Marketing Specialist In a previous blog, we described the concept and purpose of a session border controller (SBC). An SBC ensures the security of a PBX network. But implementing an SBC into a network does not necessarily replace the utility of firewalls. A properly configured VoIP firewall still constitutes a […]
Read MoreSession Border Controllers – The Standard for VoIP Security
Author: Mac McCarver – Content Marketing Specialist In the Unified Communications (UC) market, you hear a lot about the future because Voice over IP (VoIP) is the direction communication is headed. It wasn’t too long ago that the FCC was conducting experiments in rapidly transitioning entire communities from PSTN lines to VoIP telephone service. In […]
Read MoreRemote IP Phone Security Using VPN
Author: Scott Beer – Director, Solutions Engineering, Sangoma Using VPN (IP-Sec) is a completely different way to provide a secure VoIP solution. Using already well-established encryption tunnel technologies, a secure tunnel is created between the remote phone and the IP‑PBX. In this example, the IP‑PBX resides behind a typical network firewall. The firewall is the […]
Read MoreRemote IP Phone Security with SBCs
Author: Scott Beer – Director, Solutions Engineering, Sangoma A remote phone deployment is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, since phones register for services and change IP addresses often across multiple devices and locations. Remote phones require […]
Read MoreRemote IP Phone Security with Firewalls
Author: Scott Beer – Director, Solutions Engineering, Sangoma A remote phone deployment in branch offices or work-at-home employees is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, as phones register for services and change IP addresses often, across multiple […]
Read MoreThe Unique Role of the Service Provider with a Smart Home
Author: Jim Machi – General Manager CCD, Sangoma In my previous blog, I mentioned that a smart home is a complicated place today. There are a myriad number of systems that are available to add to a wireless network. You’re still at the mercy of your Wi-Fi range. A service provider could tie all of […]
Read MoreSIP Trunk Security with Session Border Controllers
Author: Scott Beer – Director, Solutions Engineering, Sangoma As discussed in my previous blog, SIP trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP, and is delivered over a couple of different methods using ITSPs and Managed Service Providers. In this blog, I’ll be addressing a Session Border […]
Read MoreThe Smart Home, the Service Provider & Connectivity
Author: Jim Machi – General Manager CCD, Sangoma The smart home market is important to consumers for many reasons – energy savings, additional security and improved quality of life to name a few. But these benefits do not come for free, in fact according to a GSMA whitepaper, consumers globally will be spending as much […]
Read MoreSIP Trunk Security with Firewalls
Author: Scott Beer – Director, Solutions Engineering, Sangoma SIP Trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP. SIP Trunking is delivered over a couple of different methods: Internet Telephony Service Providers (ITSP) Deliver SIP Trunking over the Internet Managed Service Providers (MSP) Deliver SIP Trunking over the […]
Read MoreWhy Security is Important with VoIP
Author: Scott Beer – Director, Solutions Engineering, Sangoma Security is one of the most frequently discussed topics, yet the importance of securing VoIP is hard to overstate. Over the course of the next six weeks, we’ll discuss VoIP Security specific to SIP Trunking and Remote Phone applications. Due to the growth of VoIP, it’s important […]
Read More- 1
- 2