Security is the last requirement (if at all) addressed in too many deployments, when it should be the first and most important topic to be discussed. When planning or implementing a VoIP solution, make security a priority.
Security breaches don’t only come from the public Internet, but may very well come from within trusted networks, in the form of worms, trojans and other malware. Although there are few malware targeting VoIP— don’t rule it out— internal breaches come from misconfiguration and unattended devices. Remember, IP networks are open—if someone knows your IP address, they can communicate with it.
An SBC has the ability to apply a tremendous amount of security policies for VoIP and IP networks. SBCs enable IT Administrators to enhance their overall security solution with a device that leads in VoIP security.
|Download this printable PDF Cheat Sheet for your reference on the powerful capabilities and features of the Session Border Controller.|