17 Reasons Why You Need an SBC
VoIP Protection Quick Facts
End of Geography
VoIP allows hackers to breach your network from anywhere, just by knowing your IP address.
Why Firewalls are Not Enough
Firewalls are designed only to protect data networks and will not completely secure your VoIP network.
The protocol used in VoIP, called SIP, is an open standard and not every ITSP or end-point follows the exact same implementation, which can cause connection and/or audio issues.
SBCs sit at the edge of the corporate network and become a control point where you can manage all your policies and security measures.
Prevent your company from losing lots of $$ by hackers accessing your phone system.
SBCs are designed to detect and block scanners out on the Internet looking for business to respond to their messages to initiate attacks.
Service providers will use an Auto-Configuration Server (ACS) as part of their overall deployment and maintenance solution to provision, configure, and maintain a large number of SBCs.
Denial of Service
A denial of service attack floods a VoIP network to prevent it from working. An SBC is designed to work around this.
Scanners out on the Internet collect information about a business’ VoIP service to later plot a concentrated attack.
Easy Web Interface
A GUI makes it very easy for anyone to configure and create a complex solution very easily.
Security Starts with a Policy
Security policies are a good defense against worms, trojans, and other malware.
Trusted and Untrusted Networks
Place an SBC at the edge of the network and define security policies there.
Peer-to-peer offers layers of security, along with SIP formatting restrictions.
Why Firewalls Cause Problems
Firewalls inherently block VoIP calls because they are unsolicited events. Poking holes to let them through opens doors for hackers.
A good way to prevent a denial of service attack is to limit the number of calls at a given time.
VoIP in the Cloud
The SBC provides many benefits and functions when moving your VoIP solution to the cloud.
SIP Header Manipulation
The SBC can accept traffic from all vendor types who may define SIP differently and automatically re-write the messages so the other ends accepts the traffic.