As more companies adopt VoIP communications, network consultants, value-added resellers (VARs) and their customers will be faced with increasingly difficult network security challenges. From VoIP-specific hardware and equipment to brand new protocols, careful planning and strict policy enforcement will play significant roles in maintaining VoIP network security and protecting VoIP networks from phishing, spoofing and spamming. This tip explores this multifaceted problem.
Old security measures won't stop VoIP hackers
"As businesses have pure IP voice connections going out, there will be many more security problems," said Matthias Machowinski, enterprise voice and data directing analyst at Campbell, Calif.-based Infonetics Research. He said he envisions such bad scenes as spam that makes IP phones ring constantly, email viruses shutting down VoIP systems entirely and spoofs inundating the displays of IP phones.
IP-based voice networks require new security strategies and pose cultural issues not faced when protecting data networks. The many layers of a VoIP network each require their own security strategies. From the SIP firewall to call management and registration, each element of the network will present fresh challenges for resllers new to VoIP.
Learn more about the unique VoIP network security trials that you are bound to face as VoIP technology becomes more prevalent in the business environment.
About the author
Maxine Kincora is a technology writer in Berkeley, Calif. She can be reached at email@example.com.
This was first published in April 2007