Security Implications for Your Unified Communications

Leveraging Session Initiation Protocol (SIP) technology truly changes the way we think about communications these days. With SIP, unified communication (UC) applications become just another “data application” and without appropriate security measures in place, networks could be opened to bad actors exposing the business, technology, privacy and compliance to new attack threats. Unfortunately, ‘bad guys’ Read more about Security Implications for Your Unified Communications[…]

Thank you for letting me hacking your PBX/UC network!

Brute force attack against voice systems is a real, and growing, problem. In a denial-of-service (DoS) attack, the goal is to make a resource unavailable to its intended users, usually in a temporary interruption or suspension of services. DoS attacks are well known in data systems and networks, but can also happen to a telecom Read more about Thank you for letting me hacking your PBX/UC network![…]

Understanding the Key Differences between ESBCs and Firewalls?

Are you looking to secure VoIP networks against security attacks without compromising call quality in the process? As customers migrate to IP PBXs and unified communications (UC) solutions, understanding the differences between enterprise session border controllers (E-SBCs) and firewalls is critical to avoiding the conflicts that can arise between the two. What are E-SBCs and Read more about Understanding the Key Differences between ESBCs and Firewalls?[…]

How to prevent vulnerabilities threaten VoIP deployments

Data breaches can bring businesses to their knees – disrupting services and tarnishing the reputations of brands. VoIP services aren’t immune to data theft. Just last year, a breach at Secures Technologies compromised 70 million records across 37 states. The company provides phone services to prisons, and the breach raised privacy concerns because it affected Read more about How to prevent vulnerabilities threaten VoIP deployments[…]

How Session Border Controllers help secure contact centers – and create efficiencies.

As contact centers continue to adopt IP-based communications of various sorts, including voice and other unified communications applications, it opens up organizations to a host of security threats that need to be addressed. To a would-be intruder, an IP-based contact center represents opportunity – a whole slew of IP-based ports through which they may gain Read more about How Session Border Controllers help secure contact centers – and create efficiencies.[…]

Designing Networks for Unified Communications

Many networks are designed for data traffic. Real-time traffic like voice and video add new requirements for network design, operation, and troubleshooting. Was your network designed for data traffic and then modified to handle UC&C traffic? If so, you’re not alone. Most networks are primarily designed for data. Support for real-time traffic like voice, video, Read more about Designing Networks for Unified Communications[…]

VoIP Hacking—What’s in it for the Attacker?

With so many high profile data breaches making the headlines, it’s easy to forget that IP Communications systems are routinely targeted for attack. While it may be clear what the criminals were looking for when they stole credit card data or government employee data, it may not be as obvious as to why hackers are Read more about VoIP Hacking—What’s in it for the Attacker?[…]

5 Steps To SIP Network Security

Last weekend I read this interesting article of Kevin Riley (Sonus’ Vice President of Engineering and Chief Technology Officer) about SIP security. ################################ With network-based attacks on the rise, enterprises need to rethink their unified communications security strategy. Toll fraud and data breaches cause billions of dollars in damages to businesses each year, and the losses Read more about 5 Steps To SIP Network Security[…]

How the button bar in SecureCRT can help

A lot of people use SecureCRT as default telnet/ssh program. The developers of SecureCRT has built in some usefull tricks that helps you to automate your work. An example is the Button Bar.   View/Hide the Button Bar SecureCRT’s button bar is a customizable row of buttons you can use for quick access to saved Read more about How the button bar in SecureCRT can help[…]

Howto create SIP resiliency through HA SBCs

This week I read an interesting blog/article about creating SIP resiliency with the use of high-availability Session Border Controllers (SBCs). The blog which I like to share is by Andrew Prokop. It’s important to understand how high availability session border controllers are enabled, and more importantly, under what conditions failover rules are invoked. Any subject Read more about Howto create SIP resiliency through HA SBCs[…]