Security Implications for Your Unified Communications

Leveraging Session Initiation Protocol (SIP) technology truly changes the way we think about communications these days. With SIP, unified communication (UC) applications become just another “data application” and without appropriate security measures in place, networks could be opened to bad actors exposing the business, technology, privacy and compliance to new attack threats. Unfortunately, ‘bad guys’ Read more about Security Implications for Your Unified Communications[…]

Thank you for letting me hacking your PBX/UC network!

Brute force attack against voice systems is a real, and growing, problem. In a denial-of-service (DoS) attack, the goal is to make a resource unavailable to its intended users, usually in a temporary interruption or suspension of services. DoS attacks are well known in data systems and networks, but can also happen to a telecom Read more about Thank you for letting me hacking your PBX/UC network![…]

Understanding the Key Differences between ESBCs and Firewalls?

Are you looking to secure VoIP networks against security attacks without compromising call quality in the process? As customers migrate to IP PBXs and unified communications (UC) solutions, understanding the differences between enterprise session border controllers (E-SBCs) and firewalls is critical to avoiding the conflicts that can arise between the two. What are E-SBCs and Read more about Understanding the Key Differences between ESBCs and Firewalls?[…]

How to prevent vulnerabilities threaten VoIP deployments

Data breaches can bring businesses to their knees – disrupting services and tarnishing the reputations of brands. VoIP services aren’t immune to data theft. Just last year, a breach at Secures Technologies compromised 70 million records across 37 states. The company provides phone services to prisons, and the breach raised privacy concerns because it affected Read more about How to prevent vulnerabilities threaten VoIP deployments[…]

How Session Border Controllers help secure contact centers – and create efficiencies.

As contact centers continue to adopt IP-based communications of various sorts, including voice and other unified communications applications, it opens up organizations to a host of security threats that need to be addressed. To a would-be intruder, an IP-based contact center represents opportunity – a whole slew of IP-based ports through which they may gain Read more about How Session Border Controllers help secure contact centers – and create efficiencies.[…]