top of page

VoIP Security: More Than Just IT Risk  by J Arnold & Associates   November, 2013

Enterprise networks are of a different mindset when it comes to VoIP security. Other forms of data security may be well addressed by enterprise IT, and compliance requirements have a lot to do with that.  When it comes to VoIP, however, most enterprises either lack understanding, or intentionally ignore the risk potential presented by VoIP.

 

 

Top 5 VoIP Security Myths

While the need for VoIP security is widely understood the practical implementation of security measures is in early stages. There are various reasons why VoIP security hasn’t yet become a common component of any VoIP or UC deployment. As a matter of fact we see more and more information available but much of it is unfounded and won’t necessarily improve your organization’s VoIP security posture. Only by cutting through the hype to separate reality from myth we can advance VoIP security to the next level.

 

Resources

White Papers

 

 VoIP Security: What You Don't Know Can Hurt You  by J Arnold & Associates   April, 2014

When IT thinks about security, VoIP is not usually the first thing that comes to mind. Then consider the reality that network security itself is just one of many priorities for IT to manage. We know that IT is under growing pressure to do more with less, and for all these reasons it’s not surprising that the topic of VoIP security may be difficult to get on your radar.

 

 

 VoIP Intrusion Prevention System (VIPS) and Session Border Controller (SBC) - A Comparison   April, 2014

VoIP Intrusion Prevention System (VIPS) and Session Border Control (SBC) play a rolein securing VoIP/UC infrastructure. However, they offer different security functionality andfeatures. It is important for security professionals to have a good understanding of theirspecific roles in VoIP/UC deployments.

 

 

Videos

 

Our Technical Advisor, Mike Sues demonstrates an ethical hack of a VoIP system via Heartbleed   May, 2014

Mike Sues, our Technical Advisor and Ethical Hacker, shows how VoIP communication in combination with the Heartbleed SSL bug may be used as a vehicle to gain unauthorised access to user data.

 

e-Books

 

Mike Sues explains how VoIP security is a potential 'blind spot' in your organization's wider IT security.

 

Webinars

 

Auditing VoIP Networks to Ensure Compliance Jan, 2015

In this ISACA webinar, Tyson MacAulay, CTO, Intel Security and Peter Davis, Principal, Peter Davis & Associates discuss the importance of an effective audit strategy for VoIP security.

 

bottom of page