VOIP Security Essentials. Jeff Waldron
|
|
|
- Caren O’Connor’
- 9 years ago
- Views:
Transcription
1 VOIP Security Essentials Jeff Waldron
2 Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry to the PSTN has traditionally been a protected by price, as the annual costs exceed $100,000 (USD). These two characteristics of the PSTN (closed network and very high cost of access) have established the false perception that the PSTN is a secure network. This claim is quickly discredited once someone starts to analyze the security controls, or lack of, that are available in the PSTN.
3 PSTN Trust The PSTN is comprised of thousands of interconnected network elements over dedicated circuit switched facilities that use the SS7 (Common Channel Signaling System No.7, SS7 or C7) which relies upon a model of trusted neighbors.
4 Voice Over Internet Protocol (VOIP) Voice over IP the transmission of voice over packet-switched IP networks is one of the most important emerging trends in telecommunications. VOIP introduces both security risks and opportunities. VOIP has a very different architecture than traditional circuit-based telephony, and these differences result in significant security issues. Lower cost and greater flexibility are among the promises of VOIP for the enterprise
5 VOIP Advantages Cost Savings (toll charges, PBX vendor costs, moves-addschanges) A study by The Yankee Group noted VOIP systems were 22% less expensive to operate than circuit-switched networks. Most saving is found within new site facilities only needing one copper infrastructure. Almost all organization have existing IP infrastructure. VOIP can run over wired or wireless infrastructure Mobility (routing phone numbers to dynamic IP address)
6 VOIP Disadvantages Initial start-up cost. Phone VOIP equipment (call center, gateway) Additional training for IT staff to support. Power outage. All components supporting VOIP system need UPS protection Voice Quality and QOS Requirements Network and Codecs affect voice quality Latency (acceptable delay < 150 ms) Jitter (variations in delay) Packet loss New security requirements to deal with: Denial of Service, Eavesdropping, Misuse/fraud, Impersonation Softphones
7 VOIP Security Basics Secure the VOIP gateways (or call centers) Ensure anti-virus is installed and updated/current. Configure the devices securely Apply patches Apply security settings/configurations at boundaries and devices Ensure VOIP Gateway is behind enterprise firewall Segment voice and data traffic on separate VLANS UPS is key to availability
8 VOIP Architecture PBX Replacement Vendors are no longer offering the traditional PSTN on the new offerings of PBX devices. Organizations will be forced to migrate to VOIP. Media Servers and Gateways Connect calls within VOIP system Connect calls between PSTN and VOIP End Nodes VOIP capable phones (wired or wireless) Softphones IM Clients Video Clients
9 VOIP Protocols Current VOIP systems use either a proprietary protocol, or one of two standards, H.323 and the Session Initiation Protocol (SIP). Although SIP seems to be gaining in popularity, neither of these protocols has become dominant in the market yet, so it often makes sense to incorporate components that can support both.
10 Skype With over 29 Million Skype users online at one time as of June 2006, Skype is a technology to be dealt with A peer-to-peer VOIP client Secured using 256 bit AES encryption PGP authentication
11 VOIP in the News VoIP theft nets $1M, two arrests Published: ( At least 15 Internet phone companies were hacked --one of which suffered as much as $300,000 in loses as a result of the attacks. The group sold more than ten million minutes of telephone time for as little as 0.4 cents per minute
12 VoFi [Voice-over-WiFi] While it's still very early for voice-over handsets, users and vendors alike will have to think hard about security issues -- particularly since vendors are scheduled to bring a wave of new dual-mode handsets to market, creating the potential for many more of these devices entering the workplace, often without the IT department knowing about it.
13 VOIP Security Issues There are Four main issues of VoIP security. Authentication: Is the party who answered the call the intended destination? Nonrepudiation: Once a destination accepts a call, is there anything in place that prohibits it from denying receipt of the connection? Privacy: Is the call content secure? Availability: Users expect to hear a dial tone when they pick up the phone.
14 VOIP Ready for Primetime? May not be ready for external Enterprise use depending on industry/staff knowledge. Could be used to connect branch offices/agents to a corporate headquarters. Requires a different mindset to implement within a business structure. Works well in the home environment.
15 Summary Standards are maturing and there are so many of them to choose from OK for home use. Will reduce or eliminate long-distance bills Good option for use by mobile users depending on the nature of the calls. Cell phone might still be an option.
16 Conclusion VOIP is still an emerging technology, so it is difficult to develop a complete picture of what a mature worldwide VOIP network will one day look like. As the emergence of SIP has shown, new technologies and new protocol designs have the ability to radically change VOIP.
ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.
KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Voice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
Voice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
Convergence Technologies Professional (CTP) Course 1: Data Networking
Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent
VoIP / SIP Planning and Disclosure
VoIP / SIP Planning and Disclosure Voice over internet protocol (VoIP) and session initiation protocol (SIP) technologies are the telecommunication industry s leading commodity due to its cost savings
Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream
Article VoIP Introduction Internet telephony refers to communications services voice, fax, SMS, and/or voice-messaging applications that are transported via the internet, rather than the public switched
FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction
FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction This document provides telecommunications management information for organizations that use the
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses
IP Telephony Basics Part of The Technology Overview Series for Small and Medium Businesses What is IP Telephony? IP Telephony uses the Internet Protocol (IP) to transmit voice or FAX traffic over a public
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
VoIP Resilience and Security Jim Credland
VoIP Resilience and Security Jim Credland About THUS plc Provider and user of VoIP and Soft Switch technologies Developing Enterprise Security Standards NISCC VoIP Working Group Security Considerations
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Frequently Asked Questions about Integrated Access
Frequently Asked Questions about Integrated Access Phone Service How are local, long distance, and international calls defined? Local access transport areas (LATAs) are geographical boundaries set by the
Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis
Alexandria University Institute of Graduate Studies and Research Department of Information Technology. Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat
Gateways and Their Roles
Gateways and Their Roles Understanding Gateways This topic describes the role of voice gateways and their application when connecting VoIP to traditional PSTN and telephony equipment. Analog vs. Digital
VoIP Survivor s s Guide
VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the
Alexandre Weffort Thenorio - Data. IP-Telephony
Alexandre Weffort Thenorio - Data IP-Telephony 1. Introduction... 3 2. What is it?... 4 3. Why IP-Telephony?... 4 3.1. Advantages... 4 3.1.1. Cost... 4 3.1.2. Functionality and Mobility... 4 3.2. Disadvantages...
Voice over IP Networks: Ensuring quality through proactive link management
White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity
Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing).
Introduction to IP Telephony In today s competitive marketplace, small businesses need a network infrastructure that will not only save their business money, but also enable them to be more efficient and
TAXONOMY OF TELECOM TERMS
TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe
Quality of Service Testing in the VoIP Environment
Whitepaper Quality of Service Testing in the VoIP Environment Carrying voice traffic over the Internet rather than the traditional public telephone network has revolutionized communications. Initially,
S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying
Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
PETER CUTLER SCOTT PAGE. November 15, 2011
Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic
1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
How To Make A Cell Phone Converged Into A Cell Network
MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint
Indepth Voice over IP and SIP Networking Course
Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
SAVE MONEY WITH THE RIGHT BUSINESS PHONE SYSTEM
Business Phone System & VOIP Service Buyer s Guide SAVE MONEY WITH THE RIGHT BUSINESS PHONE SYSTEM Enterprise Phone System Buyer s Guide Whether you are planning to purchase a new phone system or upgrade
Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum [email protected]
Voice Over Internet Protocol (VoIP) Issues and Challenges William McCrum Phone: +1 613-990-4493 Fax: Email: +1 613-957-8845 [email protected] Content Network Evolution and drivers VoIP Realizations
TIME-SAVING VOIP FEATURES YOUR BUSINESS NEEDS
TIME-SAVING VOIP FEATURES YOUR BUSINESS NEEDS For America's growing small businesses, the solutions offered by a VoIP phone system are worth taking noting. VoIP is widely recognized for the tremendous
Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office
Voice over Internet Protocol Kristie Prinz The Prinz Law Office I. What is Voice over Internet Protocol ( VoIP )? Voice over Internet Protocol ( VoIP ) is a technology, which facilitates the transmission
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
Voice over IP (VoIP) for Telephony. Advantages of VoIP Migration for SMBs BLACK BOX. 724-746-5500 blackbox.com
Voice over IP (VoIP) for Telephony Advantages of VoIP Migration for SMBs BLACK BOX Hybrid PBX VoIP Gateways SIP Phones Headsets 724-746-5500 blackbox.com Table of Contents Introduction...3 About Voice
Overview of Voice Over Internet Protocol
Overview of Voice Over Internet Protocol Purva R. Rajkotia, Samsung Electronics November 4,2004 Overview of Voice Over Internet Protocol Presentation Outline History of VoIP What is VoIP? Components of
Multi-layered Security Solutions for VoIP Protection
Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
IP Telephony (Voice over IP)
(Voice over IP) Instructor Ai-Chun Pang, [email protected] Office Number: 417, New building of CSIE Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements
VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.
VoIP Glossary Analog audio signals: Analog audio signals are used to transmit voice data over telephone lines. This is done by varying or modulating the frequency of sound waves to accurately reflect the
Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?
Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
Telephony Fundamentals
+ Telephony Fundamentals Basic Telephony general terms Central Office (CO) - the telephone facility where telephone users lines are joined together to switching equipment that connects telephone users
How To Implement A Cisco Vip From Scratch
Overview of Cisco VoIP Infrastructure Solution for SIP The Cisco VoIP Infrastructure Solution for SIP implements a voice-over-packet network design using SIP to provide telephony services. It lays the
Threat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.
As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched
White Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
Course 4: IP Telephony and VoIP
Course 4: IP Telephony and VoIP Telecommunications Technical Curriculum Program 3: Voice Knowledge 6/9/2009 1 Telecommunications Technical Curriculum Program 1: General Industry Knowledge Course 1: General
Security & Reliability in VoIP Solution
Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad [email protected] About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture
Three Network Technologies
Three Network Technologies Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching Internet The global public information infrastructure for data ing technique:
Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN
ENSC 427 Communication Networks Final Project Report Spring 2014 Analysis and Simulation of VoIP Team #: 2 Kadkhodayan Anita ([email protected], 301129632) Majdi Yalda ([email protected], 301137361) Namvar Darya
Contents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
Best Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
VOIP TELEPHONY: CURRENT SECURITY ISSUES
VOIP TELEPHONY: CURRENT SECURITY ISSUES Authors: Valeriu IONESCU 1, Florin SMARANDA 2, Emil SOFRON 3 Keywords: VoIP, SIP, security University of Pitesti Abstract: Session Initiation Protocol (SIP) is the
CPNI VIEWPOINT 03/2007 HOSTED VOICE OVER IP
HOSTED VOICE OVER IP AUGUST 2007 Abstract Voice over IP (VoIP) is the term used for a set of technologies that enable real time voice or video conversations to take place across IP networks. VoIP devices
Hosted PBX Platform-asa-Service. Offering
Hosted PBX Platform-asa-Service Offering Hosted PBX Platform Overview VoIP Logic s Hosted PBX Platform-as-a-Service (PaaS) delivers cloud-based PBX functionality encompassing traditional PBX features as
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
Session Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
SIP Trunking The Provider s Perspective
SIP Trunking The Provider s Perspective Presented by Pete Sandstrom, CTO BandTel Advanced SIP Session Overview 1. Open Systems Interconnection Model (OSI) is more than a model 2. Quality of Service (QoS)
Troubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week
Course Title: No. of Hours: IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week 1 Course Duration: 3 Months (12weeks) No. Of Hours: 7 Hrs./Day- 5 days/week.
Written Testimony of John L. Barnes Director of Product Development Verizon Business. Hearing on VoIP: Who Has Jurisdiction to Tax It?
Written Testimony of John L. Barnes Director of Product Development Verizon Business Hearing on VoIP: Who Has Jurisdiction to Tax It? House Committee on the Judiciary Subcommittee on Commercial and Administrative
VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. [email protected] [email protected]. Phone: +1 213 341 1431
VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this
Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document
Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general
Ingate UC-SIP Trunking Summit
Ingate UC-SIP Trunking Summit The SIP Trunking Value Proposition Marc Robins President and Managing Director, SIP Forum Copyright 2011 SIP Forum SIP Forum Background Founded in 2000 in Sweden Leading Non-Profit
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,
Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol
International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Voice Over IP and Firewalls
Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Use of Voice Over IP (VoIP) in enterprises is becoming more and more
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers.
ACD: Average Call Duration is the average duration of the calls routed bya a VoIP provider. It is a quality parameter given by the VoIP providers. API: An application programming interface (API) is a source
Threats to be considered (1) ERSTE GROUP
VoIP-Implementation Lessons Learned Philipp Schaumann Erste Group Bank AG Group IT-Security [email protected] http://sicherheitskultur.at/ Seite 1 Threats to be considered (1) Eavesdropping
Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402
Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and
SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240
SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking
Convergence: The Foundation for Unified Communications
Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing
VoIP Workbook. VoIP Workbook. Copyright 2008. Page 1
VoIP Workbook Copyright 2008 Page 1 Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording,
Internet: Telephone Calls for Free with Vo I P I 19/1. Your PC can Make Telephone Calls to Anywhere in the World for Free!
Internet: Telephone Calls for Free with Vo I P I 19/1 Your PC can Make Telephone Calls to Anywhere in the World for Free! With the information in this article you can: Try out a selection of the best free
Written by Igal Rabinovich, CEO IT Help Central. How to Successfully Select and Implement a Hosted VoIP System Page 1
How to Successfully Select and Implement a Hosted VoIP System Written by Igal Rabinovich, CEO IT Help Central How to Successfully Select and Implement a Hosted VoIP System Page 1 TABLE OF CONTENTS EXECUTIVE
SIP-ing? Pipeline Articles www.contactcenterpipeline.com
tech line / jul 2013 Time to Start SIP-ing? Can a SIP-based solution add value for your contact center? A look at the key opportunities and considerations. By Ken Barton, and Matt Morey, Strategic Contact
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
WAN Technology. Heng Sovannarith [email protected]
WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
Functional Specifications Document
Functional Specifications Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:19-10-2007
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
Subtitle. VoIP Migration Strategy. Keys to a Successful Planning and Transition. VoIP Migration Strategy Compare Business Products 2014 1
Subtitle VoIP Migration Strategy Keys to a Successful Planning and Transition VoIP Migration Strategy Compare Business Products 2014 1 Contents Introduction... 3 VoIP Defined... 3 Why Are Businesses Opting
Terms VON. VoIP LAN WAN CODEC
VON Voice Over the Net. Voice transmitted over the Internet. That is the technical definition. Prescient Worldwide s product, called VON, means Voice Over Network as in ANY network, whether a client s
Voice over IP Technologies
Voice over IP Technologies Voice Over IP Overview VoIP is an emerging technology that allows voice calls to be made over an IP network. Vendors have been pushing VoIP for a few years, but many potential
