When it comes to VoIP and unified communications, are you sacrificing security for cost savings?

By Dave Martin, vice president of marketing, Edgewater Networks, Network World |  Unified Communications, voip

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

If you were to ask most IT professionals to connect CRM or ERP applications to an external IP network without some form of network security, they would look at you as if you had lost your mind. Even the most basic cloud-based business applications integrate security to help ensure the integrity of data and continuity of the service. Yet many organizations today are deploying business critical IP-based voice and video communications without applying standard corporate security policies.

For a variety of reasons, IP-based voice is treated differently. This traffic is generally not perceived as a substantial security risk, mostly due to decades' worth of experience using the TDM-based public switched telephony network (PSTN). These "walled gardens" are generally perceived as among the most trusted networks in the world, supporting millions of business users daily in the U.S. alone.

OUTLOOK: Top UC predictions for 2013

However, as businesses migrate away from traditional PSTN telephony toward more affordable and feature-rich IP telephony and unified communications, security concerns should rise to the top of the list. Once-private business conversations can now be carried over multiple service provider networks as well as public Internet backbones, where security can be nonexistent for voice and video traffic or inconsistent and disjointed end to end.

Let's review some of the challenges related to securing unified communications traffic and the solution selection criteria that can result in a secure, enterprise-class deployment suitable for headquarters, branch offices and remote or mobile workers.

Resolving conflicts at the gateway


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Unified CommunicationsWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question