Year: 2018

Remote IP Phone Security with SBCs

[su_row] [su_column size=”1/2″] A remote phone deployment is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, since phones register for services and change IP addresses often across multiple devices and locations. [/su_column] [su_column size=”1/2″] [/su_column] [/su_row] Remote phones require

Read More »

Remote IP Phone Security with Firewalls

[su_row] [su_column size=”1/2″] A remote phone deployment in branch offices or work-at-home employees is completely different than SIP trunking. Remote phones are dynamic in location, and require significantly more calling features. Remote phones cannot be considered as peers, as phones register for services and change IP addresses often, across multiple devices and locations. [/su_column] [su_column

Read More »

SIP Trunk Security with Session Border Controllers

[su_row] [su_column size=”1/2″] As discussed in my previous blog, SIP trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP, and is delivered over a couple of different methods using ITSPs and Managed Service Providers. [/su_column] [su_column size=”1/2″] [/su_column] [/su_row] In this blog, I’ll be addressing a Session Border

Read More »

SIP Trunk Security with Firewalls

[su_row] [su_column size=”1/2″] SIP Trunking is often a peer-to-peer connection for the primary use of delivering PSTN connectivity over VoIP. SIP Trunking is delivered over a couple of different methods: Internet Telephony Service Providers (ITSP) Deliver SIP Trunking over the Internet [/su_column] [su_column size=”1/2″] [/su_column] [/su_row] Managed Service Providers (MSP) Deliver SIP Trunking over the

Read More »

Why Security is Important with VoIP

[su_row] [su_column size=”1/2″] Security is one of the most frequently discussed topics, yet the importance of securing VoIP is hard to overstate. Over the course of the next six weeks, we’ll discuss VoIP Security specific to SIP Trunking and Remote Phone applications. Due to the growth of VoIP, it’s important to understand some of the

Read More »
Scroll to Top