Search This Blog

Thursday, October 25, 2007

Put your VoIP vendors on the security hot seat

Network World

Product Test and Buyer's Guide




Product Test and Buyer's Guide, 10/25/07

By Christine Burns

As part of Network World’s brand new, blown out VoIP Buyer’s Guide, Senior Editor Cara Garretson outlines nine questions you as an IT manager should ask any vendor trying to sell you VoIP security. Garretson’s buying advice addresses both the security parameters that come as part and parcel of the underlying VoIP infrastructure, as well as those pitched as the value proposition for any number of add-on VoIP security products.

The following questions should be posed to VoIP infrastructure vendors:

1.) Does the vendor sell security appliances that sit in front of the IP PBX to protect voice traffic?
2.) Is the security appliance default-configured to work with VoIP traffic?
3.) Do these products also offer features such as encryption and authentication of VoIP traffic?
4.) Do the VoIP applications that run on these VoIP platforms offer adequate security, such as multilevel administration features so that access to all management features aren’t granted to administrators when they’re not necessary?
5.) Do the security features support both the IETF’s Session Initiation Protocol (SIP), as well as the proprietary protocol used by the vendor’s IP PBX?

Case Studies, Market Trends, Peer Discussions

Network World's newly enhanced WAN Traffic Optimization Buyer's Guide has everything you need to stay current, research new technology, compare products and implement solutions - all in one convenient location. Visit now for case studies, how-to's, best practices, buying tips, peer discussions and more.

Click here to go to the Buyer's Guide now.

In order to ensure an organization is getting the most protection possible from its third-party VoIP security products, the following questions should be asked of any potential vendor:

1.) Which types of threats does your product protect against?
2.) What voice protocols does your product work support?
3.) What kinds of advanced security features are offered?
4.) How difficult is it to implement the advanced security features?

You can read Garretson’s article in full here.

MOST-READ STORIES:
1. Storm worm strikes back at security pros
2. Top 20 Firefox extensions
3. Unlimited gall to cost Verizon $1 million
4. 'Fire blogging' tech expert on the frontlines
5. Cisco's $330M buy into WiMAX
6. Ballmer disses Google on wireless plans
7. Why swearing at work is a good thing
8. ID thieves have 50% chance of going to prison
9. Wireless video transfers 100X faster than WiFi
10. Gartner's top 10 strategic technologies for 2008

MOST-DOWNLOADED PODCAST:
Twisted Pair: Rumor Mill — Who's Buying Who?


Contact the author:
Christine Burns is the Executive Editor of Testing. She can be reached at cburns@nww.com

BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: