dcsimg
 

Extreme Sets Out Rules to Secure VOIP

By Paula Musich  |  Print this article Print
 
 
 
 
 
 
 

WEBINAR:
On-Demand

Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers


Extreme Networks focuses on making VOIP deployments more secure.

Extreme Networks jumped out ahead of demand for VOIP-specific security on March 17 when it added new voice over IP protections in its Sentriant security appliances.

 

Although the majority of issues faced by enterprises deploying VOIP are focused on traditional threats to data network such as denial-of-service attacks or worm outbreaks, Extreme Networks created a series of new rules for the Sentriant security devices that watch for attacks against call servers, IP PBXes and media gateways. The devices also watch for intruders trying to hijack IP phones by masquerading as call servers.

 

While few attacks targeted at VOIP systems have been documented, the release of a book last year exposing the specific vulnerabilities of VOIP technology and how to address those has raised the level of awareness among enterprises.

Read the full article on eWEEK.

 

 
 
 
 
 
 
 
 
 
























By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
























By submitting your information, you agree that channelinsider.com may send you channelinsider offers via email, phone and text message, as well as email offers about other products and services that channelinsider believes may be of interest to you. channelinsider will process your information in accordance with the Quinstreet Privacy Policy.

 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date