SHARE
Facebook X Pinterest WhatsApp

Extreme Sets Out Rules to Secure VOIP

Extreme Networks jumped out ahead of demand for VOIP-specific security on March 17 when it added new voice over IP protections in its Sentriant security appliances.   Although the majority of issues faced by enterprises deploying VOIP are focused on traditional threats to data network such as denial-of-service attacks or worm outbreaks, Extreme Networks created a series […]

Written By
thumbnail Paula Musich
Paula Musich
Mar 18, 2008
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Extreme Networks jumped out ahead of demand for VOIP-specific security on March 17 when it added new voice over IP protections in its Sentriant security appliances.

 

Although the majority of issues faced by enterprises deploying VOIP are focused on traditional threats to data network such as denial-of-service attacks or worm outbreaks, Extreme Networks created a series of new rules for the Sentriant security devices that watch for attacks against call servers, IP PBXes and media gateways. The devices also watch for intruders trying to hijack IP phones by masquerading as call servers.

 

While few attacks targeted at VOIP systems have been documented, the release of a book last year exposing the specific vulnerabilities of VOIP technology and how to address those has raised the level of awareness among enterprises.

Read the full article on eWEEK.

 

Recommended for you...

Report: Security Teams are Drowning in Alerts, Turning to AI
Jordan Smith
Sep 12, 2025
Mitel Appoints Mike Robinson as CEO
Jordan Smith
Sep 11, 2025
Cynomi Adds Third-Party Risk Management Module to vCISO Platform
Luis Millares
Sep 10, 2025
WatchGuard & Girona FC Partner on Security Needs
Victoria Durgin
Sep 10, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.