Securing IP Telephony Systems: A Plan

Specialist support company Networks First is offering a practical plan to ensure the security of VOIP traffic.
The increasing maturity of VoIP and converged network technology is driving both enterprise and smaller organisations to reconsider the relative expense of having separate voice and data infrastructures. Instead, increasing numbers of UK businesses are opting for the benefits that a converged network and application model, based on an underlying Voice over IP (VoIP) infrastructure, can offer; including reduced cost of ownership, increased business efficiency and significant user productivity gains.

Unfortunately, with IT, data and network security concerns taking up an ever greater percentage of IT Directors’ budgets, according to recent research from Gartner – with over 40 per cent of businesses last year spending seven per cent or more of their IT budget on security, as opposed to the recommended three to six per cent guideline – a number which is furthermore set to increase, there is a significant danger that organisations investing in converged networks are not properly considering or being advised on, the security implications for VoIP traffic argues converged network service and support specialist, Networks First.

Peter Titmus, Managing Director for Networks First, comments, “The true converged network industry is really still in its infancy, with only a handful of voice and data resellers and integrators who have the combined skills to approach the implementation of a converged network in the right way. As a result, there is a danger that organisations investing in this technology are not being given appropriate advice on the security considerations that a converged network requires.”

In order to address this, Networks First has identified a set of simple, yet practical steps for end-users, resellers and systems integrators to follow in ensuring the security of a converged voice and data network.

1. Take a holistic approach
2. Secure the network infrastructure
3. Consider and implement additional IP Telephony security requirements
4. Consider external, expert advice

A full white paper from Networks First entitled ‘Securing IP Telephony Systems – Best Practises’ is freely downloadable at www.networksfirst.com