Two attacks against VoIP

by Peter Thermos

This purpose of this article is to discuss two of the most well known attacks that can be carried out in current VoIP deployments. The first attack demonstrates the ability to hijack a user’s VoIP Subscription and subsequent communications. The second attack looks at the ability to eavesdrop in to VoIP communications. Although VoIP is implemented using various signaling protocols, this article focuses on attacks associated with the SIP (Session Initiation Protocol), an IETF standard (RFC 3261). The two attacks, among others such as DoS, have been discussed in various research papers but they haven’t been acknowledged publicly as active attacks.
» Read more

Deploying VoIP in the Enterprise

by Extreme Networks

Data networks are becoming increasingly viable for supporting telephony and the advantages of converged networks are continuing to make themselves apparent. A successful IP Telephony deployment is assisted by an awareness of where you are going. This comes from considering all of the elements required to deploy and maintain a converged, Voice-over-IP capable network. These elements are discussed in this white paper, along with guidelines for setting up a pilot project and for forming an incremental rollout of IP Telephony.
» Read more

The Business Benefits of VoIP

by CenturyLink Advanced Technology Solutions (ATS) Team

As with any IT project, budget is a consideration factor. You have to decide between continuing to spend capital and resources to maintain your current voice TDM architecture or considering another course. With challenge comes opportunity. TDM’s impending sunset presents an opportunity to organize, unify and standardize your network, as these forward-thinking enhancements will prepare your company for the future. This white paper analyzes why a move from TDM to a Voice over IP (VoIP) is a beneficial solution for your enterprise.
» Read more