Chapter 8. Securing Voice

We made it through the Y2K scare. We are now all accustomed to antivirus software, bad Web sites, phishing, and the many nasty security breaches that put user data at risk. Most annoying, we are all familiar with the daily plague called SPAM. Now, our organizations and personal data must confront new security challenges such as SPIM, messaging overflows, tapping, and other threats that can instantly disrupt and/or compromise the security of personal and corporate information.

Traditionally, voice networks and data networks have been entirely separate. While the convergence of the two into digital voice and unified communications delivers a variety of cost and feature benefits, it also opens up the voice ...

Get Microsoft Voice and Unified Communications now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.