Chapter 11. Enterprise Architectures and Security

Security in enterprise VoIP architectures adopts many of the protection mechanisms discussed in earlier chapters, but there are also several distinctions compared to carrier architectures, and therefore different security requirements need to be defined in those areas. This chapter focuses on identifying the primary areas of enterprise VoIP architectures in which security can be applied to maintain an adequate security posture. Initially, the chapter discusses the components most likely used in enterprise architectures, and then the architectures with respect to the areas that require security to be closely examined. The contents of this chapter are helpful to security engineers, consultants, ...

Get Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.