Chapter 2



Policies are important! Too often the myriad devices in a Voice over Internet Protocol (VoIP) network can create the exposure that brings about a breach. Users want to bring in their own devices (favorite form factor) such as smartphones, cell phones, Wi-Fi phones, etc. Yet all of these devices have their own problems that can create a risk to an organization’s network: different operating systems, different media used (wires, wireless, etc.), and completely different ways of providing security. Without a sound security policy, the risks are magnified. Add to this, many organizations implement VoIP using different vendors who may or may not have the overall security posture in place to work among themselves in ...

Get Securing VoIP now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.