O'Reilly logo

Securing VoIP by Regis Jr Bates

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Policies

Abstract

Policies are important! Too often the myriad devices in a Voice over Internet Protocol (VoIP) network can create the exposure that brings about a breach. Users want to bring in their own devices (favorite form factor) such as smartphones, cell phones, Wi-Fi phones, etc. Yet all of these devices have their own problems that can create a risk to an organization’s network: different operating systems, different media used (wires, wireless, etc.), and completely different ways of providing security. Without a sound security policy, the risks are magnified. Add to this, many organizations implement VoIP using different vendors who may or may not have the overall security posture in place to work among themselves in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required