Chapter 2
Policies
Abstract
Policies are important! Too often the myriad devices in a Voice over Internet Protocol (VoIP) network can create the exposure that brings about a breach. Users want to bring in their own devices (favorite form factor) such as smartphones, cell phones, Wi-Fi phones, etc. Yet all of these devices have their own problems that can create a risk to an organization’s network: different operating systems, different media used (wires, wireless, etc.), and completely different ways of providing security. Without a sound security policy, the risks are magnified. Add to this, many organizations implement VoIP using different vendors who may or may not have the overall security posture in place to work among themselves in ...
Get Securing VoIP now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.