It's a well-known fact that VoIP technology sends voice data over networks in the form of data packets. Data-networking technology allows IP telephony to provide an array of powerful and flexible call-management options at a rock-bottom cost.
The downside to VoIP's data-focused structure is that it exposes IP telephony systems to many of the same threats that imperil enterprise data networks and computers — and in some cases extends their range, making them more difficult to detect. Many observers believe that these security threats represent the biggest challenge that VoIP adopters currently face.
VoIP threats come in many forms, including:
Dealing with VoIP threats is a constant, never-ending chore. Since attackers are always devising new ways of breaching VoIP safeguards, it's important that businesses keep on top of the latest threats and adopt fresh measures to counter evolving attacker strategies. Most security experts recommend that VoIP safeguards be blended with the measures that are used to protect a company's existing data network, creating a comprehensive security environment. Common security techniques (which apply to data networks as well as VoIP networks) include:
Specific techniques for VoIP security usually focus on the human side of the equation and include:
Fundamentally, there is no difference between VoIP security and the normal security requirements associated with any well-protected data network. In nearly all respects, VoIP, Web and email protection are simply different aspects of a single security issue.
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more