Securing voice over IP- The SHOUT solution
One of the impediments to the growth of VoIP is the security implications. Voice over IP data is believed to be more suceptible to the activities of hackers than other kinds of data. Because internet protocols were not originally built for voice, it is the general belief that current security applications such as firewalls, do not provide adequate security for voice data. That is untill the arrival of SHOUT VoIP Migration Appliance (VMA).
A global supplier of communication equipments, net.com on July 6, 2005, introduced its SHOUT VoIP Migration Appliance that promises to deliver fortified security features that will make voip more secured and reliable.
SHOUT VoIP Migration Appliance addresses some of the most common security issues of voip such as direct denial of services, phishing/spoofing, and tracing and trapping of voice streams.
SHOUT VMA implements its Rogue Packe Ejector, a rock-solid firewall that prevents direct denial of services (DDOS) attacks that can bring down an IP network.
Its MD5 Authentication protocol challenges devices that attempt to call the network and verify responses against an internal table or an external database to prevent spoofing and phishing. Spoofing or phishing is a favorite tool of traded for identity theft perpetrators in cyberspace.
Further security is provided by the Transport Layer Security which prevents tracing and trapping of a voice stream to guard identity and information by encrypting the open SIP signaling .
Finally, further encryption is provided in real time by Secure Real Time Protocol
Austin Akalanze
A global supplier of communication equipments, net.com on July 6, 2005, introduced its SHOUT VoIP Migration Appliance that promises to deliver fortified security features that will make voip more secured and reliable.
SHOUT VoIP Migration Appliance addresses some of the most common security issues of voip such as direct denial of services, phishing/spoofing, and tracing and trapping of voice streams.
SHOUT VMA implements its Rogue Packe Ejector, a rock-solid firewall that prevents direct denial of services (DDOS) attacks that can bring down an IP network.
Its MD5 Authentication protocol challenges devices that attempt to call the network and verify responses against an internal table or an external database to prevent spoofing and phishing. Spoofing or phishing is a favorite tool of traded for identity theft perpetrators in cyberspace.
Further security is provided by the Transport Layer Security which prevents tracing and trapping of a voice stream to guard identity and information by encrypting the open SIP signaling .
Finally, further encryption is provided in real time by Secure Real Time Protocol
Austin Akalanze
0 Comments:
Post a Comment
<< Home