November 20, 2013

Making Unified Communications Secure: A Blueprint for Enterprise Session Border Controller Deployments

Enterprises are deploying IP-based unified communications (UC) solutions to increase productivity, improve collaboration, and reduce capital equipment and operating expenses. However, conventional IP security products (such as firewalls and intrusion detection and prevention systems) were not designed with these kinds of real-time communications in mind--leaving organizations vulnerable to security threats.  

When introducing UC platforms, IT teams must craft new strategies and identify new security solutions to protect and control real-time communications flows. Enterprise session border controllers (E-SBCs) are designed to overcome the unique security challenges enterprises typically encounter when introducing unified communications solutions. 

This white paper reviews common UC security issues and describes how Oracle Enterprise Session Border Controller--in concert with conventional data security solutions--can help businesses safeguard IT assets, mitigate financial loss or legal exposure, and maintain high service levels when deploying real-time communications over IP networks.

1 Comment

This paper has some very useful info about what is needed for UC that goes beyond traditional network security. And remember-- even cloud-based UC solutions will need to provide session border control functionality. For those who are considering or who have a VoIP / UC solution, the information here can offer a great checklist of features you will need, along with a "to do" list for the staff.

Search Webtorials

Get E-News and Notices via Email




I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites



Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.