The network matters. Without it many of the devices and applications we use in our daily lives would not be available. Without the right quality, they would not be attractive or usable. This holds true for voice, data, and video networks, and even more so for converged networks.
At Cisco our approach is to make the network a platform for experiences. When a functionality is better handled out of the device or application, because of optimization or capacity concerns, we make it available in the network. When devices or applications come with new capabilities, we make sure the network recognizes them and makes them available end to end.
This simple philosophy is very far reaching, and we are seeing its benefits with Medianet. It is easy to understand why auto-configuration, call admission control for video, and session recording, just to pick a few, are services which enable multiple applications while maintaining consistency and allowing optimal use of the network capabilities and bandwidth.
A few weeks ago at Cisco’s Collaboration Summit we announced new solutions. They all drive value from the network, including VXI, the Virtual Experience Infrastructure. In very novel ways, Cisco is aiming at making virtualization easier, and delivering a better user experience at a lower cost. This is what the Cisco network is all about.
VoIP offers plenty of benefits to small businesses; unfortunately, it also presents many opportunities for hackers to cause harm to your voice network. IP-based voice networks are vulnerable to the same risks as data networks. But you can use many of the same security techniques and technologies for your VoIP network that you may already be using on your data network.
The Information Systems Control Journal of ISACA, an independent association that provides education on information systems assurance and security, has a useful article about security within VoIP networks.
Following are six tips for securing your VoIP network and voice data:
Lock up your servers: As with your servers and other central IT equipment, make sure your VoIP servers are under lock and key.
Encrypt voice traffic: To avoid unauthorized access to calls and unauthorized changes to voice messages and other VoIP content, encrypt your voice traffic. All good VoIP systems should have built-in encryption capabilities to protect against such threats as man-in-the-middle attacks and unauthorized snooping of voice data.
Install firewalls: Since VoIP traffic and data traffic all travel on the same physical network, protecting your data network helps protect your VoIP network. For example, the Cisco SA500 Series Security Appliances and Unified Communications 500 Series have security features to protect the entire network, both voice and data traffic, and use VLANs to virtually separate the two traffic flows from each other on the same physical network.
Separate voice and data traffic: The ISACA Journal article recommends using separate servers for your voice and data traffic. This way, you can minimize the risk of voice and data loss in the event that your business is the target of a distributed-denial-of-service attack.
Filter unauthorized traffic: Configure your switches, routers and firewalls to monitor and filter your network for unusual voice and data activities. For example, voice traffic should not be allowed on your data network and vice versa.
Setup dial plans and user profiles: You can use VoIP system features to identify users, the type of calls being made and restrict unwanted traffic, such as outbound international calls. Traffic limits can also be set to ensure call quality and maximum voice and data network performance. These features can also be set to log caller activities and events.
In addition to these measures, you should also put strong passwords in place for your VoIP servers. You should also make sure you to sign up for updates to your VoIP server operating system from the manufacturer. These updates often fix security vulnerabilities that may have been found in the software and should be installed as soon as you receive the alerts.
Following these steps should protect your voice data and ensure that your VoIP network runs smoothly. What measures have you employed to secure your VoIP network?
Video is becoming the preferred method of communication for enterprises on a global scale. But what is the formula for making video as easy to use as making a phone call?
In the video below, Cordell Ratzlaff, director of Engineering for Cisco’s Voice Technology Group and head of the User Design Engineering team, discusses the important design concepts his team used to develop some of Cisco’s newest voice and video endpoints and encourage the use of video.
Prior to Cisco, I worked for mostly small businesses. This has given me pretty good insight into how small business decisions are made. As there are so few layers of management, often times the same person that weighs the pros and cons of free soda for employees is also deciding whether to make a major technology purchase. More than anything right now, I’d say that one of the most important decisions a small businessperson can make is whether to “go wireless or go home.”