This page contains a Flash digital edition of a book.
CORPORATE BUSINESS
www.comms-dealer.com
Securing Enterprise IP comms
I
ssues around security take two of the three legitimate or not, can of security are at an
tend to follow trends, key considerations into hunt down and copy all advantage when it comes
according to Ian account. But as an issue voice traffic with a simple to making enterprise sales.
Kilpatrick, Chairman of becomes more common, sniffer. These can then be “There can be a hesitancy
security distributor Wick it’s harder for people not scanned for simple phrases among the channel to ask
Hill. Right now, prevention to become more aware.” like ‘Please enter your the awkward questions,
of Direct Denial of Service bank details now’. Roger because they think it
(DDoS) attacks are high There are two recurring Jones, Consulting Engineer might upset the sale,” he
on the agenda thanks considerations which at Avaya, believes the explains. “We’re trying to
to recent attacks which should be addressed in potential problem is being turn that on its head, and
took Google and Twitter any sales pitch – firewalls played down because say that if you’re asking
offline, making mainstream and encryption. Traditional vendors don’t have the questions you show
news. No enterprise should firewalls don’t work in a solutions in place to deal that you know what you’re
trust their voice capability UC system for two reasons. with them. “If you could talking about and make
to an IP network which Without Quality of Service, tap into a corporation’s them more comfortable.”
could be slowed to a voice traffic can be caught phone lines and tape all
crawl if such an attack in any queue and slowed of the CEO’s calls, it would Kilpatrick agrees, saying:
takes place, and comms down. More critically, if
Roger Jones
be disastrous,” he says. “So “Resellers don’t need to
resellers in the enterprise the firewall isn’t voice other potential connections media encryption is the know everything, but if
should prioritise security. aware, SIP may be leaving open up. Your firewall can key thing. All our endpoints they understand what a
huge gaps in its trail. leave those connections have that capability.” customer is asking, then
“No-one wants to admit exposed, leaving them their confidence rises. They
they’ve made a mistake “SIP has a practical method open after the SIP There are benefits to don’t expect someone
so they don’t tell anyone,” of making a connection – connection has decided it treating security with selling a voice solution to
says Kilpatrick. “They just handshaking – which is very doesn’t want to use them.” openness and honesty, understand all the detail,
claim it’s been a successful insecure,” says Kilpatrick. and Nigel Jones at but if you get asked a
implementation. You don’t “It hunts up and down Encryption is a trickier Alcatel-Lucent believes question by the security
want to spend £300k on through the ports for one to problem. SIP packets are that resellers who can head that you can’t
a system and then admit connect through, and while not encrypted, so anyone demonstrate a good answer, you’ll be straight
you’re the one who didn’t it’s taking place, all the with access to the network, working knowledge out of the door.”
n
32 COMMS DEALER SEPTEMBER 2009 www.comms-dealer.com
32 PG Enterprise.indd 1 28/8/09 15:13:59
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56
Produced with Yudu - www.yudu.com