SIP trunking is a major advance in how voice and other services are delivered. Short for Session Initiation Protocol (News - Alert), SIP is a whole different approach that by supporting multicast, allows multimedia such as video, voice and other items to run efficiently across IP networks – all at the same time. It supports more advanced services such as unified \communications (UC) where voice is but one function in a richer overall system that includes presence, IM and various styles of conferencing.
SIP trunking most often is put in place of ISDN, T-1 and other traditional connections between customer and provider. These older, traditional connections are well proven, and after years of service, usually have mature protections in place.
SIP critics, mostly those that don’t sell SIP-based services, sometimes knock SIP security, raising questions of how data that moves across either a managed connection or the public Internet can be truly secure. They feel that since hackers are used to attacking IP networks already, SIP is by definition vulnerable.
This FUD (fear uncertainty and doubt) is keeping some from taking advantage of SIP. This is the kind of talk that popped up in the early days of the PC (it’s not a real computer), the iPad (it’s not a real computer, which was actually the point), and the cloud (it’s not a real computing platform). All three proved the critics wrong, and proponents hope to do the same with SIP.
In fact, these advocates argue that SIP trunks can more secure than the PSTN. There are several ways to insure your SIP service is thoroughly secure.
First, and this may seem obvious, press your vendor on precisely how they secure their offerings. And then do some due diligence on their techniques to make sure you have as much confidence as they do.
Next, do your own security. While SIP service providers should have their own security, don’t just count on this alone. Just as with any device, especially one potentially at the edge of the network, use all your available means to secure your IP-PBX (News - Alert) or SIP device.
Some security approaches limit what can be done with SIP and IP communications. “Securing communications has historically required costly and inflexible dedicated connections such as ISDN PRI circuits. With the growth of VoIP and SIP Trunking, this security model has been applied to the IP network in the form of dedicated IP network connections using a variety of techniques including MPLS and GigE, limiting deployment flexibility and extending provisioning times. In many cases, this inflexible approach reduces many of the promised benefits of IP communications,” explained SIP vendor IntelePeer (News - Alert).
If this all has you interested, attend an upcoming TMCnet webinar, SIP Security: Optimize Performance with Minimal Risksponsored by IntelePeer taking place on Wednesday, June 19, 2013 at 2:00 p.m. EDT.
. “This webinar will explore the latest hardware- and software-based solutions for securing and encrypting SIP trunks, enabling enterprises to leverage increased functionality and flexibility, and improved economics of over the top SIP Trunk deployment models while complying with corporate security policies and avoiding TDoS attacks,” IntelePeer promises.
Register today to learn more about SIP Security by just clicking here.
Edited by Jamie Epstein