Register Now! Register Now!

Home
Dates & Times
Register
Hotel & Travel
Conferences
Digium Asterisk
         World

Asterisk Training
4G Wireless
         Evolution

Speaker List
TMC University:
    FoIP
    Microsoft OCS
    Network Security
trixbox Training
Free Workshops:
   Microsoft
            Response Point

   Reseller Solutions
   SIP Trunking
   Telecom Agent Day
Why Attend?
Keynotes and
         General Sessions

Exhibitor List
Networking
Giveaways
Show Blog
Show News
Event Sponsors
Photos & Videos
Testimonials


Who Attends?
Exhibitor List
Why Exhibit?
Floor Map
Resource Center
Sponsorship


Press Registration


 

Conferences

 

Dates and Times

Hotel and Travel

Resource Center

Register Now

Keynote Speakers

Contact Us To Exhibit




Security Threat Mitigation in Enterprise UC Environments
(U3-01)

Wednesday - 02/04/09,  8:30-9:15am

Increasingly, large enterprises in North America are moving Unified Communications (UC) applications out of the lab and into production environments. But UC’s long-touted benefits aren’t free. The real-time IP technologies and VoIP infrastructure elements that underlie UC provide many new inroads for criminal attackers (both inside and outside the enterprise) and unwitting bearers of malware. Further, it’s clear that many current countermeasures (routers, data firewalls and intrusion prevention systems) cannot defend the new attack surfaces presented by real-time VoIP, instant messaging, video, and collaboration applications.

Emerging threats to the security, reliability, and availability of UC environments include:

• Denial of service (DoS) and distributed DoS attacks on VoIP and UC application infrastructure
• Attacks that compromise UC message confidentiality and voice privacy
• Unauthorized access to and theft of UC resources and communications
• Virus, worm, and spam for internet telephony (SPIT) attacks on UC endpoints, servers, and networks

Failure to quash these new security threats can mean lost revenue, diminished customer loyalty, corporate brand devaluation, liability exposure, and regulatory non-compliance penalties. This session builds a risk assessment taxonomy for UC security; ranks the criticality and value of UC resources at risk; rates the reality, imminence, and success probability of various UC security attacks; and identifies specific technologies that can be deployed to deflect or mitigate the impact of those attacks on business-critical applications and networks.

Presented by:

Jonathan Zarkower
Director of Product Marketing
Acme Packet

Check Other Sessions
Register Now


Securing the SIP Trunk
(U3-02)

Wednesday - 02/04/09,  9:30-10:15am

Many businesses are looking to deploy SIP trunks, which enable cost-effective VoIP phones to establish Internet connections with the public-switched telephone network (PSTN). Flexible and cost-effective, it makes a great deal of business sense for companies to deploy a SIP trunk and use the same IP connection for all these communications, with traffic routed over a service provider’s IP backbone.

Yet, as with any new technology adoption, SIP trunking requires some education — not all SIP is equal, and to derive the maximum benefit from SIP trunks, it pays to understand all of its dimensions — especially security, so that critical business communications are not interrupted.

This presentation will review the benefits of deploying SIP trunks, as well as the requirements for securing a business-class SIP trunk. In order to allow companies to derive the greatest benefit from their SIP trunks, a comprehensive security solution must be applied. The presentation will outline the three necessary parts to an overall security solution:

Enablement — facilitation of seamless and secure enterprise communications with high quality of service (QoS);
Control — effective management of users and their access to services, features and functions, ensuring that the system and its resources are utilized in keeping with business needs, user requirements and security policies; and
Protection — end-to-end assurance against signaling and media vulnerabilities.

Presented by:

Antonio Varanda
Product Manager, Skype for Business
Skype

Check Other Sessions
Register Now


VoIP Security best Practices
(U3-03)

Wednesday - 02/04/09,  12:30-1:15pm

As VoIP deployment accelerates over the next two to three years, VoIP networks are going to become an increasingly attractive target for would-be hackers and attacks. As a discipline, VoIP security is still in its infancy making it exceedingly difficult for security professionals with enterprises with stringent security and privacy requirements to accurately assess new threats, trends and issues in the market. The end result is a new security discipline that requires constant monitoring and intelligence in order to separate fact from fiction and determine what action really needs to be taken. This session will showcase research conducted in real-life labs and best practices from the data security world.

Presented by:

Bogdan Materna
Chief Technology Officer
VoIPshield Systems

Check Other Sessions
Register Now


Examination
(U3-04)

Wednesday - 02/04/09,  1:30-2:15pm



Presented by:




Check Other Sessions
Register Now

 
 

IP Communications News:

Futuri and RCS Enter into International Partnership Agreement for SpotOn and Futuri AudioAI™
11/29/2023 8:41:26 AM
Motor Racing Telematics (MRT) Market to grow by USD 241.43 million from 2022 to 2027 | Market is fragmented due to the presence of prominent companies like Agero Inc., Airbiquity Inc. and Aptiv Plc, and many more - Technavio
11/28/2023 11:15:26 PM
Internet Of Things Market size is set to grow by USD 1,036.83 billion from 2022-2027 | The increasing industrial automation to drive the market growth - Technavio
11/28/2023 6:15:25 PM
Juniper Research Reveals its Top 10 Telco Trends for 2024, Amidst Major Technological and Business Shakeups
11/27/2023 2:00:09 AM
USI Enhances VoIP Communication Testing Capabilities in Response to Surging Market Trend for VoIP Systems
11/26/2023 6:00:30 PM
Magenta Telekom elige a Mavenir para prestar servicios de voz definidos por software
11/22/2023 11:51:06 AM
Global Cellular Router and Gateway Market Analysis - IoT Connectivity Takes Center Stage
11/22/2023 11:15:26 AM
Cellular Modem Market worth $12.4 billion by 2028 - Exclusive Report by MarketsandMarkets™
11/22/2023 10:15:26 AM
AgriFORCE CEO Provides Letter to Shareholders
11/22/2023 9:00:02 AM
Magenta Telekom Selects Mavenir to Deliver Software-Defined Voice Services
11/22/2023 6:24:11 AM
Register Now Exhibit Now Contact Us


 
VoIP Conference - Platinum Sponsor
Diamond Sponsors
VoIP Conference - Platinum Sponsor

VoIP Conference - Platinum Sponsor

VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor VoIP Conference - Platinum Sponsor
VoIP Conference - Platinum Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor VoIP Conference - Gold Sponsor
VoIP Conference - Gold Sponsor VoIP Conference - Gold Sponsor