Extreme Networks made enhancements to its network solutions that provide behavior-based rules to protect IP Telephony and VoIP traffic. These security rules help mitigate the threat of malicious users and hackers who are actively trying to exploit vulnerabilities and breach the IP communications network. Based on these rules, users or devices that demonstrate destructive behavior when entering the network can rapidly be addressed to preserve the quality of voice communications.
Extreme Networks is adding IP Telephony security rules that focus protection around voice traffic traversing a unified communications network. A packaged set of rules is available now for
Extreme Networks Sentriant security appliance. These rules help to simplify management tasks and better protect VoIP gateways, SIP servers and VoIP phones.
Extreme Networks VoIP security rules take into account traditional traffic patterns occurring between IP phones and call servers, with protection mechanisms that automatically trigger if a significant amount of traffic anomalies are seen.