VoIP News
VoIP Providers
VoIP Books
VoIP Software
VoIP Jobs
VoIP Events Calendar
VoIP FAQ
Archives
Contact
About
Verizon Enhances Service to Secure IP Telephony Systems
Business and government customers will now be able to more effectively identify and manage security risks associated with voice over Internet protocol (VoIP) by using Verizon Business' newly enhanced VoIP Security Assessment Service.
The professional service offering -- supported by a
Verizon Business
team of nearly 300 expert security professionals -- addresses the growing concern over VoIP security at a time when more and more companies are deploying Internet-protocol telephony to anticipate future communications requirements, improve employee productivity and enable employee-mobility programs.
"Security is the No. 1 concern customers express about VoIP," said Nancy Gofus, vice president of product management, Verizon Business. "Addressing this issue helps ensure that customers will be able to depend on their next- generation VoIP networks for the high-quality performance and high-level availability they expect, and help increase efficiency and productivity."
According to market intelligence and advisory services firm IDC, demand for premises- and network-based VoIP services is expected to experience significant growth over the next five years, with revenue increasing from $2.9 billion to $6.9 billion. This growth, coupled with a corresponding increase in application-driven business processes and network complexity, will drive security awareness and requirements.
"The VoIP security assessment service launched by Verizon Business offers a comprehensive approach to identify, assess and mitigate potential threats to VoIP systems," said William Stofega, research manager for VoIP services, IDC. "Despite the growing interest in VoIP, security remains a primary customer concern. This type of security assessment service, with its focus on equipment, policies and network architecture, can be highly beneficial in helping to safeguard next-generation VoIP networks."
Verizon Business Approach to VoIP Security Assessments
The Verizon Business VoIP Security Assessment Service is designed to identify and address potential security vulnerabilities associated with customer premises-based VoIP and hosted IP PBX systems from any hardware and software vendor.
The vulnerabilities range from risks inherent in traditional voice and IP- based data networks, including loss of service, fraud, privacy, denial of service attacks, viruses and SPIT (spam over Internet telephony), as well as newer vulnerabilities related to the integration and interoperability of VoIP software and hardware. In addition, a host of new risk factors are created when traffic is handed off between traditional phone and next-generation VoIP networks.
The security assessment service includes a comprehensive review of customers' security policies, as well as an analysis of local- and wide-area network architecture.
Verizon Business' security team uses a holistic approach to provide customers with a detailed analysis to safeguard the confidentiality, integrity and availability of VoIP networks.
The analysis consists of a four-part evaluation to assess the security of a customer's VoIP network. The methodology is based on industry best practices and the threat categories and guidelines developed by the National Institute of Standards and Technology. These include:
-- VoIP Architecture Review - Comprehensive assessment of VoIP network architecture, designed to identify client-specific performance criteria and security objectives in terms of overall risk profile. Focuses on segmentation of VoIP traffic, presence of dedicated firewalls and VoIP servers and use of virtual private networks.
-- Network and Device Penetration Testing and Risk Assessment - All VoIP- related devices and underlying network hardware and software are scanned to test for vulnerabilities for unauthorized access, including identification of rogue devices and personal computer-based phones, or softphones. Access control lists, open ports and out-of-date software patches are evaluated and verified.
-- Evaluation of Standards, Policies and Procedures - Existing policies and procedures associated with a company's overall risk exposure and tolerance are reviewed, with a focus on policies related to personal handsets and softphones, connection of VoIP devices to local area networks, intrusion detection systems and VoIP traffic encryption.
-- Discussion of Findings and Action Plan - The assessment findings are reviewed in detail, with a focus on vulnerabilities discovered and detailed remediation plans containing prioritized recommendations for improving overall security.
Verizon Business Offers Strong Security Protection
Verizon Business provides professional and managed security services from the Internet backbone to the enterprise network. Applying the principles of security risk management to balance risk and resources, Verizon Business delivers pervasive security to help safeguard a customer's communications infrastructure and ensure continuous operation.
In addition, Verizon Business offers a comprehensive range of secure VoIP products and services, from network- to premises-based offerings, enabling VoIP customers to modernize their networks while leveraging existing investment more efficiently and effectively.
Posted on Jun 20, 2006
Reviews
|
Share
|
Digg
Filed in:
Security
|
Verizon
Related Entries
•
Security Researcher Demonstrates Enterprise VoIP Phone Hack at Recent Amphion Forum
•
Vertex Telecom Selects RedShift Networks as the VOIP/SIP Security Solution for Enterprise and Wholesale Customers
•
netTALK Announces Free Advanced Privacy Features Added to its DUO VoIP Devices
•
Sangoma Enhances IP Security Offering with SBC Release
•
VoIP Fraud Could Kill Your Company - FraudStopper Kills the Fraud
•
VoIP Supply Adds Grandstream IP Surveillance Line
All comments require the approval of the site owner before being displayed.
Post a Comment
Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.
Name
E-mail
(will show your
gravatar
icon)
Home page
Remember Me
Comment (Some html is allowed:
)
Enter the code shown (prevents robots):
All brand, company, and product names are trademarks or registered trademarks of their
respective owners. © 2012 VoIP Monitor. All rights reserved.
Privacy Policy
Terms
SUBSCRIBE
Subscribe to our RSS feed
Bookmark VoIPMonitor.net
Subscribe to our newsletter via email
News Categories
Asterisk
Bluetooth Headsets
E911
General
Hardware
Investments
iPad
iPhone
Mergers and Acquisitions
Mobile VoIP
Offbeat News
Security
SIP
VoIP Advice
VoIP Awards
VoIP Bloggers
VoIP Books
VoIP by Region
Africa
Asia
Australia
Europe
Middle East
North America
South America
VoIP Events
VoIP Jobs
VoIP Products
VoIP Promotions
VoIP Providers
ATT
Fusion
Google Talk
Lingo
MCI
MSN Messenger
Net2Phone
Packet8
Phone Power
Pingo
Qwest
RingCentral
SBC
Skype
SunRocket
Verizon
ViaTalk
Vonage
Yahoo Messenger
VoIP Reports
VoIP Software
VoIP Solutions
VoIP Wireless
WiFi
VoIP Information
Tom Keating
Alec Saunders
Andy Abramson
Garrett Smith
Jeff Pulver
Om Malik
Thoughts on VoIP
Solomon's VoIP World
VoIP Weblog
VoIP Guide
Archives
May, 2013 (2)
December, 2012 (3)
November, 2012 (7)
October, 2012 (19)
September, 2012 (5)
August, 2012 (10)
July, 2012 (24)
June, 2012 (18)
May, 2012 (28)
April, 2012 (20)
March, 2012 (16)
February, 2012 (12)
January, 2012 (12)
November, 2011 (21)
October, 2011 (28)
September, 2011 (23)
August, 2011 (26)
July, 2011 (26)
June, 2011 (38)
May, 2011 (59)
April, 2011 (49)
March, 2011 (67)
February, 2011 (68)
January, 2011 (54)
December, 2010 (45)
November, 2010 (43)
October, 2010 (47)
September, 2010 (43)
August, 2010 (32)
July, 2010 (28)
June, 2010 (39)
May, 2010 (46)
April, 2010 (36)
March, 2010 (52)
February, 2010 (45)
January, 2010 (44)
December, 2009 (41)
November, 2009 (46)
October, 2009 (54)
September, 2009 (58)
August, 2009 (29)
July, 2009 (36)
June, 2009 (32)
May, 2009 (32)
April, 2009 (13)
March, 2009 (47)
February, 2009 (37)
January, 2009 (53)
December, 2008 (44)
November, 2008 (56)
October, 2008 (51)
September, 2008 (50)
August, 2008 (41)
July, 2008 (50)
June, 2008 (52)
May, 2008 (53)
April, 2008 (64)
March, 2008 (59)
February, 2008 (53)
January, 2008 (65)
December, 2007 (39)
November, 2007 (33)
October, 2007 (65)
September, 2007 (29)
August, 2007 (52)
July, 2007 (49)
June, 2007 (59)
May, 2007 (64)
April, 2007 (43)
March, 2007 (66)
February, 2007 (100)
January, 2007 (108)
December, 2006 (86)
November, 2006 (100)
October, 2006 (86)
September, 2006 (55)
August, 2006 (31)
July, 2006 (76)
June, 2006 (79)
May, 2006 (87)
April, 2006 (45)
March, 2006 (55)
February, 2006 (55)
January, 2006 (56)
December, 2005 (53)
November, 2005 (61)
October, 2005 (13)
September, 2005 (42)
August, 2005 (57)
April, 2005 (57)
March, 2005 (21)
February, 2005 (15)