VoIP News
VoIP Providers
VoIP Books
VoIP Software
VoIP Jobs
VoIP Events Calendar
VoIP FAQ
Archives
Contact
About
NextiraOne Helps Security and IP Telephony Converge
There are numerous emerging security threats that can challenge the integrity of an IP telephony solution. Security vulnerabilities of a network are exposed before, during and after a system is installed. To help address these challenges for clients,
NextiraOne
is extending its expertise in voice, data and IP telephony engineering to introduce a full suite of information security consulting services. The services are designed to help clients maintain the integrity, confidentiality, availability and reliability of their converged communications environments.
"Information security is an integral part of our overall services value for our clients. We recognize that implementing proper security countermeasures is a critical step to ensuring the success of any convergence initiative," said NextiraOne President and CEO Dale Booth. "With careful planning and precise engineering, our clients' enterprise IP telephony systems can easily integrate with different information security tools to become as or more secure than existing PSTN systems, depending on the requirements of the application. Our new suite of consulting services was created to help our clients properly and successfully navigate to and through an IP telephony environment."
NextiraOne's five security consulting services provide a concrete return on investment across the IP telephony implementation lifecycle. From a pre- implementation perspective, NextiraOne offers two assessment services. The IP Telephony Pre-Implementation Assessment Service assesses the feasibility of VoIP and IP telephony voice communications and applications from a network performance and information security perspective. This offering yields specific recommendations that are intended to help clients ensure the successful implementation and performance of an IP telephony solution. The second pre-implementation solution, the IP Telephony Network & Vulnerability Assessment Service, provides a technical, risk and vulnerability assessment and corresponding recommendation to clients that are considering the purchase of an IP telephony solution or who have been working on an existing IP telephony implementation. Clients benefit from recommendations focused on alleviating risk mitigation concerns and addressing required security controls and countermeasures.
The post-IP telephony implementation services include the IP Telephony Post-Implementation Assessment, IP Telephony Compliancy Service and IP Telephony Architecture & Framework Service. The IP Telephony Post- Implementation Assessment is designed for companies with an existing IP telephony implementation that may be experiencing performance and security issues. This service provides clients with information regarding performance enhancements and known vulnerabilities and recommendations for system administration as well as ongoing support to make the converged environment perform at its optimum level. The second consulting service, the IP Telephony Compliancy Service, is for companies with an existing IP telephony system that are under a new or existing compliancy law, mandate or regulation that requires documented security controls and an IT security architecture and framework. The third service, the IP Telephony Security Architecture & Framework Service, helps clients create and implement information security policies, standards, procedures and guidelines for IP telephony systems that are part of their IT infrastructures.
"These new consulting services allow us to address a broader scope of our clients' needs while incorporating proper security controls and countermeasures into the IP telephony planning process," adds Booth. "This allows our clients to mitigate risk and align security priorities with the key business drivers that led them down the convergence path."
Additional managed security services, which complement the consulting practice, will be introduced during the next few months as part of NextiraOne's maintenance of high voice and data implementation standards.
Posted on Dec 06, 2005
Reviews
|
Share
|
Digg
Filed in:
Security
Related Entries
•
Security Researcher Demonstrates Enterprise VoIP Phone Hack at Recent Amphion Forum
•
Vertex Telecom Selects RedShift Networks as the VOIP/SIP Security Solution for Enterprise and Wholesale Customers
•
netTALK Announces Free Advanced Privacy Features Added to its DUO VoIP Devices
•
Sangoma Enhances IP Security Offering with SBC Release
•
VoIP Fraud Could Kill Your Company - FraudStopper Kills the Fraud
•
VoIP Supply Adds Grandstream IP Surveillance Line
All comments require the approval of the site owner before being displayed.
Post a Comment
Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.
Name
E-mail
(will show your
gravatar
icon)
Home page
Remember Me
Comment (Some html is allowed:
)
Enter the code shown (prevents robots):
All brand, company, and product names are trademarks or registered trademarks of their
respective owners. © 2012 VoIP Monitor. All rights reserved.
Privacy Policy
Terms
SUBSCRIBE
Subscribe to our RSS feed
Bookmark VoIPMonitor.net
Subscribe to our newsletter via email
News Categories
Asterisk
Bluetooth Headsets
E911
General
Hardware
Investments
iPad
iPhone
Mergers and Acquisitions
Mobile VoIP
Offbeat News
Security
SIP
VoIP Advice
VoIP Awards
VoIP Bloggers
VoIP Books
VoIP by Region
Africa
Asia
Australia
Europe
Middle East
North America
South America
VoIP Events
VoIP Jobs
VoIP Products
VoIP Promotions
VoIP Providers
ATT
Fusion
Google Talk
Lingo
MCI
MSN Messenger
Net2Phone
Packet8
Phone Power
Pingo
Qwest
RingCentral
SBC
Skype
SunRocket
Verizon
ViaTalk
Vonage
Yahoo Messenger
VoIP Reports
VoIP Software
VoIP Solutions
VoIP Wireless
WiFi
VoIP Information
Tom Keating
Alec Saunders
Andy Abramson
Garrett Smith
Jeff Pulver
Om Malik
Thoughts on VoIP
Solomon's VoIP World
VoIP Weblog
VoIP Guide
Archives
May, 2013 (2)
December, 2012 (3)
November, 2012 (7)
October, 2012 (19)
September, 2012 (5)
August, 2012 (10)
July, 2012 (24)
June, 2012 (18)
May, 2012 (28)
April, 2012 (20)
March, 2012 (16)
February, 2012 (12)
January, 2012 (12)
November, 2011 (21)
October, 2011 (28)
September, 2011 (23)
August, 2011 (26)
July, 2011 (26)
June, 2011 (38)
May, 2011 (59)
April, 2011 (49)
March, 2011 (67)
February, 2011 (68)
January, 2011 (54)
December, 2010 (45)
November, 2010 (43)
October, 2010 (47)
September, 2010 (43)
August, 2010 (32)
July, 2010 (28)
June, 2010 (39)
May, 2010 (46)
April, 2010 (36)
March, 2010 (52)
February, 2010 (45)
January, 2010 (44)
December, 2009 (41)
November, 2009 (46)
October, 2009 (54)
September, 2009 (58)
August, 2009 (29)
July, 2009 (36)
June, 2009 (32)
May, 2009 (32)
April, 2009 (13)
March, 2009 (47)
February, 2009 (37)
January, 2009 (53)
December, 2008 (44)
November, 2008 (56)
October, 2008 (51)
September, 2008 (50)
August, 2008 (41)
July, 2008 (50)
June, 2008 (52)
May, 2008 (53)
April, 2008 (64)
March, 2008 (59)
February, 2008 (53)
January, 2008 (65)
December, 2007 (39)
November, 2007 (33)
October, 2007 (65)
September, 2007 (29)
August, 2007 (52)
July, 2007 (49)
June, 2007 (59)
May, 2007 (64)
April, 2007 (43)
March, 2007 (66)
February, 2007 (100)
January, 2007 (108)
December, 2006 (86)
November, 2006 (100)
October, 2006 (86)
September, 2006 (55)
August, 2006 (31)
July, 2006 (76)
June, 2006 (79)
May, 2006 (87)
April, 2006 (45)
March, 2006 (55)
February, 2006 (55)
January, 2006 (56)
December, 2005 (53)
November, 2005 (61)
October, 2005 (13)
September, 2005 (42)
August, 2005 (57)
April, 2005 (57)
March, 2005 (21)
February, 2005 (15)