Extreme Networks Boosts Security for IP Telephony and VoIP

Extreme Networks made enhancements to its network solutions that provide behavior-based rules to protect IP Telephony and VoIP traffic. These security rules help mitigate the threat of malicious users and hackers who are actively trying to exploit vulnerabilities and breach the IP communications network. Based on these rules, users or devices that demonstrate destructive behavior when entering the network can rapidly be addressed to preserve the quality of voice communications.

Extreme Networks is adding IP Telephony security rules that focus protection around voice traffic traversing a unified communications network. A packaged set of rules is available now for Extreme Networks Sentriant security appliance. These rules help to simplify management tasks and better protect VoIP gateways, SIP servers and VoIP phones.

Extreme Networks VoIP security rules take into account traditional traffic patterns occurring between IP phones and call servers, with protection mechanisms that automatically trigger if a significant amount of traffic anomalies are seen.


Posted on Mar 17, 2008  Reviews | Share |  Digg
Filed in:
All comments require the approval of the site owner before being displayed.

Post a Comment

Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.

Name
E-mail
(will show your gravatar icon)
Home page

Comment (Some html is allowed: )  

Enter the code shown (prevents robots):




  All brand, company, and product names are trademarks or registered trademarks of their
  respective owners. © 2012 VoIP Monitor. All rights reserved. Privacy Policy  Terms