SIP Security at Converge2015

When you think about security in terms of SIP and VoIP, you need to consider four different areas.  First, you want to protect the SIP signaling.  Second, you need to protect the media stream.  Third, you need to ensure that people are who they say they are.  Lastly, you need to create a secure network edge that prevents the bad guys from sneaking into your business and compromising your VoIP network.

Did you read yesterday’s SIP Adventures article on the seven sessions I am presenting at the IAUG Converge2015 conference (Andrew Speaks at Converge2015)?  In today’s article for No Jitter, I dig a little deeper into one of those topics.

Converge2015: Building a Secure SIP Network

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: