Voice over IP or "VoIP", is becoming an attractive alternative to conventional phone networks. VoIP services are becoming more widely deployed in today's enterprise markets as an effective measure for cost savings and increased feature sets. Organizations must realize VoIP introduces fundamental changes to Internet Protocol (IP) architectures and creates new endpoints for attack. These new endpoints create new methods for hackers to find new methods for intrusion, extortion and pretexting.
In order to understand and prepare to mitigate these network vulnerabilities, technology and information security terms surrounding VoIP must be learned and fully understood. This new vocabulary, along with a firm understanding of how VoIP technology is integrated into existing networks, will allow the IT professional to better understand and mitigate attacks or exploits to VoIP networks.
Federal regulations require many organizations to assess and insure that customer information is safe and secure. With the implementation of VoIP, organizations need to identify internal and external threats to these new or converged networks. Using data networks to transmit VoIP could result in unauthorized disclosure or compromised information systems. Organizations should identify risk exposure and rank information assets to develop mitigation plans, testing of vendor equipment and estimate potential damages from implementing VoIP networks.
In this webinar non-technical attendees will learn the basic technology terms surrounding VoIP technology. The presenter will give easy-to-understand explanations, how each tie in to the information security needs of existing data networks. IT pros will also benefit from the "inside view" of the presenter, who has implemented several large VoIP projects for government and large businesses.
VoIP offers significant cost savings from combining devices and networks as well as increased feature set for end users. Using one network or device to offer data and voice is an attractive alternative due to reduction in operational maintenance and devices. From this presentation attendees will learn what the security costs are, the basic terminology and what areas of network and information security must be reviewed prior to implementing a VoIP system.