Trends Report

Dial "H" For Hack

An Empowered Report: Understanding The Threats To Unified Communication And VoIP Deployments

April 11th, 2011
John Kindervag, null
John Kindervag
With contributors:
Stephanie Balaouras , Lindsey Coit

Summary

In many companies, the worlds of data networking and telecommunications have merged, and voice and video traffic travels with other enterprise data on the same corporate network. Often known synonymously as voice over IP (VoIP), IP telephony (IPT), and unified communications (UC), this convergence creates unique and special challenges for security professionals. This shift from dual to converged networks requires new thinking and a new approach to security. Unfortunately, IT deploys most UC solutions without much thought to security. This is because networking teams responsible for UC deployment are unaware of the inherent security risks and they don't engage security professionals in the process prior to deployment. Too often, business leaders are so enamored with new UC technologies such as telepresence that they don't realize or suspect their network is less secure. These deployments dramatically enlarge the exploitable attack surface of your network, and there are unique threats to these systems that require specific controls to make them effective and secure.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.