Trend Report

Dial "H" For Hack

An Empowered Report: Understanding The Threats To Unified Communication And VoIP Deployments

John Kindervag
 and  two contributors
Apr 11, 2011

Summary

In many companies, the worlds of data networking and telecommunications have merged, and voice and video traffic travels with other enterprise data on the same corporate network. Often known synonymously as voice over IP (VoIP), IP telephony (IPT), and unified communications (UC), this convergence creates unique and special challenges for security professionals. This shift from dual to converged networks requires new thinking and a new approach to security. Unfortunately, IT deploys most UC solutions without much thought to security. This is because networking teams responsible for UC deployment are unaware of the inherent security risks and they don't engage security professionals in the process prior to deployment. Too often, business leaders are so enamored with new UC technologies such as telepresence that they don't realize or suspect their network is less secure. These deployments dramatically enlarge the exploitable attack surface of your network, and there are unique threats to these systems that require specific controls to make them effective and secure.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).