Most enterprises maintain a presence on the Internet. This is necessary to conduct business and to provide Internet access for work-related activities. To secure the Internet connection and protect internal networks, enterprises deploy multiple security devices, including firewalls, virtual private networks, strong authentication, intrusion detection and content monitoring. Unfortunately, none of these Internet protocol-related security technologies address vulnerabilities created by connecting a voice network to an internal Internet protocol network. The problem arises when this connection is created through unauthorized or nonse-cure modems and poorly configured voice systems. Also, while Internet protocol-based virtual private networks protect traffic traveling over the Internet, there is no cost-effective solution to protect voice communications.
展开▼