How can communications bypass VPNs by using a session border controller? Would mobile users be secure in all communications...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
or would they have to open a VPN for some other type of work function?
Ask the Expert!
Do you have a question for Michael Brandenburg or any of our other experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
Depending on the capabilities of the particular unified communications (UC) platform and enterprise session border controller (E-SBC) vendor, mobile devices can be configured to connect specifically to a UC platform through the SBC interface, rather than first opening a VPN tunnel.
Much like the SIP trunks available from service providers, an E-SBC can manage a secure communication session with remote mobile devices. The advantage of a VPN-less connection for mobile devices lies in the fact that E-SBCs are designed to support the bandwidth-sensitive nature of voice and video traffic, unlike traditional VPNs. By connecting through an E-SBC deployed at the enterprise network edge, mobile applications can avoid the overhead created by the VPN tunnel while still maintaining security and quality of service.
The ability to bypass VPNs, however, is limited specifically to the remote UC applications. Any other mobile apps will still need the VPN tunnel to connect to corporate resources.
For more information on SBCs and bypassing VPNs:
- E-SBCs take on WebRTC gateway and BYOD security functionality: Learn the new roles E-SBCs have taken on in UC infrastructure.
- How important are session border controllers within a UC architecture? Find out in this expert answer from Michael Brandenburg.
- Session border control: The good, the bad, the ugly. Learn the pros and cons of adopting SBCs in an enterprise.
Dig Deeper on Unified Communications Security
Related Q&A from Michael Brandenburg
How do you decide between SIP trunking and hosted telephony? Expert Michael Brandenburg explains how organizations can determine if SIP trunking or ...continue reading
Is it a bad idea for IT to allow individual departments to deploy their own collaboration apps? Expert Michael Brandenburg explains why individual ...continue reading
How do VoIP-TDM gateways compare with session border controllers? How do they differ? Expert Michael Brandenburg explains how the two perform similar...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.