Session border controllers are a vital part of any unified communications architecture, as they provide translation...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
services between incompatible Session Initiation Protocol devices and services. Additionally, SBC security protects enterprise networks and UC services from malicious attacks, such as denial of service and toll fraud.
SBCs are equally important for a UC cloud-based architecture. But the onus is on the end-user organization to determine exactly what SBC services and functionalities are offered by the UC cloud service provider. Don't assume a provider has all the SBC services you need for a cloud-based architecture.
If you have an SBC at your location, you'll want to ensure it works with your cloud provider to prevent interoperability issues. Your cloud service provider may request a certain model of SBC, or provide you with one as part of a managed service at your location.
SBCs are a first line of defense, and even though you are using a UC cloud-based architecture, you still have the responsibility to protect against toll fraud, denial of service and other malicious attacks. The most important thing is to ask yourself whether you trust your UC cloud provider. If the answer is anything less than yes, look to provide the SBC security services yourself.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Why organizations need UC cloud services now
What to look for in SBC vendors
Addressing new UC platform security threats
Dig Deeper on Unified Communications Architecture and Service Models
Related Q&A from Carrie Higbie Goetz
VoIP service providers have specific guidelines to meet to ensure E911 services are properly configured and meet regulatory standards. Learn how to ...continue reading
Managing hybrid unified communications can be tricky. Follow these steps to prepare your organization and IT team for the challenges of managing a ...continue reading
When UC apps -- such as voice and video -- create network disruptions, organizations should know what network diagnostic tools are needed to resolve ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.