Session border controllers are a vital part of any unified communications architecture, as they provide translation...
services between incompatible Session Initiation Protocol devices and services. Additionally, SBC security protects enterprise networks and UC services from malicious attacks, such as denial of service and toll fraud.
SBCs are equally important for a UC cloud-based architecture. But the onus is on the end-user organization to determine exactly what SBC services and functionalities are offered by the UC cloud service provider. Don't assume a provider has all the SBC services you need for a cloud-based architecture.
If you have an SBC at your location, you'll want to ensure it works with your cloud provider to prevent interoperability issues. Your cloud service provider may request a certain model of SBC, or provide you with one as part of a managed service at your location.
SBCs are a first line of defense, and even though you are using a UC cloud-based architecture, you still have the responsibility to protect against toll fraud, denial of service and other malicious attacks. The most important thing is to ask yourself whether you trust your UC cloud provider. If the answer is anything less than yes, look to provide the SBC security services yourself.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Why organizations need UC cloud services now
What to look for in SBC vendors
Addressing new UC platform security threats
Dig Deeper on Unified Communications Architecture and Service Models
Related Q&A from Carrie Higbie Goetz
Maintaining voice communications is vital to disaster recovery. Networking expert Carrie Higbie Goetz explains how to build a disaster recovery ...continue reading
The growing use of collaboration apps is putting pressure on the business mobile network. Learn how to support collaboration on both mobile and Wi-Fi...continue reading
Learn how to prepare your organization for a SIP deployment through a clearly defined evaluation of your organization's network requirements and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.