Q

How important are session border controllers within a UC architecture?

Session border controllers can be an overlooked aspect of UC architecture, but that doesn't mean they aren't vital, says analyst Michael Brandenberg.

How important do you think session border controllers (SBCs) are within a UC architecture? Do you think there needs to be more detail and research on these devices and VoIP security?

SBCs are an often overlooked but extremely important component of a modern unified communications (UC) infrastructure. Along with translation services between incompatible (SIP) devices or services, SBCs also serve an important role in protecting the enterprise network and UC platforms from denial of service, toll fraud and other attacks.

Do you need advice?

Submit your unified communications and collaboration questions to editor@searchunified
communications.com
 for our UC experts to answer.

While VoIP access and SIP trunking service providers protect their own networks with large-scale SBCs, they do not typically suggest that customers protect their own networks with an enterprise session border controller (E-SBC). Even on carrier MPLS networks, open connections to the UC infrastructure represent a security risk for organizations.

Beyond security and translation concerns, companies are deploying more E-SBCs to support mobile devices outside the corporate walls in a UC architecture. In this type of deployment, users can securely use mobile UC applications in the field without connecting to a virtual private network (VPN), eliminating the hassle and overhead typically associated with VPNs.

Looking ahead, E-SBCs are likely going to be an important element in WebRTC applications. Deployed at the demilitarized zone and the network edge, the E-SBC is in a logical position to provide conversion services between external WebRTC clients and SIP-compatible UC servers. Many SBC vendors have WebRTC gateway support on their product roadmaps, and the rest are likely to follow as the WebRTC standards become more formalized.

This was first published in June 2013

Dig deeper on Unified Communications Architecture and Service Models

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchMobileComputing

SearchNetworking

SearchTelecom

SearchITChannel

SearchEnterpriseWAN

SearchExchange

Close