Given these standards, you can achieve end-to-end security or secure just the part of the call that will traverse...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
public networks. You can also transport VoIP traffic over a VPN to achieve security.
The products you use for your IP PBX or VoIP gateway must support these protocols for you to be able to make your calls secure. In addition, your network security elements (firewalls, NATs, proxies, etc.) must also be VoIP-aware. You must also realize that encrypting voice traffic has a big performance overhead on the equipment at the endpoints and thus may be able to carry less traffic.
Dig Deeper on VoIP QoS and Performance
Related Q&A from Sanjeev Sawai
What protocols can be used to facilitate communication between a voice card and an IVR system?continue reading
Find out more about music on-hold (MoH) capabilities and SIP enabled audio streams in this expert answer.continue reading
Learn what Nice Logger is and what types of telephony cards it supports in this expert answer.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.