Given these standards, you can achieve end-to-end security or secure just the part of the call that will traverse...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
public networks. You can also transport VoIP traffic over a VPN to achieve security.
The products you use for your IP PBX or VoIP gateway must support these protocols for you to be able to make your calls secure. In addition, your network security elements (firewalls, NATs, proxies, etc.) must also be VoIP-aware. You must also realize that encrypting voice traffic has a big performance overhead on the equipment at the endpoints and thus may be able to carry less traffic.
Dig Deeper on VoIP QoS and Performance
Related Q&A from Sanjeev Sawai
What protocols can be used to facilitate communication between a voice card and an IVR system?continue reading
Find out more about music on-hold (MoH) capabilities and SIP enabled audio streams in this expert answer.continue reading
Learn what Nice Logger is and what types of telephony cards it supports in this expert answer.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.