Kit Wai Chan - Fotolia
Today, it seems, everything is virtualized, and the benefits are proven. With the help of virtualization, companies can maximize hardware while lowering power consumption and machine expenses. Not all virtual machines are the same, however, nor is the management of virtual machines.
Additionally, not all applications run well in a virtualized environment. Enterprise session border controllers (SBCs) have very specific purposes, and companies need to ensure nothing is lost in a virtualized environment. As SBCs control access and security for your systems, some companies choose to keep SBCs separate from other applications or use an appliance-based controller.
Since enterprise SBCs set up sessions, security and call routing, you first need to ensure you're not overloading a server. Calls will fluctuate in frequency, time and number, which means you're not working on a predictable load -- especially if you're putting in a new system.
A bank, for example, may have an influx of calls on the first and 15th of each month, when people generally get paid. Calls may be exponentially higher on those days. You need to account for that influx of calls when planning a virtualized enterprise SBC deployment.
You also want to ensure your enterprise SBC will run well based on the hardware selected for your virtual environment. This will be particularly true where an application appliance may use hardware encryption instead of software encryption. If you move the SBC to a software-based environment, any lost functionality may affect your call success.
Many companies do not want to share hardware between departments and functionality. Wherever the enterprise SBC resides could technically be affected by other workings on the same machine. You must ensure anyone touching that platform can't change configurations or other parameters that could cause trouble for your sessions. Some virtual enterprise SBCs, however, are designed to operate in a shared environment.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Routinely update SBCs to maintain secure communications
The pros and cons of enterprise session border controllers
How to evaluate SBC vendors for cloud communications
Dig Deeper on Unified Communications Architecture and Service Models
Related Q&A from Carrie Higbie Goetz
An unguarded VoIP system could be vulnerable to attack. Learn what security measures can help prevent VoIP security threats from affecting your ... Continue Reading
Traditional and cloud SIP trunking perform the same tasks of initiating and ending call sessions, but the method and costs of access create distinct ... Continue Reading
The rules around E911 location tracking have evolved as more businesses move away from traditional wired connections to VoIP. Here's how to stay ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.