AlexOakenman - Fotolia
Session border controllers are a vital part of any unified communications architecture, as they provide translation...
services between incompatible Session Initiation Protocol devices and services. Additionally, SBC security protects enterprise networks and UC services from malicious attacks, such as denial of service and toll fraud.
SBCs are equally important for a UC cloud-based architecture. But the onus is on the end-user organization to determine exactly what SBC services and functionalities are offered by the UC cloud service provider. Don't assume a provider has all the SBC services you need for a cloud-based architecture.
If you have an SBC at your location, you'll want to ensure it works with your cloud provider to prevent interoperability issues. Your cloud service provider may request a certain model of SBC, or provide you with one as part of a managed service at your location.
SBCs are a first line of defense, and even though you are using a UC cloud-based architecture, you still have the responsibility to protect against toll fraud, denial of service and other malicious attacks. The most important thing is to ask yourself whether you trust your UC cloud provider. If the answer is anything less than yes, look to provide the SBC security services yourself.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Why organizations need UC cloud services now
What to look for in SBC vendors
Addressing new UC platform security threats
Dig Deeper on Unified Communications Architecture and Service Models
Related Q&A from Carrie Goetz
Voicemail capabilities have evolved since the early days of answering machines. Learn what voicemail is and how features have advanced as the ... Continue Reading
Tracking E911 location information can be tricky when moving telephony to the cloud. But organizations have a few options to ensure that emergency ... Continue Reading
Proper SBC configuration requires partnering with providers and security teams to examine circuits and potential traffic. Learn the best practices ... Continue Reading