Session border controllers are a vital part of any unified communications architecture, as they provide translation...
services between incompatible Session Initiation Protocol devices and services. Additionally, SBC security protects enterprise networks and UC services from malicious attacks, such as denial of service and toll fraud.
SBCs are equally important for a UC cloud-based architecture. But the onus is on the end-user organization to determine exactly what SBC services and functionalities are offered by the UC cloud service provider. Don't assume a provider has all the SBC services you need for a cloud-based architecture.
If you have an SBC at your location, you'll want to ensure it works with your cloud provider to prevent interoperability issues. Your cloud service provider may request a certain model of SBC, or provide you with one as part of a managed service at your location.
SBCs are a first line of defense, and even though you are using a UC cloud-based architecture, you still have the responsibility to protect against toll fraud, denial of service and other malicious attacks. The most important thing is to ask yourself whether you trust your UC cloud provider. If the answer is anything less than yes, look to provide the SBC security services yourself.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Why organizations need UC cloud services now
What to look for in SBC vendors
Addressing new UC platform security threats
Dig Deeper on Unified Communications Architecture and Service Models
Related Q&A from Carrie Higbie Goetz
Migrating UC to the cloud doesn't mean leaving your SIP trunk carrier behind. Learn how bringing your own SIP to cloud services can benefit your ... Continue Reading
An unguarded VoIP system could be vulnerable to attack. Learn what security measures can help prevent VoIP security threats from affecting your ... Continue Reading
Traditional and cloud SIP trunking perform the same tasks of initiating and ending call sessions, but the method and costs of access create distinct ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.