Session border controllers are a vital part of any unified communications architecture, as they provide translation...
services between incompatible Session Initiation Protocol devices and services. Additionally, SBC security protects enterprise networks and UC services from malicious attacks, such as denial of service and toll fraud.
SBCs are equally important for a UC cloud-based architecture. But the onus is on the end-user organization to determine exactly what SBC services and functionalities are offered by the UC cloud service provider. Don't assume a provider has all the SBC services you need for a cloud-based architecture.
If you have an SBC at your location, you'll want to ensure it works with your cloud provider to prevent interoperability issues. Your cloud service provider may request a certain model of SBC, or provide you with one as part of a managed service at your location.
SBCs are a first line of defense, and even though you are using a UC cloud-based architecture, you still have the responsibility to protect against toll fraud, denial of service and other malicious attacks. The most important thing is to ask yourself whether you trust your UC cloud provider. If the answer is anything less than yes, look to provide the SBC security services yourself.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Why organizations need UC cloud services now
What to look for in SBC vendors
Addressing new UC platform security threats
Dig Deeper on Unified Communications Architecture and Service Models
Related Q&A from Carrie Higbie Goetz
What an organization moves to the cloud will influence UC devices and endpoints. Networking expert Carrie Higbie Goetz explains the factors that ... Continue Reading
As SD-WAN grows in popularity, enterprise SBCs still have their place on the network. Learn how the two technologies can work together to support and... Continue Reading
A robust strategy and several steps are needed to deploy SIP successfully. Networking expert Carrie Higbie Goetz explains the pieces that comprise a ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.