BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

The basics of SIP trunking explained

Last updated:January 2015

Editor's note

As enterprises move on from legacy voice communications systems like the public-switched telephone network (PSTN), Session Initiation Protocol (SIP) trunking has emerged as a popular method of facilitating voice communications over the Internet. SIP trunking offers enterprises many advantages over legacy systems, including reduced costs, scalable architecture and enhanced reliability. But SIP trunking also creates new security challenges for enterprises, like SIP floods and toll fraud.

This essential guide covers the SIP trunking basics to ensure your enterprise is prepared to successfully deploy SIP trunks in your network. Read on for more of SIP trunking explained.

1Deploying SIP trunking

Before deploying SIP trunking, enterprises must understand the impact it will have on network bandwidth and be prepared for any challenges that may arise during deployment. Learn how to prepare for deployment, find the right SIP trunking provider for a smooth transition from the PSTN, and reap SIP trunking's benefits.

2Securing SIP trunking

Migrating from the PSTN to SIP trunking creates new security vulnerabilities for enterprises, from SIP floods to toll fraud. Enterprises must make sure the proper measures are in place to keep SIP trunks secure. Learn the security issues that impact SIP trunking and how to build a security checklist to mitigate security breaches.

3SIP trunking terms to know

Deploying SIP trunking means enterprises and network administrations should know important communications terms. Learn the SIP trunking terms you need to know in our glossary.

-ADS BY GOOGLE

SearchNetworking

SearchITChannel

Close