Problem solve Get help with specific problems with your technologies, process and projects.

'Securing Cisco IP Telephony Networks': Book chapter download

Chapter 1 of the book 'Securing Cisco IP Telephony Networks' offers useful information on IP telephony solutions, including how to secure your network from security attacks.

'Securing Cisco IP Telephony Networks': Chapter download

As communication systems continue to advance, adoption of Internet Protocol-based telephony (IP telephony) communications has been on the rise. As with any new communications advancement, security is a top concern. This technology in particular is especially vulnerable to security threats and attacks, because it is in real time and virtually incorporates a company's communication channels and business lines. Chapter 1, "What Is IP Telephony Security and Why Do You Need It?" from the book Securing Cisco IP Telephony Networks offers IP telephony solutions, including information on how to secure your network, valuable warnings on the attacks you might encounter and the tools you can use to protect your network.

Chapter excerpt:

What Is IP Telephony?
IP Telephony has been prevalent since the 1990s and seen as the future of communications, enabling various business verticals to transport multimedia over the IP network.

The major reason behind the prevalence of IP-based communications is the key benefits such as cost-savings, rich media service, mobility, portability, ease of integration with other applications, and rich features. With the ever-increasing awareness and adoption of IP Telephony, IP-based communication networks are now gaining popularity, and businesses continue to leverage VoIP platforms to handle all their communication traffic, whether it is voice calls, Instant Messaging, or voicemail. As IP Telephony technology matures, new voice services and applications will be offered and therefore resulting in yet broader acceptance and implementation of IP-based communication networks.

IP Telephony is slowly becoming an integral part of the modern day organization’s day-to-day operations. However, the benefits of IP Telephony do not come without cost.

The openness of modern day IP-based communications introduces new ethical, financial, and business continuity demands to protect networks and enterprises from internal and external threats and attacks.

Excerpted from Securing Cisco IP Telephony Networks, First Edition by Akhil Behl (ISBN: 1587142953). Copyright © 2013, Cisco Press. All rights reserved.

Download the complete chapter now

About this book: Securing Cisco IP Telephony Networks offers a thorough account on how to secure Cisco IP telephony networks, equipment, applications and infrastructure. The author provides a complete security framework for use in any Cisco IP telephony setting. This invaluable reference offers technical professionals the tools and skills they need to ensure a secure environment. This book also features chapter-to-chapter, easy-to-follow network security-centric examples.

About the author: Akhil Behl, a senior network consultant in Cisco Services, focuses on Cisco Collaboration and Security Architectures. He spearheads collaboration and security projects worldwide for Cisco Services and the Collaborative Professional Services (CPS) portfolio for the commercial segment. He previously spent a decade working in assorted roles at Linksys as a technical support lead, as an escalation engineer at Cisco Technical Assistance Center (TAC), and as a network consulting engineer in Cisco Advanced Services. Behl has a bachelor of technology degree in electronics and telecommunications from IP University in India. He holds a master's degree in business administration from Symbiosis Institute in India. He also boasts a dual Cisco Certified Internetwork Expert (CCIE) in voice and security, as well as many other industry certifications.

This was last published in October 2012

Dig Deeper on Unified Communications Security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.