Security (Suscribirme)
Enlaces
IP Telephony Security in Depth
http://www.recursosvoip.com/docs/english/safip_wp.pdf
Formato: PDF
This paper provides best-practice information to interested parties for designing and implementing secure IP telephony networks.This paper frames the IP telephony implementation within the context of the overall security design. SAFE represents a system-based approach to security and VPN design. This type of approach focuses on overall design goals and translates those goals into specific configurations and topologies.
IP Voice Network Brokering: Enabling VoIP Beyond the Corporate Firewall
http://www.recursosvoip.com/docs/english/006668.pdf
Formato: PDF
This paper looks at the shift in deployment of voice services as a result from the many structural changes in technology and services as outlined below. It discusses the benefits and the challenges of deploying new Internet Protocol (IP) technologies within the enterprise and presents a solution for a trusted voice brokering infrastructure to bridge enterprises and service providers.
Mitigating Security Threats to Your VoIP Network
http://www.recursosvoip.com/docs/english/nn115601.pdf
Formato: PDF
Increasingly, enterprises are leveraging data networks such as the Internet to connect users. And while these converged networks offer enterprises attractive benefits such as cost savings, convenience and efficiency, they have also become attractive targets for network abuse, viruses, information theft and a host of other threats. Converged networks can potentially expose IP PBXs and phones to a more hostile environment than their traditional counterparts. Voice over IP (VoIP) networks, for example, are far more vulnerable to hijacking, command injection and Denial of Service (DoS) than traditional networks.
Network-Centric Operations
http://www.recursosvoip.com/docs/english/ccmigration_09186a00803e5ac2.pdf
Formato: PDF
Cisco Systems is the leader in defense networking, providing integrated solutions that securely and smoothly connect the entire chain of command to mission-critical information. As the individual components of the military complex evolve into endpoints on interconnected networks, the features and capabilities provided across the network must enhance the availability, reliability, and survivability of the intervening networks and interconnected systems. Cisco IP Communications solutions enable organizations to lay the foundation necessary for network-centric operations.
PSTN to IP Attack Scenario
http://www.recursosvoip.com/docs/english/95509.pdf
Formato: PDF
With the introduction of the converged IP telephony solution, customers are concerned that a perpetrator might be able to gain access to their IP network through the PSTN. The concern is that a perpetrator could use a modem to call into the IP telephony system and immediately gain IP connectivity. This paper describes an attack scenario and explains how the Avaya voice-over-IP (VoIP) solutions are protected against this type of attack.
Secure Access and Control 3.0 for Services Delivery in a Converged Communications Environment
http://www.recursosvoip.com/docs/english/svc2439.pdf
Formato: PDF
Avaya Global Services R&D has accepted the challenge and has responded with the development of the Secure Services Delivery Platform (SSDP) and the Secure Services Gateway (SSG). This new service delivery platform will enhance the Avaya infrastructure to provide an even higher level of security than in the past. The SSG extends the functions of SSDP to the customer premise and provides alarm concentration and encrypted alarm delivery to Avaya, while eliminating the need for modems for alarm receipt and resolution. This paper provides an introduction to the new Avaya SSDP, and a roadmap to the direction that Avaya is taking in secure access and control for service delivery in a converged communications environment.
Secure Convergence: VoIP Security Guidelines With Lucent AES
http://www.recursosvoip.com/docs/english/Lucent-AES-VoIP-Security-Guidelines.pdf
Formato: PDF
Enterasys recognizes the emerging need for securing convergence-based applications; specifically protection for voice traffic in a heterogeneous environment. This paper defines an introduction to securing SIP-type VoIP products, but does not define the complete lock down of the SIP protocol. This paper implements Enterasys Networks Secure Networks solutions to secure voice-based products, which do not support security technologies at the network layer. This is considered a high-level implementation and not a network hardening solution.
Secure IP Telephony for the Enterprise: Pingtel and Check Point Software Technologies
http://www.recursosvoip.com/docs/english/voip_whitepaper.pdf
Formato: PDF
Pingtel and Check Point offer a VoIP solution that addresses these concerns. Pingtel is a market leader with an affordable, low-risk software IP telephony solution entirely based on (SIP). Check Point, the market leader in Internet security, leverages its Application Intelligence technology to protect voice communications from all the same threats that endanger data communications, such as denial of service attacks, hacking, and loss or corruption of business-sensitive information. The Pingtel-Check Point solution enables organizations to deploy VoIP cost-effectively and securely.
Secure Telephony Solution
http://www.recursosvoip.com/docs/english/nn104820-071403.pdf
Formato: PDF
This position paper describes how to secure IP telephony within the context of four levels of security -- Minimum, Basic, Enhanced, and Advanced -- based on the principles of the Unified Security Architecture. To further articulate these levels of security, the paper reviews security considerations for traffic on the IP telephony network, and then describes the Secure Telephony Solution framework.
Secure Voice Over IP (VoIP) Solutions for Service Providers
http://www.recursosvoip.com/docs/english/090094038007fa92_White_paper.pdf
Formato: PDF
Voice over Internet Protocol (VoIP) can help service providers provide customers with exciting new end-user features and services while reducing costs. Enterprises seek VoIP solutions from a multitude of vendors and residential broadband customers can choose from a wide range of VoIP providers. This paper addresses how Lucent's VPN Firewall Portfolio can effectively address service provider requirements in implementing secure VoIP applications.
Securing IP Voice
http://www.recursosvoip.com/docs/english/cdccont_0900aecd80240249.pdf
Formato: PDF
This paper outlines the Cisco Self-Defending Network strategy and the SAFE Blueprint from Cisco, from which it stems, and how the strategy can be put to work to protect IP voice communications in organizations of all types. Whether your organization uses a centralized or distributed call management structure to cover many locations, or consists only of a single site, the Cisco Self-Defending Network strategy is flexible enough to meet all of your network security needs.
Securing Your Network for IP Telephony
http://www.recursosvoip.com/docs/english/cdccont_0900aecd801e6159.pdf
Formato: PDF
IP telephony can bring many benefits to the enterprise today, including increased productivity. But to ensure that the rewards can be reaped - without the painful side effects - a secure foundation for the IP telephony system must be built. Providing the necessary level of protection means that companies must first understand the threats. Then they must build a secure foundation that includes a well-formed security policy, security assessments, and a strong security infrastructure.
Security for the Third Generation (3G) Mobile System
http://www.recursosvoip.com/docs/english/3G_UMTS_Security.pdf
Formato: PDF
In 1996, when the 3rd Generation system known as UMTS was being developed in ETSI (European Telecommunications Standards Institute), the opportunity was taken to review the basis for security in existing mobile systems and to develop a new security architecture specifically to be used in UMTS. This early work was subsequently taken forward into the Third Generation Partnership Project (3GPP) and this will be the basis for the Release 99 deployment of 3G systems. This paper describes the security architecture for 3G that maintains compatibility with GSM as far as possible.
Security in Converged Networks
http://www.recursosvoip.com/docs/english/SecurityInConvergedNetworks.pdf
Formato: PDF
This paper describes converged networking security considerations and guidelines for IT managers and architects who are addressing converged infrastructure and application security.
Security in Real-Time IP Communications
http://www.recursosvoip.com/docs/english/Security_RTIP.pdf
Formato: PDF
This white paper focuses on the need to enable robust security mechanisms for real-time IP communications, the principal medium being telephony. Real-time communications are essential part of day-to-day operations and the medium is also becoming an integral part of mainstream business processes. This means that the various mechanisms must form part of a holistic solution and the resulting solution must be preceded by a security strategy. Security issues cannot be addressed via point solutions and there are no easy answers. The Siemens HiPath Portfolio offers an arsenal of effective weapons to protect real-time IP communications and IT against security threats.