By Topic

Strategies to Keep Your VoIP Network Secure

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

As VoIP technology matures, more IT departments have made the jump to integrate VoIP into their enterprise communication systems. But, before an organization fully commits to the technology, it should perform a risk assessment, paying close attention to any security measures needed to protect these IP-based voice networks. For telephone systems where controlled access throughout the communications infrastructure isn't necessary, services that leverage machines on the public Internet could be a cost-effective choice. However, for systems where secured network control is critical, VoIP networks based on private enterprise infrastructures should be considered. This article focuses on the security measures associated with private-enterprise-based VoIP networks.

Published in:

IT Professional  (Volume:9 ,  Issue: 5 )