This white paper examines security considerations when using SIP trunks as a means of connecting Unified Communication Systems to the outside world.
The appeal of Session Initiation Protocol (SIP) trunks as a means of connecting Unified Communication Systems to the outside world is growing in popularity.
SIP trunks offer significant benefits over legacy PRI trunks, including:
lower operating costs
more flexibility in ordering service and capacities
advanced features, such as virtual phone numbers in different geographies
Since SIP trunks use IP-based protocols that require a system to be opened up to a wide area network (WAN) that should be assumed insecure, organizations must educate themselves about the salient security aspects pertaining to SIP trunks and how to ensure the appropriate level of security.
This white paper examines security considerations for SIP trunks, and provides valuable information and insight into the security options available today.
In order to provide complete functionality, this web site needs your explicit consent to store browser cookies. If you don't allow cookies, you may not be able to use certain features of the web site including but not limited to: log in, buy products, see personalized content, switch between site cultures. It is recommended that you allow all cookies.