VoIP security still a major issue

December 2003 Integrated Solutions, Products & Solutions

A recent column by Steve Taylor, president of Distributed Networking Associates, writing for Network World in the US is instructive. As networking starts to impact on the design and installations of security solutions, so the need to secure these solutions becomes increasingly important. Taylor's comments on how security concerns are impeding voice-over-IP implementation are a red flag to end-users and purveyors of network-based security solutions, and it is for this reason that his thoughts are published in Hi-Tech Security Solutions this month.

Says Taylor, "According to Webtorial's recent 2003 VoIP 'State of the market report' (available for download at www.webtorials.com), about 40% of the approximately 300 respondents cited security as one of the top four reasons why they have not deployed VoIP. Digging deeper into the results, about 25% of the respondents cited concern about security of the network infrastructure as a major problem, while the rest took a less drastic view of the problem."

Taylor suggested that when asked about security of the network infrastructure vs the security of voice content, the greater concern was about the infrastructure.

"The recent Blaster and SoBig-f attacks demonstrate that some of these concerns are well-founded - especially if the network infrastructure is not appropriately cared for. Some VoIP users who did not apply patches to protect against Blaster found their VoIP networks bogged down along with their data applications. Blaster-type attacks will force companies to take patches and upgrades more seriously. This additional diligence in securing the data network will have the side benefit of protecting the VoIP infrastructure," he maintains.

"But SoBig-f exposed a separate and equally disturbing VoIP vulnerability. By affecting e-mail, SoBig-f had a severe effect on thousands - if not millions - of PCs. While e-mail problems were being resolved, the PC became unusable for other applications. If you are dependent on your PC for telephony, when your PC becomes unstable, your phone becomes unstable, too. This raises some serious questions about the wisdom of adopting soft phones - software that turns PCs into IP-based phones - as a part of overall VoIP implementation."

Added taylor, "According to the 'State of the market report', end users strongly favour maintaining their traditional phones as part of their overall voice infrastructure. When asked about the importance of integrating traditional phones into the VoIP infrastructure and given five choices from 'not important at all' to 'extremely important', more than half of the respondents chose 'very important' or 'extremely important'. It is not clear whether security concerns were a part of this desire to maintain traditional phones at the time the survey was taken, but it is another issue that must be considered."

Concluded Taylor, "Overall, virus/worm incidents should not have a major effect on the VoIP market. These are data security issues, and when they are addressed for the data network, the VoIP installation will be addressed by default. But virus/worm incidents do indicate that if you are getting ready to go full-throttle with VoIP, it is common sense to apply any applicable patches to keep your infrastructure up to date."

Perhaps it is about time the security integrators started acquainting themselves with the potential hindrances to the roll out of network-based solutions?





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions Commercial (Industry)
Suprema has released its BioEntry W3 facial authentication access control device with multiple authentication options, including RFID cards as well as mobile credentials, designed for durability and resilience.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
Smarter ways to secure your space
Elvey Security Technologies Access Control & Identity Management Products & Solutions
Ensuring the safety of people and assets has become more crucial than ever, and access control systems provide essential tools to regulate and monitor who can enter specific areas or access sensitive resources.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Guarding data privacy
Suprema Access Control & Identity Management Products & Solutions
Suprema’s BioEntry W3 is designed with data privacy as a top priority, addressing concerns through its display-free design and highly secure ‘Template on Mobile’ (ToM) authentication, making data privacy a top priority.

Read more...
More options for advanced AI analytics
Surveillance Products & Solutions
The new IDIS Edge AI Camera Plus range offers users flexible options to upgrade their video systems by targeting the power of advanced AI video analytics on priority locations for enhanced vigilance and monitoring 24/7.

Read more...