Boston’s Premier Business Phone Provider

Call Now: 617-788-2420

TELRush Client Portal

When it comes to VoIP and unified communications, are you sacrificing security for cost savings?

By Dave Martin, vice president of marketing, Edgewater Networks, special to Network World
January 04, 2013 04:23 PM ET

If you were to ask most IT professionals to connect CRM or ERP applications to an external IP network without some form of network security, they would look at you as if you had lost your mind. Even the most basic cloud-based business applications integrate security to help ensure the integrity of data and continuity of the service. Yet many organizations today are deploying business critical IP-based voice and video communications without applying standard corporate security policies.

For a variety of reasons, IP-based voice is treated differently. This traffic is generally not perceived as a substantial security risk, mostly due to decades' worth of experience using the TDM-based public switched telephony network (PSTN). These "walled gardens" are generally perceived as among the most trusted networks in the world, supporting millions of business users daily in the U.S. alone.

Network World Commentary - This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

Read the complete article on the Network World website - click here.