What types of encryption are available for VoIP?
This typically depends upon the equipment and WAN configuration. Are you planning to use VoIP in a point-to-point configuration or will you be utilizing gateway services to the PSTN network? There are several companies that have developed encryption software that run over the top of your voice system. A sending phone and a receiving phone will have to have the same encryption device to communicate on the call. The encryptions are changed in the "key device." If you are talking about just network encryption and are running point to point then your options are again different. There are encryption schemes available at several stages of the IP network. There are also new wireless VoIP phones. Encryption again, is different here. Check with the manufacturer of your equipment. Many have partnered with companies to offer "above and beyond" encryption devices and applications if the ones that come with your system do not prove sufficient.
This was last published in July 2003
Dig Deeper on Network Security Best Practices and Products
Proper SBC configuration requires partnering with providers and security teams to examine circuits and potential traffic. Learn the best practices ...
Organizations need SIP services to connect and disconnect call sessions. Now some SIP services are offered through APIs, which expand the use cases ...
A few factors can indicate it's time to replace a business phone system. Learn when it may be time to switch and how to decide on a course of action.