NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON 
CONVERGENCE
09/13/04
Today's focus:  VoIP and security, Part 1

Dear [EMAIL PROTECTED],

In this issue:

* VoIP security concerns mirror larger net security issues
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Texas Instruments 
How Secure is Your VoIP? 

With TI's comprehensive security framework, you'll have built-in 
security for your IP phones and gateways. 

Learn more about it on 
http://www.fattail.com/redir/redirect.asp?CID=78922
_______________________________________________________________
CHECK OUT NW FUSION'S NEW WHITE PAPER LIBRARY 

NW Fusion's White Paper Library was recently re-launched with 
new features and improved capabilities! Sort NW Fusion's library 
of white papers by Date and Vendor, view white papers by 
TECHNCIAL CATEGORY, mouse over white paper descriptions and take 
advantage of our IMPROVED white paper search engine. CLICK HERE: 
http://www.fattail.com/redir/redirect.asp?CID=81013
_______________________________________________________________

Today's focus:  VoIP and security, Part 1

By Steve Taylor and Larry Hettick

According to this year's respondents in Steve's annual "VoIP 
State of the Market" survey, security is now the No. 1 concern 
about VoIP deployments. This week, we'd like to take a look at 
some network security basics and share our observations about 
VoIP security.

First, recall that security exists on many layers, and network 
security considerations begin with (but are not limited to) a 
range of considerations, including:

* How company office facilities are selected and maintained. 
* How potential employees are screened. 
* The remote access policy to a company's systems and 
  information. 
* What kind of encryption and firewalls are provided in the 
  corporate network.

Best-practice security isn't just good business - in some cases, 
it's also the law.

Another consideration in security has to do with the nature of 
VPNs. Each VPN should address layer-specific security 
precautions. Layer 1, the private line, relies principally on 
physical security, since copper loops are separated by physical 
barriers, and the core TDM network doesn't allow "sharing" of 
unreserved time slots between users. Layer 2 VPNs, like those 
based on frame relay and ATM services, enjoy certain built-in 
protection. Even though Layer 2 VPNs use statistical 
multiplexing, their connection-oriented switching protocols 
don't permit easy diversion of user data to the wrong recipient.

As a connectionless protocol, IP is the least secure protocol, 
compared to TDM, frame relay, or ATM. Therefore, IP VPNs can be 
more susceptible to security breaches than a Layer 1 or Layer 2 
VPN. The most susceptible VPN can be an IP VPN that uses the 
Internet as a WAN, since there's nothing inherently private 
about the Internet or its core infrastructure.

Remote access to any VPN, including dial access or remote 
connectivity using the Internet, also adds security holes to the 
network.

Next time, we'll look at some techniques used to secure IP VPNs.

RELATED EDITORIAL LINKS

Voice apps spreading as standards mature
Network World, 09/13/04
http://www.nwfusion.com/news/2004/091304speechtek.html

VoIP: Just what the doctor ordered
Network World, 09/13/04
http://www.nwfusion.com/news/2004/091304qlimg.html
_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is President of Distributed Networking Associates 
and Publisher/Editor-in-Chief of Webtorials.Com. For more 
detailed information on most of the topics discussed in this 
newsletter, connect to Webtorials.Com 
<http://www.webtorials.com/>, the first Web site dedicated 
exclusively to market studies and technology tutorials in the 
Broadband Packet areas of Frame Relay, ATM, and IP.  He can be 
reached at <mailto:[EMAIL PROTECTED]> 

Larry Hettick an industry veteran with over 20 years of 
experience in voice and data.  He is currently Vice President 
for Wireline Solutions at Current Analysis, the leading 
competitive response solutions company. He can be reached at 
<mailto:[EMAIL PROTECTED]> 
_______________________________________________________________
This newsletter is sponsored by Cisco 

IP Communications represents a major opportunity for businesses 
large and small. By eliminating the need to maintain separate 
telephone and data infrastructures, extraordinary benefits are 
often achieved. For information on the union of telephony and 
data on a single physical network and the security issues 
involved see the Special Report IP Telephony Security:  
http://www.fattail.com/redir/redirect.asp?CID=81040
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter: 
http://www.nwfusion.com/newsletters/converg/index.html
_______________________________________________________________
Webcast  - Successful Voice over IP installation 

Learn how to design, build and implement workable service-based 
VoIP infrastructures. Hear about the key drivers for a hosted 
approach to VoIP. And discover new systems and services that are 
required when implementing VoIP. Go now. 
http://www.fattail.com/redir/redirect.asp?CID=80979
_______________________________________________________________
FEATURED READER RESOURCE
NETWORK WORLD SPECIAL REPORTS NOW AVAILABLE

Focused reports on compelling industry topics, Network World 
Special Reports are available online at Network World Fusion. 
Network World Special Reports on IP Telephony Security, the 
State of Wireless LANs, trends in the networked world and more 
are currently available. Download any or all of our Special 
Reports at:
<http://www.nwfusion.com/vendorview/specialreports.html>
_______________________________________________________________
May We Send You a Free Print Subscription? 
You've got the technology snapshot of your choice delivered 
at your fingertips each day. Now, extend your knowledge by 
receiving 51 FREE issues to our print publication. Apply 
today at http://www.subscribenw.com/nl2

International subscribers click here: 
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail 
newsletters, go to: 
<http://www.nwwsubscribe.com/Changes.aspx> 

To unsubscribe from promotional e-mail go to: 
<http://www.nwwsubscribe.com/Preferences.aspx> 

To change your e-mail address, go to: 
<http://www.nwwsubscribe.com/ChangeMail.aspx> 

Subscription questions? Contact Customer Service by replying to 
this message.

This message was sent to: [EMAIL PROTECTED] 
Please use this address when modifying your subscription. 
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor, 
at: <mailto:[EMAIL PROTECTED]> 

Inquiries to: NL Customer Service, Network World, Inc., 118 
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of 
Online Development, at: <mailto:[EMAIL PROTECTED]> 

Copyright Network World, Inc., 2004

------------------------
This message was sent to:  [EMAIL PROTECTED]


------------------------ Yahoo! Groups Sponsor --------------------~--> 
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/BCfwlB/TM
--------------------------------------------------------------------~-> 

<a href=http://English-12948197573.SpamPoison.com>Fight Spam! Click Here!</a> 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/kumpulan/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to