NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON CONVERGENCE 09/13/04 Today's focus: VoIP and security, Part 1
Dear [EMAIL PROTECTED], In this issue: * VoIP security concerns mirror larger net security issues * Links related to Convergence * Featured reader resource _______________________________________________________________ This newsletter is sponsored by Texas Instruments How Secure is Your VoIP? With TI's comprehensive security framework, you'll have built-in security for your IP phones and gateways. Learn more about it on http://www.fattail.com/redir/redirect.asp?CID=78922 _______________________________________________________________ CHECK OUT NW FUSION'S NEW WHITE PAPER LIBRARY NW Fusion's White Paper Library was recently re-launched with new features and improved capabilities! Sort NW Fusion's library of white papers by Date and Vendor, view white papers by TECHNCIAL CATEGORY, mouse over white paper descriptions and take advantage of our IMPROVED white paper search engine. CLICK HERE: http://www.fattail.com/redir/redirect.asp?CID=81013 _______________________________________________________________ Today's focus: VoIP and security, Part 1 By Steve Taylor and Larry Hettick According to this year's respondents in Steve's annual "VoIP State of the Market" survey, security is now the No. 1 concern about VoIP deployments. This week, we'd like to take a look at some network security basics and share our observations about VoIP security. First, recall that security exists on many layers, and network security considerations begin with (but are not limited to) a range of considerations, including: * How company office facilities are selected and maintained. * How potential employees are screened. * The remote access policy to a company's systems and information. * What kind of encryption and firewalls are provided in the corporate network. Best-practice security isn't just good business - in some cases, it's also the law. Another consideration in security has to do with the nature of VPNs. Each VPN should address layer-specific security precautions. Layer 1, the private line, relies principally on physical security, since copper loops are separated by physical barriers, and the core TDM network doesn't allow "sharing" of unreserved time slots between users. Layer 2 VPNs, like those based on frame relay and ATM services, enjoy certain built-in protection. Even though Layer 2 VPNs use statistical multiplexing, their connection-oriented switching protocols don't permit easy diversion of user data to the wrong recipient. As a connectionless protocol, IP is the least secure protocol, compared to TDM, frame relay, or ATM. Therefore, IP VPNs can be more susceptible to security breaches than a Layer 1 or Layer 2 VPN. The most susceptible VPN can be an IP VPN that uses the Internet as a WAN, since there's nothing inherently private about the Internet or its core infrastructure. Remote access to any VPN, including dial access or remote connectivity using the Internet, also adds security holes to the network. Next time, we'll look at some techniques used to secure IP VPNs. RELATED EDITORIAL LINKS Voice apps spreading as standards mature Network World, 09/13/04 http://www.nwfusion.com/news/2004/091304speechtek.html VoIP: Just what the doctor ordered Network World, 09/13/04 http://www.nwfusion.com/news/2004/091304qlimg.html _______________________________________________________________ To contact: Steve Taylor and Larry Hettick Steve Taylor is President of Distributed Networking Associates and Publisher/Editor-in-Chief of Webtorials.Com. For more detailed information on most of the topics discussed in this newsletter, connect to Webtorials.Com <http://www.webtorials.com/>, the first Web site dedicated exclusively to market studies and technology tutorials in the Broadband Packet areas of Frame Relay, ATM, and IP. He can be reached at <mailto:[EMAIL PROTECTED]> Larry Hettick an industry veteran with over 20 years of experience in voice and data. He is currently Vice President for Wireline Solutions at Current Analysis, the leading competitive response solutions company. He can be reached at <mailto:[EMAIL PROTECTED]> _______________________________________________________________ This newsletter is sponsored by Cisco IP Communications represents a major opportunity for businesses large and small. By eliminating the need to maintain separate telephone and data infrastructures, extraordinary benefits are often achieved. For information on the union of telephony and data on a single physical network and the security issues involved see the Special Report IP Telephony Security: http://www.fattail.com/redir/redirect.asp?CID=81040 _______________________________________________________________ ARCHIVE LINKS Archives of the Convergence newsletter: http://www.nwfusion.com/newsletters/converg/index.html _______________________________________________________________ Webcast - Successful Voice over IP installation Learn how to design, build and implement workable service-based VoIP infrastructures. Hear about the key drivers for a hosted approach to VoIP. And discover new systems and services that are required when implementing VoIP. Go now. http://www.fattail.com/redir/redirect.asp?CID=80979 _______________________________________________________________ FEATURED READER RESOURCE NETWORK WORLD SPECIAL REPORTS NOW AVAILABLE Focused reports on compelling industry topics, Network World Special Reports are available online at Network World Fusion. Network World Special Reports on IP Telephony Security, the State of Wireless LANs, trends in the networked world and more are currently available. Download any or all of our Special Reports at: <http://www.nwfusion.com/vendorview/specialreports.html> _______________________________________________________________ May We Send You a Free Print Subscription? You've got the technology snapshot of your choice delivered at your fingertips each day. Now, extend your knowledge by receiving 51 FREE issues to our print publication. Apply today at http://www.subscribenw.com/nl2 International subscribers click here: http://nww1.com/go/circ_promo.html _______________________________________________________________ SUBSCRIPTION SERVICES To subscribe or unsubscribe to any Network World e-mail newsletters, go to: <http://www.nwwsubscribe.com/Changes.aspx> To unsubscribe from promotional e-mail go to: <http://www.nwwsubscribe.com/Preferences.aspx> To change your e-mail address, go to: <http://www.nwwsubscribe.com/ChangeMail.aspx> Subscription questions? Contact Customer Service by replying to this message. This message was sent to: [EMAIL PROTECTED] Please use this address when modifying your subscription. _______________________________________________________________ Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: <mailto:[EMAIL PROTECTED]> Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 For advertising information, write Kevin Normandeau, V.P. of Online Development, at: <mailto:[EMAIL PROTECTED]> Copyright Network World, Inc., 2004 ------------------------ This message was sent to: [EMAIL PROTECTED] ------------------------ Yahoo! Groups Sponsor --------------------~--> Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar. Now with Pop-Up Blocker. Get it for free! http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/BCfwlB/TM --------------------------------------------------------------------~-> <a href=http://English-12948197573.SpamPoison.com>Fight Spam! Click Here!</a> Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/kumpulan/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
