VoIP Players Form Security Alliance By Colin C. Haley http://www.internetnews.com/infra/article.php/3469251
Nearly two-dozen Voice over IP (define) industry players have formed a new group to ensure that VoIP security keeps pace with adoption. Spearheaded by 3Com's (Quote, Chart) TippingPoint intrusion detection unit, the VoIP Security Alliance (VOIPSA) will run discussion lists, publish white papers and sponsor research. Other VOIPSA members include network gear maker Alcatel (Quote, Chart), communications software developer Avaya (Quote, Chart), Columbia University and security software vendor Symantec (Quote, Chart). "We've been recruiting members for the past couple of months," Laura Craddick, a TippingPoint spokeswoman, told internetnews.com. "In about a week we'll hold a conference call to discuss future projects." Membership is free and still open. Craddick hopes the official launch will attract new members. VOIPSA still has pitches out to Cisco and Nortel (Quote, Chart), two of the bigger names in VoIP equipment, she said. VoIP is becoming increasingly popular in enterprises, with converts like Bank of America and Ford. In addition to long-distance savings, companies moving to IP expect to cut maintenance costs, because they have only one network to manage. IP telephony also makes handling employee moves more efficient; businesses can scale up or down without calling vendors. That cost could be significant in large companies. On the consumer side, the number of U.S. households using VoIP will jump from 400,000 to 12 million over the next five years, according to new report from JupiterResearch, which is owned by the same parent company as this site. VoIP is being heavily marketed by cable companies, telecoms and independent VoIP specialists. But some security experts are concerned VoIP networks could be vulnerable to Denial-of-Service (define) attacks and even a distant risk of spam. "The same threats on a data network are also inherent in a VoIP deployment," Craddick said. "Then there are additional risks in VoIP protocols." For example, security organizations have previously flagged vulnerabilities in Session Initiation Protocol (define) and the H.323 networking protocol. You are a subscribed member of the infowarrior list. Visit www.infowarrior.org for list information or to unsubscribe. This message may be redistributed freely in its entirety. Any and all copyrights appearing in list messages are maintained by their respective owners.
