Infrastructure
News
9/30/2005
09:21 AM
Connect Directly
RSS
E-Mail
50%
50%

Big Hurdles Remain For VoIP Deployments: Industry Panel

Network security, regulatory policy, and business service issues are just three of the major issues that VoIP will have to overcome before gaining ubiquitous acceptance.

Voice over IP may have won the battle of next-generation communications technologies, but there are still plenty of hurdles for it to overcome, according to a panel of industry evangelists.

Network security, regulatory policy and business service issues are just three of the major hurdles that VoIP will have to overcome before gaining ubiquitous acceptance, according to "VoIP's Next Challenges," a well-attended forum held this week during NGN2005 in Washington, D.C.

"How do we best guard the IP environment from security attacks?" asked Chris Miller, a consultant for Lucent Worldwide Services, discussing the most frequently cited challenge. "Should there be a standard security model to cover all VoIP systems?"

Security threats are numerous, including disruption of service, eavesdropping, unauthorized access and theft of service, said Mike Hluchyj, founder and chief technology officer of Sonus Networks. Of course, those dangers are well known, as are the solutions on the network and session sides: VLANs, firewalls, authentication and encryption, among others.

Nevertheless, substantial security challenges remain because VoIP sites often don't deploy and employ the available security solutions thoroughly or effectively, said the panelists. To make matters worse, threats sometimes spring up that an organization doesn't anticipate. For instance, spam is beginning to find its way into networks in unconventional ways, such as through voice calls, said Miller.

In response, Miller recommends a standard security approach that includes a combination of infrastructure discovery, data network traffic allocation, data network traffic analysis, infrastructure hardening and data network hardening. In addition, IT security professionals must press upon organizations the necessity of following best security practices. In the longer run, the world requires a global effort to educate users about the substantial dangers of spam, participants agreed. In the end, spamming will cease only when it's regarded by spammers as less of a money-making opportunity.

Security, though, certainly isn't the only challenge facing VoIP as the technology nears widespread deployment. To that, one can add challenges involving terminology, standards, technical issues, regulations and business drivers, according to Larry O'Pella, director of strategic solutions development for Alcatel. Major technical challenges are being resolved quickly, but business and regulatory issues may prove tougher to tackle, stated O'Pella.

"It's easy to provide connectivity," he said. "But, beyond that, what services do people want? Providing a community of services will be a challenge."

Different business segments, for instance, will need different types of services. The medical industry will require a unique set of IP services, as will the automotive industry, the energy industry, etc. Service providers, therefore, must identify the needs of businesses and offer them packages of services that meet their requirements. To date, that largely hasn't happened, said O'Pella.

Otherwise, O'Pella is keeping his fingers crossed that the regulatory environment will remain favorable to VoIP. Unfortunately, the Federal Communications Commission (FCC) often switches course due to sudden changes in the political environment, requiring the technology industry to keep a close eye on Washington.

"North American regulators are beginning to recognize IP services," he said. "So far, luckily, the FCC seems to be IP-friendly."

Comment  | 
Print  | 
More Insights
2014 Next-Gen WAN Survey
2014 Next-Gen WAN Survey
While 68% say demand for WAN bandwidth will increase, just 15% are in the process of bringing new services or more capacity online now. For 26%, cost is the problem. Enter vendors from Aryaka to Cisco to Pertino, all looking to use cloud to transform how IT delivers wide-area connectivity.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.