Borderware Releases Firewall To Protect Against VoIP Attacks
Company claims it is the first firewall designed to protect VoIP from hackers, spoofers and malicious threats.
Bordeware has released what it calls the first firewall designed to protect VoIP from hackers, spoofers and malicious threats.
The company claims that SIPassure, its new application-level firewall, will protect against these dangers:
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks that can consume large amounts of bandwidth in a VoIP network.
Eavesdropping and "man-in-the-middle" attacks that allow hackers to become part of a VoIP call without the communicating parties knowing someone is listening.
Call Redirection, which enables a hacker to automatically call-forward a connection to their system.
Malicious Calling, VBombing and VoIP Spam, which are attacks that flood the receiver with hundreds of false voice mails within seconds.
Spoofing, Phishing or Fake Caller ID, in which a hacker can masquerade as a trusted person making legitimate voice calls to an unsuspecting patron.
The new product is being announced at DEMO@15!, an industry's event focusing on emerging technologies and new products.
"As the VoIP revolution unfolds, users need to be aware of the many exploits that could compromise their next Internet call," Chris Shipley, DEMO executive producer said in a statement. "BorderWare's VoIP security technology guards against many of the pitfalls associated with the adoption and deployment of this new communications technology. BorderWare's SIPassure has the potential to make VoIP a safe option for everyone."
"While the industry works to secure voice communications at the transport layer with VPN-type encryption, hackers are developing tools that attack Internet calls at the application layer, gaining unauthorized access to a VoIP connection," added John Alsop, Chairman, BorderWare. "To protect VoIP communications at the application layer you need a SIP firewall that is able to authenticate the user attempting to make a connection and to provide systems administrators with the ability to easily set and enforce their VoIP security policies."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.