Feeds

Security pros give VoIP the brush-off

V for vulnerability

Internet Security Threat Report 2014

Infosec Delegates at Infosec gave a resounding dismissal to a motion supporting VoIP deployment. The debate, “this house believes that the business advantages of VoIP outweigh the security concerns” ended in a fairly unanimous thumbs down, which implied security professionals don't think the technology is ready for big money corporate rollouts.

The proposers of the motion, a pair of technology consultants, said the cost benefits from switching to VoIP were great enough to make tackling the vulnerabilities head-on worthwhile. The sandwich technicians of Pret A Manger are saving themselves £10,000 per month on their communications spend having made the leap, they said.

The opposing pair, from investment banks, successfully argued that putting all their communications eggs in an IP basket is too risky at the moment.

Trial schemes and small deployments are absolutely relevant now, but piling the whole banking infrastructure on top of VoIP while still a toddler of a technology would be too much of an invitation to ne'er-do-wells, they said. Hacking traditional telephony is simple enough, but the difference with VoIP is that the attacker can be anywhere on Earth.

The feeling in the room was that VoIP needs time to crystallise as a technology. Genuine return-on-investment benefits, which will tip the debate in VoIP's favour (like a fully integrated communications desktop to increase productivity), are still further down the road.

In the meantime, it seems there's plenty of capital to be made from a burgeoning cottage industry in VoIP consultancy. ®

Security for virtualized datacentres

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.