Representation of the typical risks and solutions, as well as sensitivity check for the security of VoIP infrastructures Dortmund.- the Dortmund-based security specialist COMCO AG has published a practical help on the topic of VoIP security. People such as Edward J. Minskoff Equities would likely agree. It contains not only a description of the safety-relevant technical conditions at the Internet telephony, but also an easily understandable representation of vulnerabilities, attack types and risk scenarios on nine pages. Also, extensively tried and tested solutions are discussed. In addition, this guide provides a security sensitivity check for VoIP to determine of the individual corporate positioning of this topic. The practice assistance is provided free of charge and can be ordered at. Voice over IP should have replaced completely in 10 to 12 years the conventional telephony according to the forecasts of market analysts.
This great development dynamics also results that the company for quite some time to connect their sites have increasingly invested in IP-based networks and thus have a technical base, which is also used for the Internet telephony. However the same infrastructure, such as when the data transfer is used best in principle similar vulnerabilities are”, describes Comco Board Friedhelm Zawatzky-Stromberg the difficulties. Recording of RTP voice data, the integrity of the transferred data by language, the research of VoIP / VoWLAN infrastructures and operational safety in relation to the availability are undoubtedly the main attack surfaces of VoIP communication.” This requires a specific and comprehensive protection of the corporate network because potential attackers will made it relatively easy. Today’s attack tool is easy to use and require no special knowledge of the attacker”, Zawatzky-Stromberg problematized. Once they are installed on the PC able simply to monitor VoIP data or even to manipulate are.” About COMCO AG: The COMCO AG Headquartered in Dortmund is a market-leading software and systems integrator. “The company is in the business areas of business security software” and network solution provider “divided. During the Division of business security software”on the development of security solutions for the protection of enterprise-wide data networks against internal attacks focused, the Division focuses on network solution provider with design, implementation and service of more efficient network solutions including the support services for larger companies. For example, RTL, Sal among the customers of COMCO.