This document will bring knowledge to IT & VoIP Administrators about VoIP Security specific to SIP Trunking and Remote Phone applications. Topics such as understanding what some types of VoIP Attacks are, and how to deploy VoIP Security solutions in common applications such as SIP Trunking and Remote Phones. In the end, no one device is responsible for VoIP Security, but rather all VoIP devices and solutions must have some responsibly to overall VoIP Security.
This document complements common computing security implementations and expands into various ways to implement VoIP Security and discuss what features can be used on these devices to best deploy a secure VoIP Solution.
The whitepaper covers the following items: