No Jitter is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Is it Finally Time to Consider UC Security?

Securing VoIP and UC traffic has been a topic that our industry has danced around for many years now, but we’ve never really taken this topic all that seriously. I think I wrote my first VoIP security report in 2003 or possibly even earlier, where I looked at all the things that could go wrong, and there are many. The risks are somewhat sizable too. Yankee Group research shows that, depending on the vertical, an hour of downtime for an IP PBX could be as much as $2 million. However, despite the industry hype, the possible risks and threats, the security market for communications technology is almost nothing. So why is that?

One of the main reasons is that network and telecom managers don’t feel that there's a huge risk when it comes to communications, and with legacy architectures, that's somewhat true. Until recently, most IP PBX and UC deployments have had the IP portion isolated to the internal network only. So, typical deployment is to run IP and SIP on the line side of the IP PBX and then everything that is trunk facing is traditional old PSTN stuff; with the IP environment isolated to the internal network, the risk level is minimal.

I also think the VoIP security industry itself has done a poor job of helping customers understand what the real threats are and what they aren't. Things like denial of service attacks (which can cause outages), toll fraud and eavesdropping are real threats, but issues like voice phishing and spam over IP (SPIT) are a little harder for people to grasp. What I've seen out of the VoIP security is that most of the vendors there make all of the security issues urgent instead of picking the two or three issues that could cause the most damage. When 50 things are all critical then really nothing is because it’s too big a problem to address.

The first issue I mentioned is the big barrier, though, and the architecture used to support VoIP and UC is changing. SIP trunking has been on fire over the past 12 months (look at the performance of Acme Packet stock). I've had more inquiries in the past 12 months regarding SIP trunking than in the past 10 years combined. SIP trunking was also a hot topic at the last VoiceCon and will continue to gain momentum. SIP trunking is tremendously powerful as it helps streamline the architecture, creates flexibility and extends the IP connectivity all the way to the telco cloud. However, the extension of IP all the way to the cloud now removes the natural security barrier that was in place with the old architecture.

Additionally, all of the new systems such as Avaya Aura, Cisco Session Manager and other similar products are designed to have all the call control capabilities collapsed down into one or two data centers instead of having the telephony capabilities dispersed across the organization. That means anyone who hacks into the IP PBX has information across the whole organization. Under the "old architecture", if you hacked into the IP PBX you would have visibility to that local branch only. So again, the risk level is up.

Lastly, the world is moving to standards such as SIP and SIMPLE. We do voice over it today and will do IM, presence, video, etc down the road. This is standards based stuff too, not standards with proprietary extensions. The beauty of this obviously is that it allows for better interoperability down the road (in theory) and permits the likes of Google and Yahoo to enter this market as well. The downside is that it’s easier for hackers now because the protocol used is being used by mainstream vendors.

There is evidence of the increased likelihood of threats and their possible impact. For example:

* From 2005 to 2007 there were fewer than 10 "high profile" attacks for the three years combined. That is, attacks with big name companies that draw media attention.

* In 2008 there were 8 attacks, the sum of the three previous years

* In 2009 that number almost doubled to 15

* So far in 2010 we've had as many high profile attacks to date as we did all of last year. This includes UC attacks on Amazon, Cisco, Polycom, Google, etc. In fact back in February, the Wall Street Journal did a story on caller ID spoofing which raised some awareness.

So this SIP based architecture combined with more SIP trunking services, standards-based over-the-top services and a new architecture have all helped evolve the UC market more in the past year or so than in the previous five years combined. We're able to put UC capabilities in so many more places and integrate into applications and processes in a way we couldn't before.

However, by not taking the security side of our industry seriously over the past few years we have left ourselves somewhat exposed. We haven't had a really big name company have a disaster yet, but there’s one likely due.

Because of this, I do see an increase in the UC security specialists such as Redshift and Sipera garnering more attention over the next 12 months or so. I can also see a company like Acme Packet embedding security into their products. So to answer the question, is it time to take UC security seriously? My answer is yes.