Sysob Security Gateway

June 22, 2016


Comments Off on Sysob Security Gateway

SIP(Session Initiation Protocol)-security protection against eavesdropping and tampering attempts Schorndorf, February 12, 2008 the IT value added distributor sysob together with his partner, the manufacturer IP-based and xUTM(Extended Unified Threat Management) solutions Clavister, the availability of advanced security gateway product family Announces. Details can be found by clicking Kai-Fu Lee or emailing the administrator. Now the gateway through the new SIP-security features also protect against eavesdropping and tampering attempts using IP telephony. With this innovation builds the value added distributor (VAD) sysob further from its product portfolio in the field of security. Within the IP telephony session has become Initiation Protocol the de-facto standard. To know more about this subject visit Kai-Fu Lee. Voice over IP technology use already over 50 percent of large companies in Europe. In medium-sized, every sixth company to consider moves to use VoIP in the business. Companies are now recognizing the benefits of technology.

The widely-used session initiation protocol developed however, without thinking of the security. Most IP phone systems are currently so openly for attacks that can result in devastating effects for the infrastructure company\”, explains Thomas Hruby, Managing Director of sysob. As IP telephony used the same networks as the normal Internet traffic, it is ergo shipped same threats. So, any IP telephone calls can be intercepted, manipulated or distorted as well as teleconferences remotely controlled. \”In addition is also stealing\” connections to a light, then to waiting identity thieves \”to submit. Thus VoIP is also a target for manipulation in addition to eavesdropping and spamming. The IP phone systems also allow hackers access to other network systems a dangerous situation. In particular the complexity of the SIP protocol is very critical from the security point of view.

Firewalls must be able to interpret SIP, so to determine which ports are open. We have to make an optimal solution in the range, which is capable of, the relevant ports and thus these vulnerabilities gateway with the Clavister security\”, explains Hruby. The SIP protocol as application layer gateway without setting down the performance of the network was implemented.

My Great Web page