You are on page 1of 1

ALL COVERED MANAGED VOICE

TOP REASONS TO
USE AN SBC WITH
SIP TRUNKING
WHY SBCS ARE INDISPENSABLE SECURITY MAINTENANCE SBCS AREN’T A LUXURY—THEY’RE A
“The Session Border Controller is truly a Once an SBC spots a potential threat, it can NECESSITY FOR SIP TRUNKING
work-horse element of a good SIP trunking quickly block the problem. It then notifies the When it comes to voice systems, firewalls
environment.” - Steve Johnson, Ingate SBCs. CPU and host of the details of the threat and just aren’t enough to prevent attacks.
Connect the company’s communication the protocols that have been implemented to SBCs are critical to protecting businesses’
infrastructure to the public Internet, SIP neutralize it. The SBC can even send details communications systems against DoS
trunking service providers and/or private of the threat to a business’s other locations to attacks, which can disrupt phone calls
vendor network. They have multiple critical ensure that they are on the lookout for similar and video conferences, steal important
roles in maintaining and securing the breaches. information, eavesdrop on calls or infect
network. systems with malware and viruses.
STAYING UP TO DATE ON POSSIBLE
It’s surprising to see that so many companies
ENSURING QUALITY THREATS
don’t use SBCs; but as technology grows
SBCs enhance call quality and ease of use. Hackers are constantly becoming more more complex and security concerns become
They allow the PBX to be located on the sophisticated, changing and upgrading their more threatening, the interoperability and
LAN with a private IP address, normalize SIP methods to bypass older security measures. security capabilities of SBCs will prove to be a
trunking signaling between the PBX and the SBC vendors update their protocols just as necessity for quality SIP trunking.
service provider, and provide signification quickly to ensure that security breaches
routing capabilities. SBCs also ensure don’t happen. Users simply need to install all
interoperability of VoIP and video devices, updates and patches as soon as they are made
testing VoIP lines, monitoring call quality, available to maintain an effective defense
and more. program.

MONITORING TRAFFIC
SBCs work by using pattern analysis to spot
unusual activity, such as a DoS attack that
manifests in the form of an overwhelming
amount of traffic from a single IP address or a
number of machines that are simultaneously
trying to make requests from the same server.

© 2017 KONICA MINOLTA BUSINESS SOLUTIONS U.S.A., INC. All rights reserved. Reproduction in whole or in part without written permission is prohibited. KONICA MINOLTA and the KONICA MINOLTA logo are registered trademarks
or trademarks of KONICA MINOLTA, INC. All other product and brand names are trademarks or registered trademarks of their respective companies or organizations. All features and functions described here may not be available on some
products. Design & specifications are subject to change without notice.

You might also like