For years I have been covering VoIP security and throughout this time it has been a one-sided conversation as there have been few documented cases of VOIP security attacks. Companies are generally not too happy to discuss VoIP security breaches so this news shouldn’t be very surprising to anyone.
In the absence of news regarding companies who have had voice or video conversations compromised, vendors in the VoIP security market have been proactive. Some such as Sipera have revealed
vulnerabilities of existing equipment and more recently one person has even released a proof-of concept program named SIPtap with the goal of showing how easy it is -- once a program is slipped onto a corporate computer via a Trojan horse or some other means, to record enterprise VoIP calls as WAV files for later analysis.
The person behind this proof of concept program is Peter Cox who co-founded and was CTO of BorderWare, a company in the VoIP security and session border control space. I first wrote about the company in August, 2005 in a blog entry titled Secure VoIP
and I covered them more recently in an entry titled Borderware's SBC Strategy
Cox left BorderWare and has his own VoIP Consultancy which will be up and running in 2008 according to PC World
The issue of protecting VoIP calls is likely something corporate decision-makers gloss over all too often and just because companies are not reporting more security incidents, does not mean they aren’t happening.
In the end, if you are responsible for the IP communications infrastructure of your company you need to be 100% up to date on the latest solutions on the market.
For this reason it is essential you study the problem as thoroughly as time allows and network with others in the space.
One way to do this is to attend TMC's Internet Telephony Conference & Expo
in Miami, January 23-25, 2008 where there is a session titled Security Challenges in the Enterprise
, which takes place Wednesday – January 23, 2008, 1:30-2:15pm EST.
As more and more crucial information gets carried over internet protocol networks, the incentive to eavesdrop on these conversations will grow dramatically.