SecureLogix CTO and VoIP Security Blogger Mark Collier Offers Enterprise Voice Security Predictions for 2009.SAN ANTONIO San Antonio (săn ăntō`nēō, əntōn`), city (1990 pop. 935,933), seat of Bexar co., S central Tex., at the source of the San Antonio River; inc. 1837. -- Mark Collier Mark Collier can refer to:-
- Mark Collier (actor) (b. 1971), an American stage and television actor
- Mark Collier (Egyptologist), British Egyptologist and philologist of the ancient Egyptian language
- Mark H. Collier, former president of Baldwin-Wallace College.
In summarizing his predictions, Collier noted "the poor economy will slow the adoption rate for VoIP and Unified Communications The real time redirection of a voice, text or e-mail message to the device closest to the intended recipient at any given time. For example, voice calls to desk phones could be routed to the user's cellphone when required. (UC), and the rate of pure VoIP attacks will be basically the same as in 2008. Denial of Service A condition in which a system can no longer respond to normal requests. See denial of service attack. (DoS), including floods, fuzzing See fuzz testing. , etc., will continue to be the biggest vulnerability for VoIP/UC deployments, though attacks will not be very common. However, I think the real voice security story through 2009 will be the continued increase in the types, frequency, and severity of application-level attacks against traditional and VoIP/UC voice systems, such as toll fraud, data network penetrations via modems, phone-based social engineering and identity theft, fax spam, and harassing or threatening calls."
Collier added that "a larger transition to VoIP/SIP trunking at the enterprise network edge is the real lynchpin lynch·pin
Variant of linchpin.
same as linchpin
Noun 1. that will escalate the number and frequency of pure VoIP attacks in the future. While I think we'll see a small increase in the adoption of SIP trunks in 2009, most enterprises will continue to use T1 or ISDN/PRI trunks for off-campus calls, thereby keeping VoIP security threats as largely an internal network risk or concern."
About Mark Collier
Mark Collier is CTO and VP of Engineering for SecureLogix Corporation, an enterprise telephony management and security company. Collier is responsible for technology research, development and related intellectual property, including a special focus on VoIP security solutions. He has completed publicly funded research into current and future threats to VoIP systems, protocols, and application services See ASP and Web services. , and is a recognized expert on enterprise telecom security threats and countermeasures That form of military science that, by the employment of devices and/or techniques, has as its objective the impairment of the operational effectiveness of enemy activity. See also electronic warfare. . Collier is a frequently quoted author and presenter on the topic of voice and VoIP security, and is co-author of the book, Hacking Exposed: VoIP, for McGraw-Hill's popular Hacking Exposed IT security series. Collier is a founding member of the VoIP Security Alliance (www.voipsa.com), an industry group focused on VoIP security education. He authors the telecom industry's leading blog discussing VoIP security issues at www.voipsecurityblog.com, and was named one of "The 50 Most Influential People in VoIP" by VoIPNews in 2007.
SecureLogix, a Gartner designated "Cool Vendor" and a member of the Deloitte Fast 500, is a unified communications intelligence and security company building first-of-kind solutions that secure enterprise telecom resources from attack and abuse and simplify voice network management. SecureLogix([R]) technologies are currently protecting and managing over three million corporate phone lines. The company's ETM (database) ETM - An active DBMS from the University of Karlsruhe. ([R]) System is a comprehensive solution that provides firewall security, performance monitoring, call reporting and call recording for enterprise voice networks. The ETM System has been named "Security Product of the Year" and "Most Outstanding Product of the Year" by Network Computing Storing and/or running applications in servers in a network. See cloud computing and network computer. .
Reader Contact Information
SecureLogix Corporation, 13750 San Pedro, Suite 820, San Antonio, Texas “San Antonio” redirects here. For other uses, see San Antonio (disambiguation).
San Antonio is the second most populous city in Texas, the third most populous metropolitan area in Texas, and is the seventh most populous city in the United States. As of the 2006 U.S. , 78232, 210-402-9669, fax 210-402-6996, firstname.lastname@example.org, www.securelogix.com.
ETM, SecureLogix, SecureLogix Corporation, and the SecureLogix Diamond Emblem are trademarks or registered trademarks of SecureLogix Corporation in the U.S.A. and other countries. All other trademarks mentioned herein are believed to be trademarks of their respective owners.
SecureLogix technologies are protected by one or more of the following patents: US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,700,964 B1, US 6,718,024 B1, US 6,735,291 B1, US 6,760,420 B2, US 6,760,421 B2, US 6,879,671 B1, US 7,133,511 B2, US 7,231,027 B2, US 6,226,372 B1, US 7,440,558 B2, and CA 2,354,149. U.S. and Foreign Patents Pending.
|Printer friendly Cite/link Email Feedback|
|Date:||Jan 28, 2009|
|Previous Article:||Los Angeles County Metropolitan Transportation Authority Board Authorizes Negotiation of Contract Modifications of up to $4.5 Million for Iteris'...|
|Next Article:||Gabelli & Company, Inc.'s 19th Annual Pump, Valve & Motor Symposium.|