Imagine that you deliver an application with 100%, instant-on availability. Security is rock-solid. Costs are dropping. Users never complain. And anytime you upgrade, even if you buy software and gear with new features from a different vendor, user acceptance is always immediate and training virtually nil.
That's your phone system. And VoIP threatens to break it by opening your phone network to the profusion of security hazards your IT environment faces.
That's not to say our POTS (plain old telephone service) is unbreakable. One of the legends of hacking is Cap'n Crunch, who got his nickname from decoding the audible signals on phones by using a whistle from a box of the cereal. The hackers who followed in his footsteps didn't break into POTS for the free long-distance service. They did so to access the computers connected to it. But they don't need POTS any longer; they've got the Internet now.
So users have been able to ring you up when their systems have crashed after someone let loose variants of the SoBig or Klez viruses on your network. But with VoIP, users might not even be able to do that, since its infrastructure is vulnerable to the same attacks by the world's bottomless pit of sociopathic hackers.
VoIP security isn't just important. It's everything. Steven Harris, an analyst at IDC, sums it up simply: "Security is a precondition to a deployment of VoIP."
That's a tough precondition, given that VoIP technology is built largely on Linux or Windows, uses Web application servers, runs over the IP network and, in some cases, uses the browser as an alternative to a handset. Is there anything in that list that doesn't have gaping security holes in it? The list doesn't include the VoIP application. And research firm Gartner claims that about three-fourths of the security attacks in 2005 will strike at the application level. If you think VoIP apps won't be favorite virus targets, you're wrong.
Edwin Mier tested VoIP products from Cisco Systems and Avaya last year for Network World, one of our sister publications, and concluded that while security is "possible," it's so complex and vendor-specific that only the bravest and the smartest will deploy it widely . He left out the foolhardy.
So, why on Earth would any sane IT manager want to get involved with a project as risky as VoIP? Well, your CFO likes it, for one. IDC, among others, is telling him that 20% savings on telco charges "is common." For companies that run up millions of dollars per month in phone costs, that kind of savings can be very compelling.
But compelling enough? Mike Hrabik, chief technology officer at Solutionary, which does security risk management in Omaha, says IT managers need to be aware that VoIP systems must be patched for security as often as your app servers. However, he warns, some VoIP vendors lag as much as 30 days with patches for the OEM systems they deploy, leaving your phone network vulnerable even after you've patched the IT side.
Hrabik, whose company uses VoIP for internal and some branch-office connections, thinks cost savings are nice, but the best reason to use VoIP is to deliver more-productive applications, such as integrating both voice mail and e-mail so users can get all of their messages from any device -- cell phone, laptop, PDA or whatever. For a company with a large field sales and support organization, that kind of application could generate more dollars in sales than it saves in telecommunications costs.
Combining substantial cost savings with a significant productivity boost might indeed be worth the risk of jumping into the shallow end of the VoIP pool to get comfortable with the technology.
Jim Vale, a product manager at network management and analysis firm Network General in San Jose, says there are some basic ways to design a secure VoIP network. First, conduct a comprehensive vulnerability analysis of your network and of the VoIP gear before you attach anything to your network. Next, segment your VoIP traffic, which isolates security problems and has the added benefit of dedicating that segment for streaming protocols used by voice. Also, apply quality-of-service rules for your IP traffic, assuring priority for streaming data. Dropped calls and poor aural performance can be indicators of a security problem. Finally, monitor like crazy.
Rolling out VoIP only to save money isn't worth the risk. Coupling savings with a powerful application might make it worth a very careful try. But just barely.Mark Hall is a Computerworld editor at large. Contact him at email@example.com.
- VoIP Goes Mainstream
- VoIP: Ready for Prime Time
- Snapshot: The Seattle Times Co.
- VoIP Case Study: Small Project Works Out the Kinks
- VoIP Case Study: Wireless Joins Hospital's VoIP Mix
- VoIP Case Study: Call Centers Put on Speed Dial
- VoIP Case Study: Fashion Designer Gets Hip to IP
- VoIP Is Scary
- The Hidden Costs, and Savings, of VoIP
- The VoIP Management Challenge
- Breaking Through IP Telephony
- VoIP Security Rating Scale
- Ground Rules for VoIP Security Testing
- Laying the Groundwork for IP Telephony
- Bridging the IP Migration Gap
- The VoIP security checklist
- VoIP Security a Moving Target
- A VoIP Security Plan of Attack
- Avoiding Potholes on the VoIP Path
- Computerworld VoIP Data Points
Read more about Networking in Computerworld's Networking Topic Center.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!