SMB CommunicationsIs VoIP Secure?1 - 20
Introduction | Is VoIP Secure?Jonathan GreenwoodManaging Director snom UK Ltd&Product Manager – snom ONE
Jonathan Greenwood | Is VoIP Secure?Re-name this presentation to…
Jonathan Greenwood | Is VoIP Secure?Is your house secure?
Jonathan Greenwood | Is VoIP Secure?Leave the door unlocked
Jonathan Greenwood | Is VoIP Secure?
Jonathan Greenwood | Is VoIP Secure?Leave the window open
Jonathan Greenwood | Is VoIP Secure?
Jonathan Greenwood | Is VoIP Secure?Leave the key under the mat
Introduction | Is VoIP Secure?
Jonathan Greenwood | Is VoIP Secure?What happens?
Jonathan Greenwood | Is VoIP Secure?What happens?You will be attacked
Jonathan Greenwood | Is VoIP Secure?There is no difference!
Jonathan Greenwood | Is VoIP Secure?We all have email
Jonathan Greenwood | Is VoIP Secure?User NameandPassword
Jonathan Greenwood | Is VoIP Secure?OR
Jonathan Greenwood | Is VoIP Secure?Door, KeyandAlarm
Jonathan Greenwood | Is VoIP Secure?User NameandPassword990@my-sip-domain.com
Jonathan Greenwood | Is VoIP Secure?Is VoIP different?
Jonathan Greenwood | Is VoIP Secure?NO!
Jonathan Greenwood | Is VoIP Secure?Is VoIP Secure?
Jonathan Greenwood | Is VoIP Secure?Yes and No
Jonathan Greenwood | Is VoIP Secure?No if youLeave your front door open
Leave your windows open
Tell the world your alarm code
Allow the world to guess your alarm codeJonathan Greenwood | Is VoIP Secure?There is no difference!
Jonathan Greenwood | Is VoIP Secure?Deploy secure VoIP Systems!
Jonathan Greenwood | Is VoIP Secure?Deploy secure VoIP Systems!Basic IT Security
Jonathan Greenwood | Is VoIP Secure?SMB – Can I do it?
Jonathan Greenwood | Is VoIP Secure?Yes
Jonathan Greenwood | Is VoIP Secure?SMB – Is it easy?
Jonathan Greenwood | Is VoIP Secure?Very Easy
Jonathan Greenwood | Is VoIP Secure?SMB – What do you need?
Jonathan Greenwood | Is VoIP Secure?Use the right equipment
Secure Telephone System
Secure IP Phones
Secure PSTN/SIP Connectivity
Security between System and Phones
Create a basic security guide
Employ a trained resellerJonathan Greenwood | Is VoIP Secure?What are we trying to protectwith VoIP?
Jonathan Greenwood | Is VoIP Secure?Traditional telecoms are closed
Jonathan Greenwood | Is VoIP Secure?IP Telephone Systems
Jonathan Greenwood | Is VoIP Secure?IP Telephone SystemsRun on networks
Jonathan Greenwood | Is VoIP Secure?EavesdroppingInternal
High risk
Listen to Management calls?Jonathan Greenwood | Is VoIP Secure?EavesdroppingExternal
Harder to do
Still possible
Man in MiddleJonathan Greenwood | Is VoIP Secure?Denial of Service (DOS)System Attack
Flooded by hackers
Chaos OR Fraud
Can your system handle it?Jonathan Greenwood | Is VoIP Secure?Toll FraudBreached system
High phone bills
Who pays
Who is responsible?Jonathan Greenwood | Is VoIP Secure?Lost Voicemail + CDRsStolen voicemail
Company exposure
Should CDRs be available?
Who called who?Jonathan Greenwood | Is VoIP Secure?Keep everyone happyInternal users
Home users
Road warriors
Remote offices
Accountant
Business OwnerJonathan Greenwood | Is VoIP Secure?Who cares?IT Managers secure networks
Can IT administrators listen
VoIP – Lack of security makes great news
Don’t allow an employee tap calls
You should care!Jonathan Greenwood | Is VoIP Secure?Back to
Jonathan Greenwood | Is VoIP Secure?Use the right equipment
Secure Telephone System
Secure IP Phones
Secure PSTN/SIP Connectivity
Security between System and Phones
Create a basic security guide
Employ a trained resellerJonathan Greenwood | Is VoIP Secure?Use the right equipment
Secure Telephone System
Secure IP Phones
Secure PSTN/SIP Connectivty
Security between System and Phones
Create a basic security guide
Employ a trained resellerJonathan Greenwood | Is VoIP Secure?IP Phone system must be able doTLS
SRTP
HTTPS
DOS Prevention
Intrusion Prevention
Access ListsJonathan Greenwood | Is VoIP Secure?TLSTransport Layer Security
Encrypts SIP packets
Similar to HTTPS
Hides IP addresses, ports
Protects the signallingJonathan Greenwood | Is VoIP Secure?
Jonathan Greenwood | Is VoIP Secure?SRTPSecure Voice (RTP)
Encrypts media
If captured you hear white noiseJonathan Greenwood | Is VoIP Secure?HTTPSSecures the web traffic
Prevents Password loss
Man in the middle grabbing data
Would you do online banking withoutJonathan Greenwood | Is VoIP Secure?DOS
Jonathan Greenwood | Is VoIP Secure?DOSCan take your entire system down
Can your IP Telephone system continue when under attack?Jonathan Greenwood | Is VoIP Secure?Intrusion PreventionBlocks IP Addresses (Blacklist)
Allows IP Addresses (Whitelists)
No use of CPU
No processing
Bins rogue SIP packetsJonathan Greenwood | Is VoIP Secure?
Jonathan Greenwood | Is VoIP Secure?Yes we do IPv6

More Related Content

PPTX
PrivateGSM - Voice Encryption Technical Overview
PPT
Ict encryption agt_fabio_pietrosanti
PPTX
Protect your IPPBX against VOIP attacks
PDF
SIP Security Best Practices
PPT
Cd213 percy-audiocodes
PPTX
Elmat - Presentazione Aziendale
PDF
Abdullah Al Mamun 062507056
PPTX
Fortinet Tanıtım
PrivateGSM - Voice Encryption Technical Overview
Ict encryption agt_fabio_pietrosanti
Protect your IPPBX against VOIP attacks
SIP Security Best Practices
Cd213 percy-audiocodes
Elmat - Presentazione Aziendale
Abdullah Al Mamun 062507056
Fortinet Tanıtım

What's hot (6)

PDF
Voice over IP
PPTX
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
PPT
Pinnacle Business Review
PDF
Secuvoice SNS - Christoff Erdman
PPTX
INTOSTREAM INTRO_2016_SEP
PDF
ManagedISDNandIPEncryption
Voice over IP
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Pinnacle Business Review
Secuvoice SNS - Christoff Erdman
INTOSTREAM INTRO_2016_SEP
ManagedISDNandIPEncryption
Ad

Viewers also liked (20)

PDF
Nec display solutions expands px series with two new professional models
PDF
2012 New York State of the State Address - Andrew Cuomo
PDF
Norse Energy Article 78 Lawsuit Against Gov. Cuomo, DEC Com. Martens, and DOH...
PDF
موانع اصلی تقریب و وحدت میان شیعیان و اهل سنت
PDF
Lawsuit Filed Against Middlefield, NY to Repeal Ban on Gas Drilling
PPT
Rossi anci-er - l'idea del futuro - 4 mag 2013
PPT
Rossi anci-er - patto dei sindaci - 16 novembre 2012
PPTX
The lync to enterprise voice
PPTX
Next generation customer contact
PDF
Pacifiers, Breastfeeding And Soothing
PDF
Lezione 12 bis 2013 seo doc google
PDF
جامع الروايات في تحقق نبوءات النبي صلى الله عليه وسلم
PDF
Assessment of New York City Natural Gas Market Fundamentals and Life Cycle Fu...
PDF
E idea country presentation - thailand- yammy
PDF
App-Fraley
PDF
Trapper Keeper Inserts
PDF
Letter from Enviro Groups to NY Health Com. Nirav Shah and DEC Com. Joe Martens
PDF
Lezione 4 13 long tail e metadati
PDF
metaLayer Tech@State: Data Visualization
PDF
Business model canvas e-idea
Nec display solutions expands px series with two new professional models
2012 New York State of the State Address - Andrew Cuomo
Norse Energy Article 78 Lawsuit Against Gov. Cuomo, DEC Com. Martens, and DOH...
موانع اصلی تقریب و وحدت میان شیعیان و اهل سنت
Lawsuit Filed Against Middlefield, NY to Repeal Ban on Gas Drilling
Rossi anci-er - l'idea del futuro - 4 mag 2013
Rossi anci-er - patto dei sindaci - 16 novembre 2012
The lync to enterprise voice
Next generation customer contact
Pacifiers, Breastfeeding And Soothing
Lezione 12 bis 2013 seo doc google
جامع الروايات في تحقق نبوءات النبي صلى الله عليه وسلم
Assessment of New York City Natural Gas Market Fundamentals and Life Cycle Fu...
E idea country presentation - thailand- yammy
App-Fraley
Trapper Keeper Inserts
Letter from Enviro Groups to NY Health Com. Nirav Shah and DEC Com. Joe Martens
Lezione 4 13 long tail e metadati
metaLayer Tech@State: Data Visualization
Business model canvas e-idea
Ad

Similar to SMB Communications - is VoIP secure? (20)

PPT
VoIP Security
PPT
ETel2007: The Black Bag Security Review (VoIP Security)
PPT
Voippresentation
PPT
Meletis Belsis - Voip security
PPT
Voice Over IP Overview w/Secuirty
PPT
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
PDF
why-your-network-needs-an-sbc-guide.pdf
PDF
Raisul Haq Rajib (063435056)
PDF
Voip (In)Security - AfricaHackOn v2
PDF
VoIP (Voice over Internet Protocol).pdf
PDF
SIP, Unified Communications (UC) and Security
PDF
1, prevalent network threats and telecommunication security challenges and co...
PPTX
VOIP security
PDF
Misrepresentation is not considered a generic security issue in VoIP.pdf
PPT
Vo ip overview
PDF
It’s time to boost VoIP network security
PPT
Voice over IP By SAIKIRAN PANJALA
DOC
Voip
PPT
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...
VoIP Security
ETel2007: The Black Bag Security Review (VoIP Security)
Voippresentation
Meletis Belsis - Voip security
Voice Over IP Overview w/Secuirty
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
why-your-network-needs-an-sbc-guide.pdf
Raisul Haq Rajib (063435056)
Voip (In)Security - AfricaHackOn v2
VoIP (Voice over Internet Protocol).pdf
SIP, Unified Communications (UC) and Security
1, prevalent network threats and telecommunication security challenges and co...
VOIP security
Misrepresentation is not considered a generic security issue in VoIP.pdf
Vo ip overview
It’s time to boost VoIP network security
Voice over IP By SAIKIRAN PANJALA
Voip
Positive Hack Days. Gurzov. VOIP - Reduce Your Expenses, Increase Your Income...

More from Unified Communications Online (20)

PDF
Developing a Social Business approach at Standard Life
PDF
Essential email security …business requirements and competitive landscape
PPTX
How can Private Cloud UC enable your business
PDF
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...
PPTX
Delivering UC Flexibility
PPTX
The ucc ecosystem with lync at the heart
PPTX
Don't rip it lync it
PDF
Microsoft and polycom, transforming unified communications, microsoft, polycom
PDF
How can collaboration and communications tools effectively drive business per...
PPTX
What’s new in lync 2010, microsoft
PDF
Lessons learnt from implementing enterprise social software at cisco
PPTX
Transform the way you work with online collaboration save time, money and i...
PPTX
The new workspace - putting people at the centre of collaboration
PPTX
PPTX
Changing behaviours. for good
PPTX
Business intelligence & collaboration
PPTX
Transform the way you work with online collaboration save time, money and i...
PPTX
Transform the way you work with online collaboration save time, money and i...
PPTX
Star wars and social CRM
PPT
Social collaboration 10 must have tips for security, productivity and compliance
Developing a Social Business approach at Standard Life
Essential email security …business requirements and competitive landscape
How can Private Cloud UC enable your business
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...
Delivering UC Flexibility
The ucc ecosystem with lync at the heart
Don't rip it lync it
Microsoft and polycom, transforming unified communications, microsoft, polycom
How can collaboration and communications tools effectively drive business per...
What’s new in lync 2010, microsoft
Lessons learnt from implementing enterprise social software at cisco
Transform the way you work with online collaboration save time, money and i...
The new workspace - putting people at the centre of collaboration
Changing behaviours. for good
Business intelligence & collaboration
Transform the way you work with online collaboration save time, money and i...
Transform the way you work with online collaboration save time, money and i...
Star wars and social CRM
Social collaboration 10 must have tips for security, productivity and compliance

Recently uploaded (20)

PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
The AI Revolution in Customer Service - 2025
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
SaaS reusability assessment using machine learning techniques
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Early detection and classification of bone marrow changes in lumbar vertebrae...
The AI Revolution in Customer Service - 2025
Build automations faster and more reliably with UiPath ScreenPlay
4 layer Arch & Reference Arch of IoT.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
Training Program for knowledge in solar cell and solar industry
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
LMS bot: enhanced learning management systems for improved student learning e...
Build Real-Time ML Apps with Python, Feast & NoSQL
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
SaaS reusability assessment using machine learning techniques
Module 1 Introduction to Web Programming .pptx
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Auditboard EB SOX Playbook 2023 edition.
Electrocardiogram sequences data analytics and classification using unsupervi...
giants, standing on the shoulders of - by Daniel Stenberg
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC

SMB Communications - is VoIP secure?