Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cisco Survey Shows Network Tops Challenges for Cloud Adoption: Page 2 of 2

Protecting the security of voice networks is just as much a concern to enterprises as security of data networks, as Cisco notes in its introduction of a new security offering at Interop. The Cisco UC Gateway Services API enables the development of voice network edge services on the Cisco ISR G2 router. The Integrated Services Router is typically seen in branch offices such those of a bank.

Voice networks are vulnerable to fraud in at least two ways, according to Jason Rolleston, marketing director in the Cisco SRTG: In some instances, someone can surreptitiously call into a corporate network and then call out, leaving the business to pay the phone bill. In another instance, a hacker can compromise the provider of a 900-number business service, siphoning off the revenue. According to a 2011 survey by the Communications Fraud Control Association, telecom fraud losses are estimated at $40 billion globally.

Using the API, networks can be monitored to detect and thwart suspected malicious activity. Once detected, the API can apply appropriate policy action by the Cisco voice gateway, such as call termination, call redirection or call recording.

Cisco presented a case study of how British Telecom is using Cisco UCS Gateway UPIs, in a partnership with SecureLogix, to deliver voice network policy and security applications to run on the ISR G2 router.

Notably, the services created by the API can run effectively on both time-division multiplexing (TDM) and session initiation protocol (SIP) trunking networks, Rolleston says. Many networks are being upgraded to the SIP standard, but TDM networks are still in operation in many places around the globe.

"The world is moving from TDM to SIP over time, and so by having a platform that can support both of these, we are actually able to help people migrate more effectively," he says.

Interop, which runs through Thursday, is produced by UBM TechWeb, which also publishes Network Computing.

Learn more about Strategy: Identity and Access Management: An Introduction by subscribing to Network Computing Pro Reports (free, registration required).