RICHARDSON, Texas -- Sipera Systems, the leader in comprehensive VoIP/UC security solutions, today released a software upgrade for its line of Sipera IPCS VoIP/UC security appliances. The upgrade enables enterprises to better protect VoIP networks and remote users, when deploying Cisco-based unified communications. Among other new IPCS features, Sipera added further protection capabilities for the Cisco Skinny Call Control Protocol (SCCP) along with encryption (TLS and SRTP) and 2-factor authentication (RSA SecurID) support for Cisco 7941 and 7961 phones.
This latest release continues to enhance our award-winning Sipera IPCS products with first of its kind protection and security features for Cisco Skinny-based deployments, said Eric Winsborrow, CMO of Sipera Systems. The additional threat prevention and secure access functionality ensures enterprises utilizing Cisco VoIP infrastructures can more quickly and securely realize the benefits of unified communications, while further tightening VoIP security overall.
The Sipera IPCS upgrade further expands the product familys ability to protect, control and enable VoIP remote users, with external hard phones, soft phones and WiFi/dual-mode phones, by adding the following additional functionality:
- High availability with sub-second failover, even for encrypted media (SRTP), to ensure the service is always on and protected,
- Proxy support for remote user phone configuration (TFTP) and phone services (HTTP), such as corporate directory and help information, to allow off-site configuration and authorization for remote users, and
- VoIP VPN support, including encrypted signaling (TLS) and media (SRTP), on the IPCS 310 platform, allowing smaller enterprises to cost effectively adopt this security functionality, which was previously only available on the larger-scale IPCS 410 and 510 appliances.
To provide comprehensive protection in real-time, the Sipera IPCS products offer unified communications (UC) threat prevention using a variety of sophisticated VoIP-specific security techniques including anomaly detection, protocol scrubbing, behavior learning and fingerprint verification. These appliances also incorporate UC policy compliance functionality, which enforces granular security polices to all UC traffic, based on user, device, network and time of day, and ensures secure UC access, to guarantee the privacy and authentication of all UC traffic to the enterprise and handle session border control issues, such as firewall/NAT traversal, in a single security device.