RESILIENCE &
SECURITY
Prepared for Trouble?
Any cloud dependent application needs to be robust, resilient and secure in order to become a viable proposition
and deliver user expectation for excellence. That said, there are a lot of nasty people out there that want to disrupt
networks for fun as the suppliers we spoke to how they combat threats
According to Christopher
Peters, Vice President for
EMEA Channel Sales
at 8x8, the end user and
reseller do not need to do anything
to secure VoIP systems as his
company does this for them.
“8x8 has what many regard as
the most secure platform in the
industry and is the only provider
that owns the entire technology
stack - at the heart of the service
is a robust security architecture
delivered from Tier 3/4 data
centres.
As a provider of cloud
business communications and
collaboration solutions, it is
critically important that we
deliver a secure, reliable and high
quality service to our customers.
8x8 is the only provider that
provides a guaranteed SLA for
voice quality, and all media
tra c is secure and encrypted
using industry best practice
(SRTP, TLS, and HTTPS).”
Justin Blaine at NTA,
comments on an often invisible
aspect of security – toll fraud.
“ e security and toll fraud
prevention functionality is a
must have feature for any vendor,
reseller and end customer. We
have many ways of combatting
and managing a handset / estate
of handsets for our partners.
NTA can give each handset a
daily spend limit and because our
CDR’s are live we count the cost
of the current call in real time
and can terminate the call if that
spend limit is reached this can
also be set at the global level for
all of the customers handsets.”
Ensuring adequate security
on IP telephony is of course
paramount says Dominic Horton
at Spit re.
“ ere has always been a
focus on preventing call fraud
but now that your telephony
system stores data by way of
voicemails and recordings it is
also important not to overlook
data loss.
Any IP telephony system has
to be viewed as an application
operating across multiple private
and public networks. It is not
(L-R) Dominic Horton, Christopher Peters, Enzo Viscito, Dave Reynolds, Justin Blaine
su cient therefore to simply look
at the rules on your rewall or
mailbox password as your data
traverses a long complex journey.
While the journey is indeed
complex it can be simpli ed
by adopting a solution from a
service provider that manages
that journey. At Spit re we focus
on providing an end-to-end
solution with security given equal
consideration to performance
when the entire system is
designed.”
“Resilience is a key factor our
proposition at Inclarity,” says
Managing Director Enzo Viscito.
“Clearly we are not the
only Broadsoft platform based
supplier of hosted telephony
so we have to di erentiate our
service and we consider our core
network as once of those key
di erentiators.
We have been providing
hosted telephony since 2002
and instead of being a Jack of
All Trades we are a Master of
One. Our network uptime can
be measured in years due to
the quality of our operations,
the tools we use and the
professionalism of our sta
looking after that network.”
Dave Reynolds,XelionUK
Managing Director says “at
Xelion we recognise that
telephony is a mission-critical
application for business users,
so security, resilience and
redundancy is a fundamental
component of the Xelion service
and not an after-thought. is
allows our partners to have
full con dence in the Xelion
platform.
You should expect your
suppliers to have an appointed
security o cer who oversees
and manages this aspect of the
service that you are providing to
your customers. If your hosted
voice vendor is also trunking
calls you need to make sure they
have the correct methods to spot
fraudulent activity and of course
a simple bill cap option. If you
trunk your calls separately from
your hosted voice platform this
would sit with your SIP provider.”
www.commsbusiness.co.uk IP Telephony 2019 | 25
/www.commsbusiness.co.uk