Protecting SIPProtecting SIP

The BrainYard - Where collaborative minds congregate.

Irwin Lazar, Vice President & Service Director, Nemertes Research

March 4, 2009

1 Min Read
information logo in a gray background | information

The SIP working group within the ITEF has just published an Internet Draft describing SIP's vulnerability to relay attack and some possible mitigations. The attack method is via a "man-in-the-middle" approach whereby the attacker inserts himself in between the victim and their outbound proxy server, and initiates a session with the victim.

Given SIP's role as the common protocol within a unified communications architecture, it's important to be aware of security threats, especially as organizations widen their adoption of SIP-to-SIP extranet connectivity and SIP trunking for PSTN access.

Read more about:

20092009

About the Author

Irwin Lazar

Vice President & Service Director, Nemertes Research

Irwin Lazar is the Vice President and Service Director at Nemertes Research, where he manages research operations, develops and manages research projects, conducts and analyzes primary research, and advises numerous enterprise and vendor clients. Irwin is responsible for benchmarking the adoption and use of emerging technologies in areas including VOIP, UC, video conferencing, social computing, collaboration, contact center and customer engagement.

A Certified Information Systems Security Professional (CISSP) and sought-after speaker and author, Irwin is a blogger for No Jitter and frequent author for SearchUnifiedCommunications.com. He is a frequent resource for the business and trade press and is regular speaker at events such as Enterprise Connect and Interop. Irwin's earlier background was in IP network architecture, design and engineering.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights