This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Based on a continuously updated threats database, VoIPaudit is promised to be both comprehensive and highly scalable.
VoIPshield Systems Inc. has just launched a new voice over IP (VoIP) vulnerability assessment solution that will allow organizations to respond to threats before they affect IP telephony systems and services.
Based on a continuously updated threats database, VoIPaudit is both comprehensive and highly scalable. It can be set to scan continuously or periodically and provides support for a wide range of VoIP protocols, including session initiation protocol (SIP), International Telecommunication Union (ITU) H.323, Cisco Skinny, Nortel Unistim, and other proprietary protocols. VoIPaudit also support wireless VoIP services IMS and dual mode mobile phones.
According to VoIPshield, VoIPaudit features and easy-to-use interface with a range of analysis and reporting tools. Its reporting features allow use to do a complete vulnerability analysis or produce a quick security summary.
"Ours is the first security solution which can not only address the complexity of voice deployments, but secure the VoIP network at the systems level," VoIPshield Systems CEO C. Paul Slaby said in a statement. "VoIPaudit is designed to meet the unique requirements of enterprises and service providers deploying VoIP. Voice communications are critical and VoIPaudit offers an unprecedented level of intelligence and security assessment for all the equipment and devices in the VoIP network."
VoIPaudit is available now at prices starting at $10,000. The solution includes training and support.
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
The State of IT & Cybersecurity Operations 2020Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!