Story image

How to deliver real-time communication without network failures

04 Jan 2019

Article by Verizon collaboration and customer experience solutions regional leader Stephen Edwards

Organisations are constantly under pressure to deploy secure, high-quality voice and video services on which all users can connect, collaborate and communicate seamlessly.

So, when it comes to deploying IP-based real-time communication services such as SIP trunking, Voice over IP (VoIP) and Unified Communications (UC), the workforce is demanding low-latency digital media and unified communications solutions where users can communicate even across disparate platforms and devices.

This is what’s driving enterprises to apply network virtualisation to their unified communications.

One way this can be delivered is via Session Border Controller (SBC).

Session Border Controller-as-a-Service (SBCaaS)

SBCs were initially deployed in VoIP networks to operate much like interworking “traffic cops” for Session Initiation Protocol (SIP) sessions, interactive media communications and other media streams involved in setting up, conducting and tearing down telephone calls.

Until now, delivering any VoIP or UC solution meant investing in purpose-built appliances and proprietary software licenses for each location.

Aside from the considerable upfront investment, the installation of new circuits could take weeks, followed by layers of potential failure points and complicated configuration, which could also take several days.

SBCaaS was designed to offer organisations a stable communication infrastructure.

It allows users to remotely and dynamically control the configuration while simplifying service charge and policy management.

SBCaaS, like other virtualised networks, operates on a pay-as-you-go subscription model, which means organisations are able to be flexible and scalable while improving their cost management and limiting their reliance on dedicated network hardware.

This ultimately reduces the potential of network failures.

Additionally, like traditional SBC, SBCaaS can also serve as the first line of defence against a range of cyber attacks and allow organisations to stay ahead of evolving security threats without putting their brand in harm’s way.

Drawbacks to consider

While virtualising SBC has cost efficiencies and the first line of defence advantages, it’s only effective if it’s efficiently managed. 

Otherwise, it has the potential to affect an organisation’s wider virtualised network.

Organisations need to analyse carefully if SBCaaS is suitable for their business needs by making sure it can perform and scale the way it’s required – for example, ensuring its capability to handle denial of service attacks at scale and looking closely at how tasks are architected in the network.

A poorly performing SBC can be a hard problem for an organisation to solve.

Where these deployments were once an IT decision, it’s now a business decision.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
WikiLeaks' Julian Assange arrested in London
There’s little doubt that it’s a day of reckoning for WikiLeaks cofounder Julian Assange today, after his seven-year long protection inside London’s Ecquador Embassy came to an abrupt end.