This webinar was originally broadcast on:
Wednesday, November 04, 2015 02:00 PM EST / 11:00 AM PDT
If you have previously registered for this event, please login here:

Registration is required to attend this event. Please register now.
First Name*
Last Name*
Company Size*
Street Address 1*
Street Address 2
NEW!... Early Registration!
 Check here if you would like to automatically be registered for webinars on the same topic
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
Please enable Cookies in your browser before registering for the webcast.
*Denotes required.
Over the last few years, enterprises have started to shift toward Unified Communications (UC) platforms that bring voice, video and data together. While the positive aspects of moving to a unified, IP-based communications model are too compelling to ignore—reduced costs, higher quality, more features, improved productivity—so too are the security risks that present themselves once an enterprise opens its real-time communications to the Internet. In particular, the shift from circuit-switched voice networks to an IP-based voice network creates a new entryway for IP-based attacks, including Denial-of-Service (DoS), information/identity theft and toll fraud. If you believe that voice networks are less likely to be targeted than data networks, think again. The Communications Fraud Control Association (CFCA) estimates that fraud alone cost the industry $46.3 billion in 2013, proving that voice communications systems remain a lucrative target for hackers and thieves.

For many enterprises, the thought of securing real-time communications seems overwhelming. Not sure where to start? The answer is as simple as S-B-C. Session Border Controllers (SBCs) are generating quite a bit of attention for many reasons, including:
  • Securing the network border against unwanted/unauthorized intrusion;
  • Preventing network flooding as a result of DoS and Distributed Denial-of-Service (DDoS) attacks; and
  • Hardening the security of enterprises’ network services and connections to remote clients to prevent illegal use (e.g., toll fraud) by external users.

Join the discussion to learn the essentials of protecting the network from IP-based attacks and how an SBC can play a critical role in securing your communications infrastructure.


Gordon Eddy
Director, Product Management

Umar Kabir
Product Manager


Peter Bernstein
Senior Editor