Enterasys package secures VOIP systems

Enterasys package secures VOIP systems

Enterasys Secure Open Convergence works with VoIP systems from 3Com, Alcatel, Asterisk, Avaya, Cisco, Mitel, NEC , Nortel, Panasonic, Polycom, ShoreTel, and Siemens.

Enterasys Networks this week unveiled a security system for enterprise VOIP networks.

Called Enterasys Secure Open Convergence, the system comprises Enterasys security software applications and the company's switching, routing and wireless infrastructure products. It is designed to detect and respond to security threats against the IP telephony infrastructure, enforce network access-control policies, and comply with regulations such as CALEA and E911, Enterasys says.

The Enterasys NAC and Dragon security software detects unauthorized use of VOIP systems, prevents service disruption and eavesdropping, and monitors voice networks for new threats. The Dragon Intrusion Detection/Prevention System offers signature and protocol behavioral analysis for H.323 and SIP protocols.

The Enterasys NAC software assesses, authenticates and authorizes VOIP users and telephony devices before allowing them onto the network, and enforces role-based policies after they are connected, Enterasys says.

E911 compliance is enabled through location services in Enterasys NAC that identify the user and physical location when an emergency call is placed. Compliance with the Communications Assistance for Law Enforcement Act (CALEA) allows individual voice conversations or calls to/from a specific user to be redirected from an Enterasys Matrix switch for subsequent recording and analysis, Enterasys says.

The company's switches, routers and wireless connectivity devices also have embedded policy-based security features on every interface, the company says. The company's Matrix switches are able to separately secure and prioritize a phone, camera, printer and computer connected to a single network port and provide flow-based visibility over individual voice, video and data conversations, Enterasys claims.

Policy is controlled through Enterasys' NetSight suite of management applications. Policies are based on user and application rather than port or VLAN access control lists, Enterasys says.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.



IN PICTURES: AWS re:play 2015 (+28 photos)

IN PICTURES: AWS re:play 2015 (+28 photos)

The official afterparty for AWS re:Invent 2015 was held at the Linq carpark in Las Vegas. Attendees were fenced in by stacks of shipping containers and were treated to food and drinks from some of the city's best known restaurants and bars. The entertainment ranged from mini golf to the giant Intel video game wall, music was provided by DJs Team Ezy and Zedd. Photos by Chris Player who traveled to AWS re:Invent 2015 as a guest of Amazon Web Services.

IN PICTURES: AWS re:play 2015 (+28 photos)
IN PICTURES: AWS re:Invent Central part 3 (+18 photos)

IN PICTURES: AWS re:Invent Central part 3 (+18 photos)

It took partners a long time to make their way around AWS re:Invent Central but with so many new and established vendors to talk to it was well worth fighting through the enormous crowd to see what new tech and opportunities were on offer. Photos by Chris Player, who travelled to AWS re:Invent 2015 as a guest of Amazon Web Services.

IN PICTURES: AWS re:Invent Central part 3 (+18 photos) is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments