Story image

How to deliver real-time communication without network failures

04 Jan 2019

Article by Verizon collaboration and customer experience solutions regional leader Stephen Edwards

Organisations are constantly under pressure to deploy secure, high-quality voice and video services on which all users can connect, collaborate and communicate seamlessly.

So, when it comes to deploying IP-based real-time communication services such as SIP trunking, Voice over IP (VoIP) and Unified Communications (UC), the workforce is demanding low-latency digital media and unified communications solutions where users can communicate even across disparate platforms and devices.

This is what’s driving enterprises to apply network virtualisation to their unified communications.

One way this can be delivered is via Session Border Controller (SBC).

Session Border Controller-as-a-Service (SBCaaS)

SBCs were initially deployed in VoIP networks to operate much like interworking “traffic cops” for Session Initiation Protocol (SIP) sessions, interactive media communications and other media streams involved in setting up, conducting and tearing down telephone calls.

Until now, delivering any VoIP or UC solution meant investing in purpose-built appliances and proprietary software licenses for each location.

Aside from the considerable upfront investment, the installation of new circuits could take weeks, followed by layers of potential failure points and complicated configuration, which could also take several days.

SBCaaS was designed to offer organisations a stable communication infrastructure.

It allows users to remotely and dynamically control the configuration while simplifying service charge and policy management.

SBCaaS, like other virtualised networks, operates on a pay-as-you-go subscription model, which means organisations are able to be flexible and scalable while improving their cost management and limiting their reliance on dedicated network hardware.

This ultimately reduces the potential of network failures.

Additionally, like traditional SBC, SBCaaS can also serve as the first line of defence against a range of cyber attacks and allow organisations to stay ahead of evolving security threats without putting their brand in harm’s way.

Drawbacks to consider

While virtualising SBC has cost efficiencies and the first line of defence advantages, it’s only effective if it’s efficiently managed. 

Otherwise, it has the potential to affect an organisation’s wider virtualised network.

Organisations need to analyse carefully if SBCaaS is suitable for their business needs by making sure it can perform and scale the way it’s required – for example, ensuring its capability to handle denial of service attacks at scale and looking closely at how tasks are architected in the network.

A poorly performing SBC can be a hard problem for an organisation to solve.

Where these deployments were once an IT decision, it’s now a business decision.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.