Story image

How to deliver real-time communication without network failures

04 Jan 2019

Article by Verizon collaboration and customer experience solutions regional leader Stephen Edwards

Organisations are constantly under pressure to deploy secure, high-quality voice and video services on which all users can connect, collaborate and communicate seamlessly.

So, when it comes to deploying IP-based real-time communication services such as SIP trunking, Voice over IP (VoIP) and Unified Communications (UC), the workforce is demanding low-latency digital media and unified communications solutions where users can communicate even across disparate platforms and devices.

This is what’s driving enterprises to apply network virtualisation to their unified communications.

One way this can be delivered is via Session Border Controller (SBC).

Session Border Controller-as-a-Service (SBCaaS)

SBCs were initially deployed in VoIP networks to operate much like interworking “traffic cops” for Session Initiation Protocol (SIP) sessions, interactive media communications and other media streams involved in setting up, conducting and tearing down telephone calls.

Until now, delivering any VoIP or UC solution meant investing in purpose-built appliances and proprietary software licenses for each location.

Aside from the considerable upfront investment, the installation of new circuits could take weeks, followed by layers of potential failure points and complicated configuration, which could also take several days.

SBCaaS was designed to offer organisations a stable communication infrastructure.

It allows users to remotely and dynamically control the configuration while simplifying service charge and policy management.

SBCaaS, like other virtualised networks, operates on a pay-as-you-go subscription model, which means organisations are able to be flexible and scalable while improving their cost management and limiting their reliance on dedicated network hardware.

This ultimately reduces the potential of network failures.

Additionally, like traditional SBC, SBCaaS can also serve as the first line of defence against a range of cyber attacks and allow organisations to stay ahead of evolving security threats without putting their brand in harm’s way.

Drawbacks to consider

While virtualising SBC has cost efficiencies and the first line of defence advantages, it’s only effective if it’s efficiently managed. 

Otherwise, it has the potential to affect an organisation’s wider virtualised network.

Organisations need to analyse carefully if SBCaaS is suitable for their business needs by making sure it can perform and scale the way it’s required – for example, ensuring its capability to handle denial of service attacks at scale and looking closely at how tasks are architected in the network.

A poorly performing SBC can be a hard problem for an organisation to solve.

Where these deployments were once an IT decision, it’s now a business decision.

Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.