VoIP Security Learning Guide

Learning Guide

VoIP Security Learning Guide

More organizations are choosing to implement VoIP telephony for its cost savings. However, securing the technology comes with its own price tag. Created in partnership with our sister site, SearchVoIP.com, this guide is a compilation

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor

of resources that review the importance of VoIP security, protocols and standards, LAN security, vulnerabilities, troubleshooting, threats and more. If there are other guides you would like to see on SearchSecurity.com, send me an e-mail and let me know. Jenny Wiseman, Associate Editor.


   Introduction to VoIP Security
   VoIP Protocols and Standards
   LAN Security for VoIP
   VoIP Vulnerabilities, Regulatory Issues and Troubleshooting
   VoIP Threats
   More Security Learning Resources
   Free Security IT Downloads

  Introduction to VoIP Security Return to Table of Contents

  VoIP Protocols and Standards Return to Table of Contents

  LAN Security for VoIP Return to Table of Contents

  VoIP Vulnerabilities, Regulatory Issues and Troubleshooting Return to Table of Contents

  VoIP Threats Return to Table of Contents

Voice service availability

SPIT Eavesdropping and call spoofing

More Security Learning Resources

This was first published in February 2006