Using QRadar® to Monitor and Protect Your VoIP Investment
By Q1 Labs
The prospect of implementing Voice over Internet Protocol (VoIP) has generated considerable excitement among IT professionals. Whether you implement the technology yourself or lease the service from a well-known provider, the cost savings associated with a successful VoIP implementation are enormous. As with any relatively new technology, however, VoIP carries with it a variety
of new security vulnerabilities as well as more opportunities for well-known types of attacks, such as Denial of Service (DoS), that security professionals need to consider when deploying it. Although many VoIP solution companies work hard to secure their VoIP gear and their overall solutions, an attacker can easily exploit a VoIP deployment using a variety of different techniques. This paper discusses those common techniques and how QRadar® can be used to protect your VoIP investment.