SIP Trunking Survey: Many Don’t Have any SBCs

January 21, 2016
by Brian Gregory BLog Post Title Underline

In this last part of our series on the 2015 SIP survey, compiled by the SIP School, we’ll be taking a closer look at how respondents are using SBCs. The surprising result? In many cases, SIP trunking providers don’t have them at all.

Of the over 1000 providers and clients surveyed by the SIP School, 17.62% responded that they don’t use any SBC on the edge of their network. Still others (about 14%) preferred not to answer, since they didn’t want to give away information regarding their security systems. Still, this response was a bit concerning considering the importance of using an SBC to protect and secure networks.

These survey results go to show that there is a large, untapped market for SBCs. With a little education about why using an SBC is so important, these companies could be converted into SBC users. Here are a few talking points to use in conversations with clients about why SBCs are essential to their businesses.

Why SBCs are Indispensable

Solution Brief: Simplifying VoIP Troubleshooting“The Session Border Controller is truly a work-horse element of a good SIP trunking environment.” – Steve Johnson, Ingate

The first step to increasing adoption is helping businesses to understand how SBCs work. SBCs connect the company’s communications infrastructure to the public Internet, SIP trunking service providers and/or private vendor network. They have multiple critical roles in maintaining and securing the network.

  1. Ensuring Quality—SBCs enhance call quality and ease of use. They allow the PBX to be located on the LAN with a private IP address, normalize SIP trunking signaling between the PBX and the service provider, and provide signification routing capabilities. SBCs also ensure interoperability of VoIP and video devices, testing VoIP lines, monitoring call quality, and more.
  1. Monitoring Traffic—SBCs work by using pattern analysis to spot unusual activity, such as a DoS attack that manifests in the form of an overwhelming amount of traffic from a single IP address or a number of machines that are simultaneously trying to make requests from the same server.
  1. Security Maintenance—Once an SBC spots a potential threat, it can quickly block the problem. It then notifies the CPU and host of the details of the threat and the protocols that have been implemented to neutralize it. The SBC can even send details of the threat to a business’s other locations to ensure that they are on the lookout for similar breaches.
  1. Staying Up to Date on Possible ThreatsHackers are constantly becoming more sophisticated, changing and upgrading their methods to bypass older security measures. SBC vendors update their protocols just as quickly to ensure that security breaches don’t happen. Users simply need to install all updates and patches as soon as they are made available to maintain an effective defense program.

SBCs Aren’t a Luxury—They’re a Necessity for SIP Trunking

When it comes to voice systems, firewalls just aren’t enough to prevent attacks. SBCs are critical to protecting businesses’ communications systems against DoS attacks, which can disrupt phone calls and video conferences, steal important information, eavesdrop on calls or infect systems with malware and viruses.

It’s surprising to see that so many companies don’t use SBCs; but as technology grows more complex and security concerns become more threatening, the interoperability and security capabilities of SBCs will prove to be a necessity for quality SIP trunking.

What do you think makes SBCs so critical in a communications infrastructure? Let us know in the comments section below

New Call-to-action

Topics: VoIP, Service Providers, Technologies

BLog Post Title Underline

SIP Trunking Survey: Many Don't Have any SBCs