RICHARDSON, Texas -- Sipera Systems, the leader in pure security for VoIP, mobile and multimedia communications, today announced new functionality for the award-winning Sipera IPCS 310. This upgrade extends Siperas protection of VoIP and IM to more environments, allowing enterprises, especially in the financial services and healthcare industries, to secure legacy systems and additional IP communications applications against attacks, misuse, and service abuse.
New functionality for the Sipera IPCS 310 includes:
- Multiple-protocol support which protects all VoIP assets in mixed protocol environments;
- Border control features that enable enterprises to deploy SIP trunks and voice extranets, and extend VoIP infrastructure to road warriors and telecommuters with the same signaling and media protection as internal IP PBX deployments. This functionality is crucial to address the network address translation (NAT) and firewall issues enterprises face with external VoIP deployments;
- Expanded IM protection for IM spam (SPIM) and IM spoofing to protect internal and external IM communications. In addition to the existing IM logging functionality, this is especially applicable to the healthcare industry for HIPAA-compliant patient information, and financial services companies for corporate compliance of electronic communications; and
- Additional media protection to prevent threats that may be launched through the media channel after a VoIP connection has been successfully established.
Giving customers choices and flexibility is particularly important as new technology is integrated into existing enterprises. For enterprises of all sizes and configurations, comprehensive network-level and end-user security is a prerequisite to deploying todays growing suite of collaborative VoIP, IM and other IP communications applications, said Seshu Madhavapeddy, Sipera president and CEO. With these new features, the Sipera IPCS 310 allows enterprises to efficiently take advantage of todays real-time, IP communication applications without compromising the networks security requirements.