View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
March 20, 1997updated 05 Sep 2016 12:42pm

INTERNET TELEPHONY BREAKS THROUGH CORPORATE FIREWALLS

By CBR Staff Writer

A new development aims to remove a communications and security obstacle that has prevented businesses from adopting Internet telephony, reports Network Briefing. Firewall vendors Check Point Software Technologies Ltd, Cisco Systems and Trusted Information Systems are set to allow users to send and receive audio and video phone calls through company firewalls and over the Internet while maintaining data security of corporate networks. According to Intel Corp, the companies will be using an Intel developed design to get H.323 standards-based Internet communications through firewalls. The new capability complies with the H.323 Internet communication standard. Intel says it worked with the firewall vendors to validate the H.323 standard in their upcoming products. Check Point Software, Cisco and Trusted Information Systems have all stated support for the H.323 standard and that they plan to offer standard-compliant firewall products later this year. Support for H.323 will be included in Check Point Software’s next release of FireWall-1, version 3.0, which will ship later this month. Cisco’s PIX Firewall will support H.323 technology with or without network address translation (NAT) making deployment and network expansion easier for users. By supporting H.323-based technology through the PIX Firewall, users are ensured expedient delivery of Internet telephony communications. Trusted Information Systems Gauntlet firewall will run a version of the H.323 proxy to monitor and control all H.323 calls between internal networks and the Internet (or between intranet domains). Trials of the new call capability will be carried out next quarter using a network shared between Cisco and Intel.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU