pansophic wrote: "The telecom industry is historically VERY poor at securing systems, worse at identifying compromises, and downright terrible at admitting that there is a problem, even after they find it."
I would like to react on this one: At Avaya* security is a very important part of our solution, everything is (stress) tested to the extreme, and all known (and maybe unknown) vulnerabilties are assessed as well. Apart from this we have an option to encrypt the RTP stream, and by default you can't use "simple" clients like Netmeeting (you need an Avaya Soft- or hardphone, wich needs to authenticate with extension & pin), unless you program it specifically for that purpose. More security features & procedures are developped continiously.
Maybe in the past there have been issue's, but I can assure you (especially because the perception is telecom-equipment isn't secure!) a lot of effort is put on security in all aspects, as we can't afford any mistakes.
But, moving to open standards (and often Open Source), opens up a lot of new possibilities, but also new vulnerabilities, wich _ALL_ vendors have to assess and fix, regardless of their background being in telecoms or data.
Just my 2 cents, I don't mean to open up a discussion about this, but I hear this a lot, and I am convinced it is not true (at least no more or less than any other product you put on your LAN/WAN). Putting your (telecom) equipment on a publicly accessable network ALWAYS introduces security risks. Security is in the design, not (only) the product.
* I work for Avaya, so I can only talk for them, but I am convinced that other "traditional" telecomfirms also have a big focus on security.
Cheers,
Nico