Northern Illinois U Deploys Sipera Unified Communications Security Appliance

Northern Illinois University is deploying a unified communications security appliance from Sipera Systems. UC-Sec provides privacy and encryption, access control and authentication, threat mitigation, and security policy enforcement for real-time communications traffic, including voice over IP (VoIP), IP-based video, and instant messaging.

Although not much attention has been paid to security related to the use of VoIP, a group of universities and companies formed the VoIP Security Alliance in 2005 to address expected security threats. These include denial of service attacks, spam over Internet telephony (spit), and premium-rate phone fraud, where hackers break into the VoIP system to make pay calls.

The challenge in securing IP-based communications channels is in supporting an open environment that allows users to connect to the infrastructure with almost any device without requiring IT's direct control over each device. This often means that key communications systems must be exposed to the Internet or other publicly accessible networks without a formal subnetwork or DMZ being set up as an additional layer of security. But at the same time, communication systems can carry highly sensitive data that must be protected, including student records, financial data, and patient-related data in the case of medical schools.

"When we set out to deploy VoIP as part of our communications transformation, we planned from the outset that we would never compromise the security and privacy of the many different types of data and communications traversing our network," said Cindy Phillips, director, NIUTEL and IT Customer Support Services. "We have selected Sipera's UC-Sec appliance so that we can deploy highly effective, targeted security that ensures confidentiality." NUITEL manages the university's telecommunications and networking communications systems for on- and off-campus facilities.

With the new appliance, the university's IT people expect to be able to target specific systems and applications, users and user groups, and resources and data and exercise security control over these elements, without reducing communications performance or undercutting the open, multi-device environment.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • data professionals in a meeting

    Data Fluency as a Strategic Imperative

    As an institution's highest level of data capabilities, data fluency taps into the agency of technical experts who work together with top-level institutional leadership on issues of strategic importance.

  • stylized AI code and a neural network symbol, paired with glitching code and a red warning triangle

    New Anthropic AI Models Demonstrate Coding Prowess, Behavior Risks

    Anthropic has released Claude Opus 4 and Claude Sonnet 4, its most advanced artificial intelligence models to date, boasting a significant leap in autonomous coding capabilities while simultaneously revealing troubling tendencies toward self-preservation that include attempted blackmail.

  • university building with classical architecture is partially overlaid by a glowing digital brain graphic

    NSF Invests $100 Million in National AI Research Institutes

    The National Science Foundation has announced a $100 million investment in National Artificial Intelligence Research Institutes, part of a broader White House strategy to maintain American leadership as competition with China intensifies.

  • black analog alarm clock sits in front of a digital background featuring a glowing padlock symbol and cybersecurity icons

    The Clock Is Ticking: Higher Education's Big Push Toward CMMC Compliance

    With the United States Department of Defense's Cybersecurity Maturity Model Certification 2.0 framework entering Phase II on Dec. 16, 2025, institutions must develop a cybersecurity posture that's resilient, defensible, and flexible enough to keep up with an evolving threat landscape.