RE: Creating a secure VoIP infrastructureTraditional security solutions are unable to cope with the requirements of voice on the data network because of the complex and diverse nature of VoIP protocols, and the need is for a perimeter security solution which is VoIP aware and that can make intelligent security decisions to protect the VoIP network from attack.