![Innovaphone IP64 Product Data Download Page 10](http://html.mh-extra.com/html/innovaphone/ip64/ip64_product-data_2063528010.webp)
Product analysis: innovaphone VoIP products 2010
Copyright © 2010 by ComConsult Technologie Information GmbH
Page 6
the IP800, the IP3000 which is no longer avai-
lable and IP200 terminals.
Presence
The idea of the presence function is to make
your current availability visible to other col-
leagues. For example, you are in a meeting
and do not want to be disturbed. You thus
change the status on your telephone from
“available” to “meeting”. Providing the col-
leagues have subscribed to the status infor-
mation service, they will receive status chan-
ges at the same time on their telephones.
With version 8 of its software, innovaphone
has now also included this Unified Commu-
nication infrastructure in its products. Accor-
dingly, the system provides various presence
information possibilities. Five possibilities
were selected from a list of 26 various opti-
ons defined in RFC4480 (busy, away, vacati-
on, lunch and meeting).
However, it is possible to extend or edit this
pre-defined list to match your personal wor-
king situation. One other presence feature is
the “SIP Federation”. This is the possibility to
exchange status information using presence
services outside of your own company. This
function is not limited to exchange amongst
innovaphone systems, it also supports other
manufacturers’ presence replication e.g. Mi-
crosoft OCS.
Security
Of course, implementing VoIP systems in the
network opens up questions concerning se-
curity. First of all, IP based telephony is just
another application with all the advantages
and disadvantages from the world of IP. En-
cryption is one aspect which has been wide-
ly discussed in the media. The necessity of
encrypted communication within a company
network is a topic which is open to dispute.
Experience has however shown that security
is required by almost all market participants,
but is rarely implemented.
The innovaphone solution is also state-of-the-
art in this area. Encrypted protocols SIP over
TLS, SRTP and HTTPS as well as H.235 SRTP
have been supported ever since SIP over TCP
was introduced in version 7.
The implementation of H.323 is also very so-
phisticated and supports appendix D in H.235,
the so-called “Baseline Security Pro-file”,
which defines authentication and integrity.
Deployment and configuration of the
terminals (Roaming Phone Profiles)
As from version 8, telephone user configura-
tion, such as for example, assigning function
keys, ringing tones etc. is stored centrally in
the PBX. This makes Hot Desking easier: If
a user registers on a different telephone, he
can still automatically use his individual tele-
Figure 6: presence information