Instead of dividing network
traffic according to trusted (usually internal) and untrusted (usually external) sources, Zero Trust network security requires that all resources be verified and secured, that access control be limited and strictly enforced and that all network traffic be inspected and logged.
functions among optimally distributed and appropriately sized broadband voice devices, next-generation packet-switching solutions from ipVerse, Tellabs, Sonus Networks, and Syndeo both replace and augment the expensive legacy centralized circuit switches that currently handle the bulk of today's voice traffic.
Next-generation distributed packet voice networks are decentralized, dividing network
functions among lower-cost broadband voice devices, including trunk gateways and softswitches, which are optimally distributed through the network, and properly sized for each point of presence.