I imagine it has its risks, like being able to fake a call, leaving ports open, its ability to circumvent firewalls, etc. I would not use it myself, but others may be able to inform you of how to resolve security risks, like IDS/IPS, acl's, CBAC, etc.
Burt