OpenScape UC Firewall and OpenScape Session Border Controller

Size: px
Start display at page:

Download "OpenScape UC Firewall and OpenScape Session Border Controller"

Transcription

1 UC Firewall and Session Border Controller Security within and beyond the boundaries

2

3 Security within and beyond your network s boundaries Our connected world We are living and working in a new world that is defined by global connections, where mobility and collaboration are the norm. Technologies that allow us to work in a more fluid, dynamic and collective manner are defining the age. This new communicative era heralds a multitude of opportunities for businesses. But with the unprecedented opportunities come unprecedented risks. Security threats are emerging quicker than the new technologies are being adopted. In recent month s large organisations have been hit by security breaches that have compromised their customers data and damaged their brands and stock values. Safe and secure Information security is the number one priority for any business. Unified communications are no different to any other areas of technology and are vulnerable to risks such as toll fraud, call interception, Denial of Service (DoS), or spam over IP telephony, to name just a few. So enterprises need connectivity solutions that allow relationships between staff and customers to deepen and flourish while at the same time delivering security and control. All IP-based systems require protection built into the heart of any infrastructure in the form of security controls that can protect data and ensure reliable enterprise communication. Beyond borders Companies are increasingly relying on web-based applications for collaboration and communication outside the organisations boundaries. In simple terms, this means more complex connections within applications are being made. Information flows to and from customers are increasing, and companies data centers are under growing strain. Perimeter security controls are constantly required to be kept up-to-date with the rapid changes in the communications environment yet such controls can quickly become outdated. Many enterprises use traditional firewalls to secure their data network. But these firewalls have a raft of limitations and are simply inadequate when it comes to VoIP and UC security. The consequences have far deeper ramifications then isolated security breaches. Trust in the Unified Communications system itself can diminish among staff and customers. As relationships suffer, so do business brands. Yet Unify s next-generation UC Firewall and Session Border Controller provide enhanced security features and performance levels that resolve these issues and bring the benefits of VoIP/UC collaboration securely into your network. 3

4

5 Security built into your solutions, not tacked on as an afterthought Unify believes the most reliable security solutions should be integrated and not bolted on. UC Firewall and Session Border Controller are specifically designed to protect VoIP/ UC. Both may be used independently or in conjunction with each other. The result is a two-tier security controls that boosts the defenses of your network. UC Firewall and Session Border Controller help to keep your VoIP/ UC system safe from both IP-based attacks and unauthorized access from untrusted networks. Working in harmony Whatever your specific security needs, UC Firewall and Session Border Controller can be used flexibly. Both can be perfectly integrated into your company s infrastructure to complement your security policy. And it is worth knowing that all Unify s products, solutions and services provide sophisticated functionality, reliable operation and high quality. And of course they all comply with internationally recognized standards. Getting Technical Traditional Firewalls protect IP data networks, servers and applications against threats by using stateful filtering of IP data traversing through the IP firewall. Some firewalls add gateway functionality to extract the information necessary to set up and maintain the call. This allows the firewall to create and maintain a single end-to-end SIP session on both sides of the firewall. By comparison, a Session Border Controller (SBC) is a VoIP session-aware device that controls call admission to a network at the boundary of the network. SBC securely connects multiple locations and extends communications to remote workers and agents. 5

6 UC Firewall secure communications, safe data UC Firewall overview: Globally available Proven compatibility with Voice and UC solutions Professional support Managed services Trust and security UC Firewall provides the most fundamental security measures that not only protect an Voice and UC infrastructure but also data infrastructures and applications against unauthorized access, unwanted traffic and (SIP-based) attacks. It is both firewall and Intrusion Prevention System (IPS) that ensures a reliable and secure communication exchange to/from your solution. UC Firewall handles all traffic types including voice, UC and data. It guarantees a secure interaction between all existing applications and Voice. UC Firewall scenarios Data Center Data Center Scenario Voice Centralized Applications SIP Trunking Scenario SIP SIP PSTN SSP Media Gateway UC Firewall SBC UC Firewall UC Firewall = SIP Firewall + Data Firewall WAN/ Internet SIP + UC Decentralized Branch Firewall Scenario SIP + UC UC Firewall Access Areas PSTN Branch Branch 6

7 Getting to know you Furthermore, groups, departments and stakeholders are recognised by the UC Firewall according to their responsibilities and access permission. Entry to specific areas, networks and devices can therefore be granted or denied. In short, UC Firewall secures all areas of trust according to an enterprise s security policy. Furthermore, UC Firewall is capable of real-time intrusion prevention. So it scans voice traffic for malicious content and block the traffic where necessary. A security solution for every project and company size World leaders in security solutions Fortinet a world leader in unified threat management appliances is Unify s trusted partner in offering UC Firewall. Fortinet provides a broad, flexible and scalable product platform called FortiGate. In simple terms, Fortigate provides an appropriate security solution for every type of project and company size. The platform minimizes the necessary investment, and maximises the opportunity for securing communications. Fortinet an overview: A market leader in Unified Threat Management Strong increase of Fortinet market shares in the past years Innovation, high-performance ASIC technology cost efficient Clear commitment and integration of VoIP and UC Security Strong experiences with Voice / SIP and UC in Carrier / Service Provider Business Certified. Tested. Approved. UC Firewall complies with all requirements of contracting authorities and is Common Criteria EAL 4+ certified. Furthermore, it supports all Voice features. This guarantees a quick and reliable implementation and ensures a smooth interaction with Voice and UC. 7

8 8

9 Session Border Controller beyond the enterprise s boundaries Extending communications Session Border Controller (SBC) was developed by Unify as a solution component of the award-winning solution portfolio. It allows VoIP networks to securely extend communications beyond an enterprise s network boundaries. Focus on VoIP SBC dynamically opens and closes firewall pin holes, allowing controlled access to your protected network. SBC performs the necessary inter-operability, security, management, and control capabilities to support SIP trunking applications. It also supports the SIP endpoint registration services that are necessary to facilitate remote-user and remote-branchoffice applications. SBC supports all Voice features and is fully manageable via the same Common Management Platform (CMP) that is used to manage other network elements in the Solution Set. Session Border Controller use case scenarios PSTN Remote User SSP Internet SIP Trunking SBC Common Management Platform Voice SBC review Linux-based operating system Designed specifically for Voice solution Single point of administration for Voice and SBC Provides highly secure unified communications solutions Supports secure calls by encrypted signalling Supports secure calls by encrypted media Secure Real-Time Transport Protocol (SRTP) Intrusion detection, topology hiding and strict SIP validation Delivers Network Address Translation (NAT) and Port Address Translation (PAT) for remote worker/agent access PSTN Branch (Proxy Mode) 9

10 10

11 A flexible pair in a secure relationship When two become one Both UC Firewall and SBC are state-of-the-art security solutions that perfectly complement one another and work in harmony. UC Firewall protects voice, UC and data infrastructures and applications against unauthorized access, unwanted traffic and (SIP-based) attacks. Meanwhile, SBC controls call admission at the border of the network. Both may be used independently or in conjunction with each other. Typical use-case scenarios for UC Firewall: Protecting critical centralized servers within a data center Protecting a local or de-centralized network such as corporate branches Customers that require Common Criteria EAL4+ certified security protection Typical use-case scenarios for SBC: SIP trunking to a SIP service provider (SSP) Secure remote-user access regardless of location or public/private network Two-level security UC Firewall and SBC are ideal solutions in a two-level security strategy. This is often required by large enterprises and governmental organizations that have strong, and often unique, security requirements and policies. For SIP trunking, SBC functionality is a fundamental requirement that can t be substituted by pure firewall functionality. The UC Firewall offers enterprise-grade firewalling to the IP connection as a first line of defence while SBC sits behind offering further protection. 11

12 12

13 The security you require Use-case scenarios for both UC Firewall and SBC can widely differ as every organization has specific security requirements. However, in SIP-trunking scenarios we consider SBC to be mandatory regardless of the enterprise size. Meanwhile, the UC Firewall should be a basic requirement for medium-tolarge enterprises wishing to protect a data center. UC Firewall and SBC offer the flexibility you need and the level of security you require for your network. Functional Differentiation UC Firewall SBC UC Firewall Web collaboration Protect UC (HTTP/HTTPS) traffic Unified security for voice/sip and UC/HTTP Legacy firewalling for management traffic Load balancing Network segmentation / security zone separation SIP & RTP protocol inspection Dynamic pin-holling SIP message limitation SIP/TLS support beginning with UC Firewall V1 R2 SBC Far end-nat/ Hosted NAT traversal Adaption, manipulation, and repair of SIP protocol (SIP-Trunking) Media anchoring Transcoding between codecs or RTP/SRTP UC Firewall vs. SBC: Data Center Data Center UC Firewall Voice SBC Voice Transparent for signaling & Session Description Protocol (SDP) Single session across system Inspects SIP header, body and protocol conformance as defined by firewall policy of the SIP-ALG and IPS Dynamically open / close RTP media ports Terminates, re-initiates and initiates signaling & SDP Two sessions one on each side of system Inspects and modifies any application layer header info (SIP, SDP, etc.) Able to resolve interworking issues Dynamically open / close RTP media ports 13

14 14

15 Unify a global leader in corporate communications World beaters Unify has long been a global leader in corporate communications. And when it comes to communications security, nobody knows better than us. Relying on Unify as your single contact for all voice, UC and security-related matters makes business life more convenient. Relationships become easier, staff become happier, customers become more satisfied. Unify offers a highly qualified service worldwide. Meanwhile, our security solutions are based on an open architecture that complies with the most rigorous government standards. Depending on the vulnerability of the business areas, customers can choose between different Service Level Agreements (SLA). It all comes down to our customers specific business needs. In short, Unify can provide the appropriate support to solve any security issues. Leading you to security As a global leader in communications security, our years of experience uniquely position us to offer the best-in-class and most secure products, solutions and services allowing executives to focus on their core businesses. As already mentioned, we provide security that is built in, not bolted on a system that works in harmony with your infrastructure and needs. Be secure in the knowledge our offering is the best on the market. 15

16 About Unify Unify is one of the world s leading communications software and services firms, providing integrated communications solutions for approximately 75 percent of the Fortune Global 500. Our solutions unify multiple networks, devices and applications into one easy-to-use platform that allows teams to engage in rich and meaningful conversations. The result is a transformation of how the enterprise communicates and collaborates that amplifies collective effort, energizes the business, and enhances business performance. Unify has a strong heritage of product reliability, innovation, open standards and security. unify.com Copyright Unify GmbH & Co. KG, 2015 Hofmannstr. 63, D Munich, Germany All rights reserved. The information provided in this document contains merely general descriptions or characteristics of performance which in case of actual use do not always apply as described or which may change as a result of further development of the products. An obligation to provide the respective characteristics shall only exist if expressly agreed in the terms of contract. Availability and technical specifications are subject to change without notice. Unify,, OpenStage and HiPath are registered trademarks of Unify GmbH & Co. KG. All other company, brand, product and service names are trademarks or registered trademarks of their respective holders.

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication

More information

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice

Your Voice is Critical. OpenScape Enterprise voice solutions gives power to voice Your Voice is Critical OpenScape Enterprise voice solutions gives power to voice High quality reliable voice is business critical Conversations involve real-time engagement across multiple communication

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

OpenScape Session Border Controller V7

OpenScape Session Border Controller V7 Session Border Controller V7 Start with the right platform. SBC is a next generation session border controller that enables SIP-based communication and applications to be securely extended beyond the boundaries

More information

Whitepaper IPv6. OpenScape UC Suite IPv6 Transition Strategy

Whitepaper IPv6. OpenScape UC Suite IPv6 Transition Strategy Whitepaper IPv6 OpenScape UC Suite IPv6 Transition Strategy Table of Contents 1. Executive Summary 3 2. Introduction 4 3. Technical Basics 5 3.1. IPv4 IPv6 Translation 6 3.2. IP-in-IP Tunneling 7 4. Selecting

More information

What is an E-SBC? WHITE PAPER

What is an E-SBC? WHITE PAPER Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services

More information

OpenScape Business V2

OpenScape Business V2 OpenScape Business V2 Tutorial System Device@Home Configuration Version 1.1 Table of Contents 1. Configuration Overview 4 1.1. Network Scenario Description: 4 1.2. Configuration Steps 5 1.2.1. Overview

More information

OpenScape Business V2

OpenScape Business V2 OpenScape Business V2 Tutorial Support of SIP Endpoints connected via the internet Version 2.1 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature

More information

OpenScape Business V1

OpenScape Business V1 OpenScape Business V1 Tutorial Support of SIP Endpoints connected via the internet Version 1.0.1 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

Brochure. Dialogic BorderNet Session Border Controller Solutions

Brochure. Dialogic BorderNet Session Border Controller Solutions Brochure Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session border controllers (SBCs) from Dialogic helps

More information

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP

More information

OpenScape Business V2

OpenScape Business V2 OpenScape Business V2 How To: SIP trunk Configuration for CLIP no Screening Version 1.0 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature within

More information

Session Control Applications for Enterprises

Session Control Applications for Enterprises Session Control Applications for Enterprises Driven by Strong Secular Growth Trends The adoption of SIP trunking The explosion of wireless and opt-in communications The emergence of OTT service providers

More information

OpenScape Business V2

OpenScape Business V2 OpenScape Business V2 Tutorial VoIP Interfaces Version 1.0 Definitions HowTo An OpenScape Business HowTo describes the configuration of an OpenScape Business feature within the OpenScape Business administration.

More information

OpenScape Business V1. Tutorial SIP Endpoint Configuration - OpenScape Desk Phone IP / OpenStage SIP Version 1.2

OpenScape Business V1. Tutorial SIP Endpoint Configuration - OpenScape Desk Phone IP / OpenStage SIP Version 1.2 OpenScape Business V1 Tutorial SIP Endpoint Configuration - OpenScape Desk Phone IP / OpenStage SIP Version 1.2 About Unify Unify is one of the world s leading communications software and services firms,

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

Enterprise Licensing Agreement

Enterprise Licensing Agreement Enterprise Licensing Agreement Here at Unify we believe that selecting and purchasing the right communications solution for your business should be simple. So we ve created the Unify Enterprise Licensing

More information

Securing Unified Communications for Healthcare

Securing Unified Communications for Healthcare Securing Unified Communications for Healthcare Table of Contents Securing UC A Unique Process... 2 Fundamental Components of a Healthcare UC Security Architecture... 3 Making Unified Communications Secure

More information

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

SBC WHITE PAPER. The Critical Component

SBC WHITE PAPER. The Critical Component SBC WHITE PAPER The Critical Component Table of Contents of your VoIP Infrastructure... 3 Enter the SBC... 4 Functions... 5 Security... 5 Denial of Service... 5 Toll Fraud... 6 Encryption... 6 Policy...

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

OpenScape Enterprise Express

OpenScape Enterprise Express OpenScape Enterprise Express Unified business for mid-sized companies. OpenScape Enterprise Express for mid-sized companies Now, mid-sized companies can move faster than ever to gain the competitive advantage

More information

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION

More information

Business Value Assessment

Business Value Assessment Business Value Assessment Town of Enfield Moves to SIP-based Unified Communications Solution to Reduce Costs and Boost Service; Net benefits of $2.8M Projected Business Value Assessment conducted by HIGHLIGHTS

More information

Acme Packet session border controllers in the enterprise

Acme Packet session border controllers in the enterprise Acme Packet session border controllers in the enterprise Large enterprises have been expanding their deployments of IP telephony (IPT) for several years now. Planning has already begun to extend the benefits

More information

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion

More information

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 SR140531D 19 August 2014 Miercom www.miercom.com Overview Unify Inc. (formerly Siemens Enterprise Communications)

More information

SIP Trunking: Deployment Considerations at the Network Edge

SIP Trunking: Deployment Considerations at the Network Edge Small Logo SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively

More information

OpenScape Enterprise Express is

OpenScape Enterprise Express is OpenScape Enterprise Express An all-in-one solution OpenScape Enterprise Express combines enterprise Voice, Unified Communication and Collaboration and Mobility into one streamlined package for mid-size

More information

Voice over IP Security

Voice over IP Security Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with

More information

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking

More information

Overview. Unified Communications

Overview. Unified Communications OpenScape Mobile V7 OpenScape Mobile is the next-generation mobile client of Unify, for the latest mobile phones and tablets. It combines SIP-based VoIP, UC and video features into one single application.

More information

Results from Enterprise Connect 2013. Business starts with a conversation, and we re changing the conversation.

Results from Enterprise Connect 2013. Business starts with a conversation, and we re changing the conversation. Results from Enterprise Connect 2013 Business starts with a conversation, and we re changing the conversation. RFP: UC Without Buying a New PBX Siemens Enterprise Communications (now Unify) and OpenScape

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

Increased Productivity

Increased Productivity OpenScape Mobile V7 OpenScape Mobile V7 is the next-generation mobile client of Unify for the latest mobile phones and tablets. It combines SIP-based VoIP, UC, and video features into one single application.

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

OpenScape Business V1 OpenScape Office V3

OpenScape Business V1 OpenScape Office V3 OpenScape Business V1 OpenScape Office V3 How To Desktop Dialing Version 1.3 Table of Contents 1. Preface 3 2. UC Suite 3 2.1. Desktop Dialing 4 2.1.1. Dependencies 4 2.2. Clipboard Dialing 4 2.2.1. Dependencies

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Portfolio Journey OpenScape 4000

Portfolio Journey OpenScape 4000 Portfolio Journey OpenScape 4000 You ve seen all the changes in communications over the last decade. One solution is there every step of the way, adapting, changing, and evolving. Making sure your business

More information

Oracle s Contact Center Communications Solution. Improve Business Agility, Customer Satisfaction and Economics

Oracle s Contact Center Communications Solution. Improve Business Agility, Customer Satisfaction and Economics Oracle s Contact Center Communications Solution Improve Business Agility, Customer Satisfaction and Economics Oracle s contact center solution is designed to enable the hyperconnected enterprise a new

More information

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller?

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller? An Oracle White Paper August 2013 What Is an Enterprise Session Border Controller? Introduction... 1 Redefining Enterprise Communications... 2 E-SBCs Protect and Control IP Communications... 3 E-SBCs Do

More information

Session Border Controller and IP Multimedia Standards. Mika Lehtinen mika.lehtinen@teliasonera.com

Session Border Controller and IP Multimedia Standards. Mika Lehtinen mika.lehtinen@teliasonera.com Session Border Controller and IP Multimedia Standards Mika Lehtinen mika.lehtinen@teliasonera.com December 1, 2005 Contents Introduction Motivation Research problem Research method Results Conclusion December

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications Oracle s SIP Network Consolidation Solutions Using SIP to Reduce Expenditures and Improve Communications A typical large enterprise could enjoy 401 percent three-year ROI on the Net-Net Enterprise Session

More information

Copyright and Trademark Statement

Copyright and Trademark Statement Contents VoIP Starts with SmartNode...3 Why SmartNode?...3 SmartNode Product Comparison...5 VoIP Appliance with Embedded Windows...7 Carrier-Grade TDM + VoIP SmartMedia Gateways...8 Enterprise Solutions...9

More information

SIP Trunking Deployment Steps and Best Practices

SIP Trunking Deployment Steps and Best Practices WHITE PAPER IP Communications SIP Trunking Deployment Steps and Best Practices A practical guide for planning, evaluating, and deploying production service in your network Introduction Today s market conditions

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

WHITE PAPER. SIP Trunks. Keeping your UC System Secure

WHITE PAPER. SIP Trunks. Keeping your UC System Secure WHITE PAPER SIP Trunks Keeping your UC System Secure Table of Contents 1. Executive summary...3 2. Security considerations for SIP trunks...5 2.1. Threats.........................................................

More information

State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network

State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network Website: Geography: Solution: Type: www.delaware.gov State of Delaware Acme Packet Net-Net SBCs Unified Communications

More information

APPLICATION NOTE. SIP Trunking Connectivity, Security and Deployment Scenarios. Introduction

APPLICATION NOTE. SIP Trunking Connectivity, Security and Deployment Scenarios. Introduction SIP Trunking Connectivity, Security and Deployment Scenarios Introduction Enterprises have traditionally based their voice communications on an in-premises telephony switch the PBX. Until recently, the

More information

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller Russell Bennett UC Insights www.ucinsights.com russell@ucinsights.com Introduction Those familiar with unified communications

More information

SBC - the UC-glue Security, Interoperability, Reliability. Alexander Kunzi

SBC - the UC-glue Security, Interoperability, Reliability. Alexander Kunzi SBC - the UC-glue Security, Interoperability, Reliability Alexander Kunzi Agenda SBC? Was s das? Wer ist ACME? Is das sicher? Und wie flexibel? Acme Packet Enterprise Solutions Marketing Page 2 Customer

More information

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma shorton@sangoma.com Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs

More information

Product Information = = = www.anynode.de e-mail sales@te-systems.de phone +49 5363 8195-0

Product Information = = = www.anynode.de e-mail sales@te-systems.de phone +49 5363 8195-0 07 2015 2 Efficient communication anynode is a Session Border Controller that is entirely a software based solution. It works as an interface for any number of SIP UAs for example, SIP phones and SIP PBXs,

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

Session Border Controllers and Videoconferencing

Session Border Controllers and Videoconferencing Session Border Controllers and Videoconferencing Using a Field-Proven Solution to Simplify and Improve Multi-Vendor Conferencing Environments August 2011 Study sponsored by: Table of Contents Introduction...

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

Session Border Controllers: Addressing Tomorrow s Requirements

Session Border Controllers: Addressing Tomorrow s Requirements White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security Patton Electronics Co. www.patton.com 7622 Rickenbacker Drive, Gaithersburg, MD 20879, USA tel: +1 301-975-10001000 fax: +1 301-869-9293 Application Note Patton SmartNode in combination with a CheckPoint

More information

Accelerate with OpenScape Office

Accelerate with OpenScape Office Accelerate with OpenScape Office Take your business to the next level with Unified Communications and Collaboration. Our UCC solutions can help your business - no matter how big or small get more done

More information

Software-Based Session Border Controllers are Critical to the Evolution of Communications

Software-Based Session Border Controllers are Critical to the Evolution of Communications Software-Based Session Border Controllers are Critical to the Evolution of Communications October 2013 Prepared by: Zeus Kerravala Software-Based Session Border Controllers are Critical to the Evolution

More information

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and

More information

Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services

Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services Oracle s Unified Communications Infrastructure Solution Delivering Secure, Reliable, and Scalable Unified Communications Services Oracle s UC infrastructure solution combines tightly coupled session management,

More information

SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There

SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There Q&A Session Date: Wednesday, April 13, 2011 Q: You have to partner with a provider in order to do SIP trunking, correct?

More information

PETER CUTLER SCOTT PAGE. November 15, 2011

PETER CUTLER SCOTT PAGE. November 15, 2011 Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic

More information

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document Fax over IP Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary About this document This document describes how Fax over IP works in general

More information

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Cconducted at the Cisco facility and Miercom lab. Specific areas examined Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security

More information

IP Telephony Deployment Models

IP Telephony Deployment Models CHAPTER 2 Sections in this chapter address the following topics: Single Site, page 2-1 Multisite Implementation with Distributed Call Processing, page 2-3 Design Considerations for Section 508 Conformance,

More information

OpenScape Business V1

OpenScape Business V1 OpenScape Business V1 Tutorial Internet Telephony Configuration Guide Version 1.2 About Unify Unify is one of the world s leading communications software and services firms, providing integrated communications

More information

Session Border Controller

Session Border Controller Session Border Controller SBC OVERVIEW: Media Routes SBC is an advanced, comprehensive Policy enforcement point, Session Management and Service Orchestration engine deployed as a network border element

More information

Cisco ASA 5500 Series Unified Communications Deployments

Cisco ASA 5500 Series Unified Communications Deployments 5500 Series Unified Communications Deployments Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time,

More information

SIP, Security and Session Border Controllers

SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers Executive Summary Rolling out a public SIP service brings with it several security issues. Both users and Service

More information

Dialogic BorderNet Session Border Controller Solutions

Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller

More information

Threat Mitigation for VoIP

Threat Mitigation for VoIP Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities

More information

UC and SIP Trunking Luncheon. Sponsored by:

UC and SIP Trunking Luncheon. Sponsored by: UC and SIP Trunking Luncheon Sponsored by: Speakers and Agenda Topic Presenter Opening comments, introductions and Jeff Neikirk (Verizon) market updates Verizon Managed Services for Enterprise Brent Carter

More information

Time critical responses right here

Time critical responses right here Time critical responses right here Public safety, emergency medical services, utilities and air traffic control. Your dispatchers are being asked to make instant decisions every minute of the day. Nowhere

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Review of the Air Force Academy No 1 (31) 2016 METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT Paul MOZA, Marian ALEXANDRU Transilvania University, Brașov, Romania DOI: 10.19062/1842-9238.2016.14.1.16

More information

The all-in-one Unified Communications solution for SMBs.

The all-in-one Unified Communications solution for SMBs. OpenScape Business The all-in-one Unified Communications solution for SMBs. Improve your performance and take your business to the next level with Unified Communications. Amplifying opportunities The success

More information

Oracle Enterprise Communications Solutions for Microsoft Lync. Migrate seamlessly to Microsoft Lync while reducing cost and complexity

Oracle Enterprise Communications Solutions for Microsoft Lync. Migrate seamlessly to Microsoft Lync while reducing cost and complexity Oracle Enterprise Communications Solutions for Microsoft Lync Migrate seamlessly to Microsoft Lync while reducing cost and complexity Oracle s Lync integration solution helps IT organizations save time

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

SITEL Voice Architecture

SITEL Voice Architecture SITEL Voice Architecture www.sitel.com SIP Voice Architecture: What is it? And how contact center operators can save money using it. By: Kevin Weier, Director, Global Voice Infrastructure and Architecture,

More information

Network Security Topologies. Chapter 11

Network Security Topologies. Chapter 11 Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network

More information

Session Border Controllers: Securing Real-Time Communications

Session Border Controllers: Securing Real-Time Communications Session Border Controllers: Securing Real-Time Communications Why do I need an SBC if I already have a firewall? It s not uncommon for enterprises to believe that the same device that protects their data

More information

Welcome to the era of the anywhere worker

Welcome to the era of the anywhere worker Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening

More information

OpenScape Video and Room Systems

OpenScape Video and Room Systems OpenScape Video and Room Systems White Paper By Patrick Kleiner and Ines Zengerle-Kremer Global Product Management OpenScape Video May 2012 OpenScape Video and Room Systems Executive summary Video is now

More information

Oracle Enterprise Communications Solutions for Microsoft Lync. Migrate seamlessly to Microsoft Lync while reducing cost and complexity

Oracle Enterprise Communications Solutions for Microsoft Lync. Migrate seamlessly to Microsoft Lync while reducing cost and complexity Oracle Enterprise Communications Solutions for Microsoft Lync Migrate seamlessly to Microsoft Lync while reducing cost and complexity Oracle s Lync integration solution helps IT organizations save time

More information

Your new VoIP Network is working great Right? How to Know. April 2012 WHITE PAPER

Your new VoIP Network is working great Right? How to Know. April 2012 WHITE PAPER Your new VoIP Network is working great Right? How to Know April 2012 Executive Summary This paper discusses the importance of measuring and monitoring the voice quality of VoIP calls traversing the data

More information

Accelerate with OpenScape Office

Accelerate with OpenScape Office Accelerate with OpenScape Office Take your business to the next level with Unified Communications and Collaboration. Our UCC solutions can help your business - no matter how big or small get more done

More information

Ram Dantu. VOIP: Are We Secured?

Ram Dantu. VOIP: Are We Secured? Ram Dantu Professor, Computer Science and Engineering Director, Center for Information and Computer Security University of North Texas rdantu@unt.edu www.cse.unt.edu/~rdantu VOIP: Are We Secured? 04/09/2012

More information