Session Border Controllers: Securing Real-Time Communications

Size: px
Start display at page:

Download "Session Border Controllers: Securing Real-Time Communications"

Transcription

1 Session Border Controllers: Securing Real-Time Communications

2 Why do I need an SBC if I already have a firewall? It s not uncommon for enterprises to believe that the same device that protects their data network the firewall will also protect their voice network. Data and voice communications are very different, however, and have unique considerations, both in terms of security and quality-of-service (QoS) requirements. To meet these requirements, an SBC is designed to provide functionality that a firewall cannot, such as: Protection against voice-based DoS/DDoS attacks to ensure that calls are not interrupted or call capacity compromised during an attack; Media services such as voice/ video transcoding and fax/ DTMF interworking to ensure that different devices can communicate effectively; IP Private Branch exchange (IP PBX) and UC protocol interworking to translate different signaling protocols and provide SIP message manipulation, for the purpose of allowing different networks and network elements to communicate in a UC environment; and Enforcement of network policies such as least cost routing paths and Call Admission Control (CAC) settings that ensure calls are routed efficiently. The bottom line is that conventional network firewalls, security appliances and routers are not designed for real-time communications. Across all VoIPrelated use case scenarios, only SBCs meet the requirements for the successful delivery of enterprise and contact center VoIP/UC services and applications. Introduction Over the last few years, enterprises have started to shift toward Unified Communications (UC) platforms that bring voice, video and data together, both as a richer user experience and as a more efficient network model using the Internet Protocol (IP) standard. As a result of this shift, many enterprises are re-examining network security solutions to accommodate the distinct concerns of IP-based voice and video communications. These real-time communications present unique considerations in terms of security and delivery that require a more robust solution than those traditionally used for IP-based data communications such as firewalls. While the positive aspects of moving to a unified, IP-based communications model are too compelling to ignore reduced costs, higher quality, more features, improved productivity so too are the security risks that present themselves once an enterprise opens its real-time communications to the Internet. In particular, the shift from circuit-switched voice networks to an IP-based voice network creates a new entryway for IP-based attacks, including Denial-of-Service (DoS), information/identity theft and toll fraud. If you believe that voice networks are less likely to be targeted than data networks, think again. The Communications Fraud Control Association (CFCA) estimates that fraud alone cost the industry $46.3 billion in 2013, proving that voice communications systems remain a lucrative target for hackers and thieves. In the new lexicon of Unified Communications, the ABCs of network security are different. Enterprises, as well as the communications service providers that serve them, must focus on: Access: securing the network border against unwanted/unauthorized intrusion; Bombardment: preventing network flooding as a result of DoS and Distributed Denial-of-Service (DDos) attacks; and Compromise: hardening the security of their network services and connections to remote clients to prevent illegal use (e.g., toll fraud) by external users. To do this, networks require a new kind of security device known as a Session Border Controller (SBC). In this whitepaper, we ll examine how an SBC works, why it s necessary for real-time communications, and how it differs from other network security methods that may already be in place in your network. Session Border Controllers: Securing Real-Time Communications Although SBCs play an important role in ensuring the quality of real-time communications over an IP network (as discussed later in this paper), their primary function is to protect the network and networked communications from IP-based attacks. An enterprise wouldn t think of connecting its data network to the Internet without a firewall, or performing commerce over the Internet without some kind of encryption enabled, and an SBC is just as critical to real-time IP communications. Voice over IP (VoIP) networks face many of the same risks as data networks DoS attacks, network hacking, spoofing as well as new risks such as toll fraud. If enterprises fail to see their voice systems as a target for fraud, hackers have a very different view: illegally hacked voice systems can generate significant revenue for thieves, who use them to re-sell international long-distance service to often-unsuspecting customers. The role of the SBC in a UC environment is much broader than a firewall, however. You can think of an SBC as a network traffic cop, ensuring the smooth flow of traffic in and out of the network, enforcing policies and preventing unauthorized or illegal activities from taking place. In fact, the name Session Border Controller explains its role rather well: it controls real-time communications sessions at the network border. Because of its 2

3 placement at the network border, an SBC is most often used to interconnect safely with external IP networks and secure SIP trunking services between an enterprise and a SIP service provider. (SIP stands for Session Initiation Protocol, and is the signaling protocol for real-time communications in an IP network.) Additionally, an SBC is used to secure communications from the border of a network to trusted mobile clients. Five Reasons You Need An SBC Although there are many reasons why an enterprise might want an SBC SIP trunking, on-net routing, UC enablement security is the primary reason to own one. In fact, a poll conducted by research firm Infonetics found that 88% of CIOs felt security was the most important function of an SBC. If an SBC did nothing but secure real-time communications and protect the network from SIP-based attacks, enterprises would recover their ROI quickly. That SBCs provide many other opportunities for cost savings beyond security is one reason why sales of enterprise SBCs rose 42% in 2013 (source: Infonetics). Below are the five most important reasons why you need an SBC if you re running voice or video over an IP network: 1. To keep communications over the Internet private 2. To protect your network from unwanted intrusion 3. To prevent toll fraud 4. To ensure endpoints (phones, laptops, tablets) are secure 5. To provide high-quality communications We ll take a closer look at each of these functions in the following sections. Keeping Communications Over the Internet Private Just as unencrypted can be opened and exploited, voice or video sessions over IP also require encryption and user authentication to protect them from prying eyes and ears. This privacy may also be mandated by federal or industry agencies, as in the case of a patient conversation with a doctor or pharmacist, or a retail purchase where credit card information is shared. An SBC can encrypt communications at a session level or encrypt all communications between two different secure network devices (e.g., two SBCs), creating a Virtual Private Tunnel for voice communications (also known as a Voice VPN). Encryption essentially locks each IP packet transmitted during a voice or video session, which can only be opened with a special key provided to the specific, trusted endpoint. SBCs use different encryption standards, including IPsec and Transport Layer Security (TLS) to encrypt signaling information, and the Secure RTP (SRTP) standard to encrypt the media (or contents). The importance of encryption is growing as more employees work outside of the traditional office, resulting in more communications that traverse external (and nonsecured) networks such as the Internet. Encryption allows these communications to safely travel over the Internet and other external networks (e.g., public WiFi networks) without being exposed to third parties. Authentication is the process of verifying a user s identity. In the case of IP communications, this is often done by cross-referencing a device s IP address against a known database of users/subscribers. SBCs have methods in place for detecting spoofing, which is when an endpoint tries to alter its true identity (a practice common among spammers). Multiprotocol Label Switching (MPLS) networks reduce the exposure to external threats, but they do not negate the need for an SBC. An MPLS network is still vulnerable at the point where it connects to the Internet (i.e., the network border), and so requires the same levels of encryption and authentication for sessions that extend outside the network. You can think of an MPLS network as a garden hose: it has a thick layer to protect the contents inside, but it doesn t control what enters it at the faucet; that s the role of the SBC. Protecting Your Network from Intrusion/Attacks As with IP data networks, hackers will often use IP-voice and video networks to look for unsecured entry points into your network. This is a growing concern as enterprises consolidate networks, because it means that someone can enter the network through more devices (e.g., smartphones) and exploit the weakest part of the network. For example, a hacker could exploit an unprotected IP PBX through their smartphone to gain access to credit card information stored on the corporate data network. By shielding the IP PBX from the external world, an SBC makes it invisible to unauthorized users. 3

4 In addition to targeted attacks, enterprises are also subject to blanket DoS and DDoS attacks that seek to disrupt communications. Why would someone want to flood a network with 10,000 VoIP calls at the same time? In some cases, to look for unsecured ports and holes in network security. More commonly, DoS attacks are a type of corporate vandalism that disrupts or shuts down an enterprise s communications system for a period of time. The damage of DoS attacks is very real, especially for companies that rely on communications for their revenue. Consider a DoS attack mounted against a call center during its busy period; the lost revenue and added customer frustration can quickly end up costing an enterprise tens of thousands of dollars. Unfortunately, DoS and DDoS attacks are not difficult to mount. DDoS programs and services are readily available on the Internet for a nominal fee, providing even inexperienced hackers with the tools to take down a network. The difficulty of tracking DoS attack sources makes the crime more appealing. Fortunately, SBCs are capable of recognizing and blocking DoS and DDoS attacks within a matter of seconds, using a mixture of rules-based policies and call admission control (CAC) features. Preventing Toll Fraud An SBC s policy capabilities also play a key role in preventing toll fraud. While toll fraud is a large and growing problem, it s not a widespread problem insofar as the majority of toll fraud originates from and is targeted to those nations where telecommunications are less regulated. Simply using an SBC to enforce a policy that blocks a high number of long-distance calls to/from these nations can significantly reduce the potential for toll fraud with minimal effort. As the network gatekeeper, an SBC is ideally suited to intercept and reject fraudulent long-distance calls. The SBC inspects each SIP signaling packet that enters the voice network, which includes the origination and destination of the call as well as the ID of the device forwarding the request (e.g., an IP softswitch or another SBC). Using this information, an SBC can quickly identify abnormal or suspicious call activity and drop or block the calls based on specific policy rules. A quick response is important in preventing toll fraud, as perpetrators waste little time in exploiting vulnerable systems using illegal international long-distance calling plans. Anecdotal evidence shows that toll fraud can quickly escalate to thousands of calls and tens of thousands of dollars in just a matter of hours. Ensuring Secure Endpoints Within the physical enterprise environment, devices such as phones and laptops are secured through the enterprise WiFi network or a physical local area network (LAN) connection. But what about the millions of mobile devices accessing the network from the outside, whether a service provider s 4G network or an airport s WiFi network? These devices may be visible to other users on the same network unless they re secured. In essence, any information transmitted on a non-secure remote device passwords, customer information, sales data, s can be viewed by another device that shares the same network. SBCs can ensure the security of endpoints outside the physical network through encryption, authentication and policy enforcement. For example, enterprises may require a Voice VPN connection to remote call agents who work from home, in order to meet industry compliance requirements. Having a centralized policy management solution can also play an important role in security by enabling SBCs to block devices across the network moments after a mobile device or account is de-activated, which can happen as employees change devices or change jobs. Providing High-Quality, Secure Communications Because voice is a real-time application, it s highly sensitive to issues such as dropped packets and latency. In the world of data communications, dropped packets can simply be re-sent and latency is little more than a slight lag in time as a Web page downloads. In voice communications, however, these same problems make for a frustrating user experience, as anyone who used Voice over IP (VoIP) in its earliest days can attest. Although it s not specifically a security issue, high-quality communications do make customers feel more secure, especially when they re exchanging personal information over the phone. SBCs can do a number of things to ensure high-quality, real-time communications, including: Call Admission Control to prevent network overloads that can result in dropped or delayed calls; Media transcoding to provide the best possible voice quality based on the end user s network and device; and Policy-based call routing to ensure that voice and video calls meet service level agreements for quality. 4

5 Conclusion SBCs play an important and unique role in today s UC networks, helping service providers and enterprises secure SIP trunking services, protect their networks from Internet-based attacks, and provide higher quality communications. As enterprises implement UC solutions such as Microsoft Lync, they quickly recognize both the necessity and the value of using SBCs to control and secure UC sessions over multiple networks. Today, SBC vendors offer a variety of options for enterprises and service providers, ranging from smaller devices best suited to a branch office, to medium-sized devices for active call centers, to the largest SBCs that can support up to 150,000 concurrent SIP sessions for carriers and the largest of enterprises. In addition, as network infrastructures move toward hybrid Cloud and softwaredefined networking (SDN) models, some vendors have released software-based SBCs that can be deployed on common-off-the-shelf (COTS) hardware and virtualized. As voice, and especially video, become more prevalent on IP-based communications networks, SBCs will need to offer high scalability, flexibility and performance to meet this growing demand for SIP-based communications. These qualities are the hallmark of Sonus SBCs. Sonus has the broadest portfolio of hardware- and software-based SBCs on the market, spanning the SBC 1000 and SBC 2000 for smaller networks; the SBC 5110, SBC 5210 and SBC 7000 for enterprise and service provider networks; and the SBC Software edition (SWe). The Sonus SBC portfolio is Microsoft Lync 2013 qualified, BroadSoft validated and performance-verified by Miercom. To learn more about Sonus and SBCs, visit us online at or download a free copy of our ebook, SBCs for Dummies, at Sonus Networks North American Headquarters Sonus Networks APAC Headquarters Sonus Networks Limited EMEA Headquarters 4 Technology Park Drive Westford, MA U.S.A. Tel: GO-SONUS 1 Fullerton Road #02-01 One Fullerton Singapore Singapore Tel: Edison House Edison Road Dorcan, Swindon Wiltshire SN3 5JX Tel: To learn more, call Sonus at 855-GO-SONUS or visit us online at The content in this document is for informational purposes only and is subject to change by Sonus Networks without notice. While reasonable efforts have been made in the preparation of this publication to assure its accuracy, Sonus Networks assumes no liability resulting from technical or editorial errors or omissions, or for any damages resulting from the use of this information. Unless specifically included in a written agreement with Sonus Networks, Sonus Networks has no obligation to develop or deliver any future release or upgrade, or any feature, enhancement or function. Copyright 2014 Sonus Networks, Inc. All rights reserved. Sonus is a registered trademark of Sonus Networks, Inc. All other trademarks, service marks, registered trademarks or registered service marks may be the property of their respective owners. DS /29 5

How Service Providers Can Seize the SBC as a Service Opportunity

How Service Providers Can Seize the SBC as a Service Opportunity How Service Providers Can Seize the SBC as a Service Opportunity Table of Contents Introduction..................................... 3 More Business for Service Providers....................... 3 Bringing

More information

What is an E-SBC? WHITE PAPER

What is an E-SBC? WHITE PAPER Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services

More information

Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks

Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Today, the mobile industry is in the midst of a fundamental transformation. Circuit-switched TDM technology, which has been the

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Securing Unified Communications for Healthcare

Securing Unified Communications for Healthcare Securing Unified Communications for Healthcare Table of Contents Securing UC A Unique Process... 2 Fundamental Components of a Healthcare UC Security Architecture... 3 Making Unified Communications Secure

More information

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and

More information

Rethinking the WAN for the Cloud Computing Era: How SDN Technology Brings Lower WAN Costs While Improving Performance

Rethinking the WAN for the Cloud Computing Era: How SDN Technology Brings Lower WAN Costs While Improving Performance Rethinking the WAN for the Cloud Computing Era: How SDN Technology Brings Lower WAN Costs While Improving Performance Table of Contents Introduction..................................... 3 Sizing Up the

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment

Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment Office 365 Cloud PBX Options of Migrating to a Skype for Business Cloud Deployment Table of Contents Introduction..................................... 3 Skype for Business within Your Enterprise...........................

More information

Turn Your Cloud Exchange Network Into a Network-as-a-Service

Turn Your Cloud Exchange Network Into a Network-as-a-Service Turn Your Cloud Exchange Network Into a Network-as-a-Service Use software-defined networking to make your Wide Area Network into a Revenue Generating Asset Table of Contents Introduction.....................................

More information

SIP SECURITY JULY 2014

SIP SECURITY JULY 2014 SIP SECURITY JULY 2014 Executive Overview As with any data or communication service, it s important that all enterprises understand potential security issues related to SIP Trunking. This paper provides

More information

SBC WHITE PAPER. The Critical Component

SBC WHITE PAPER. The Critical Component SBC WHITE PAPER The Critical Component Table of Contents of your VoIP Infrastructure... 3 Enter the SBC... 4 Functions... 5 Security... 5 Denial of Service... 5 Toll Fraud... 6 Encryption... 6 Policy...

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller?

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller? An Oracle White Paper August 2013 What Is an Enterprise Session Border Controller? Introduction... 1 Redefining Enterprise Communications... 2 E-SBCs Protect and Control IP Communications... 3 E-SBCs Do

More information

SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks

SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks SDN Orchestration Explained A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks Table of Contents Introduction. 3 Back Story: Defining Terms. 3 Cloud Exchange Network. 3 Orchestration

More information

VoIP Encryption in the Enterprise

VoIP Encryption in the Enterprise VoIP Encryption in the Enterprise www.sonus.net Table of Contents Introduction...................................... 1 VoIP and UC Increase Productivity and Risk.................... 1 Why VoIP Attacks

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

Whitepaper SBC Sticker Shock

Whitepaper SBC Sticker Shock Whitepaper SBC Sticker Shock Table of Contents I. Introduction... 3 II. Why an SBC?... 3 III. Avoiding Unexpected SBC Costs... 4 IV. Endpoints... 5 V. SIP Licenses... 5 VI. Conclusion... 6 DECEMBER 2014

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................

More information

The Need for Session Delivery Networks

The Need for Session Delivery Networks Executive Summary Service providers, enterprises and contact centers continue to build IP-based infrastructure to lower their operating costs and introduce new IP-enabled offerings such as VoIP, video-over-ip

More information

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives

More information

VoIP Encryption in the Enterprise

VoIP Encryption in the Enterprise VoIP Encryption in the Enterprise Table of Contents Introduction..................................... 1 VoIP and UC Increase Productivity and Risk................... 1 Why VoIP Attacks Are on the Rise.........................

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Whitepaper. Are Firewalls Enough for End-to-End. VoIP Security

Whitepaper. Are Firewalls Enough for End-to-End. VoIP Security Whitepaper Are Firewalls Enough for End-to-End VoIP Security Table of Contents I. Introduction... 3 II. Definitions... 3 III. Security... 4 IV. Interoperability... 5 V. Availability... 5 VI. A single demarcation

More information

Session Control Applications for Enterprises

Session Control Applications for Enterprises Session Control Applications for Enterprises Driven by Strong Secular Growth Trends The adoption of SIP trunking The explosion of wireless and opt-in communications The emergence of OTT service providers

More information

OpenScape UC Firewall and OpenScape Session Border Controller

OpenScape UC Firewall and OpenScape Session Border Controller UC Firewall and Session Border Controller Security within and beyond the boundaries Security within and beyond your network s boundaries Our connected world We are living and working in a new world that

More information

Voice over IP Security

Voice over IP Security Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma shorton@sangoma.com Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Software-Based Session Border Controllers are Critical to the Evolution of Communications

Software-Based Session Border Controllers are Critical to the Evolution of Communications Software-Based Session Border Controllers are Critical to the Evolution of Communications October 2013 Prepared by: Zeus Kerravala Software-Based Session Border Controllers are Critical to the Evolution

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

SBC - the UC-glue Security, Interoperability, Reliability. Alexander Kunzi

SBC - the UC-glue Security, Interoperability, Reliability. Alexander Kunzi SBC - the UC-glue Security, Interoperability, Reliability Alexander Kunzi Agenda SBC? Was s das? Wer ist ACME? Is das sicher? Und wie flexibel? Acme Packet Enterprise Solutions Marketing Page 2 Customer

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath.

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath. CounterPath Bria with Oracle TSC Feature Pack A Solution for Operator and Enterprise (OTT) Service Delivery Solution Brief Internet OTT (over-the-top) changes the way people communicate. Internet OTT services

More information

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications

Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion

More information

Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues

Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Diameter Interworking Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Table of Contents Introduction..................................... 3 Business

More information

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER How to ensure a cloud-based phone system is secure. BEFORE SELECTING A CLOUD PHONE SYSTEM, YOU SHOULD CONSIDER: DATA PROTECTION.

More information

Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It. Mike Reiman Director of Software Solutions

Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It. Mike Reiman Director of Software Solutions Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It Mike Reiman Director of Software Solutions Edgewater Networks Overview Based in San Jose, California, Edgewater Networks was founded in

More information

Security & Encryption

Security & Encryption Security & Encryption Introduction: the importance of encryption nected networks, spies can tap into the connection from Encryption for security is thousands of years old. With the No longer can any business

More information

Sonus Networks engaged Miercom to evaluate the call handling

Sonus Networks engaged Miercom to evaluate the call handling Lab Testing Summary Report September 2010 Report 100914 Key findings and conclusions: NBS5200 successfully registered 256,000 user authenticated Total IADs in 16 minutes at a rate of 550 registrations

More information

The SBC Buyer s Guide

The SBC Buyer s Guide The SBC Buyer s Guide What Every Enterprise Should Know Before Buying an SBC E N T E R P R I S E www.sonus.net Table of Contents Introduction................................ 1 Shopping for an SBC......................................................

More information

The SBC Buyer s Guide

The SBC Buyer s Guide The SBC Buyer s Guide What Every Enterprise Should Know Before Buying an SBC E N T E R P R I S E www.sonus.net Table of Contents Introduction............................... 1 Shopping for an SBC...........................

More information

SBC Evolution to Virtualization and Cloud Deployments. December 2015

SBC Evolution to Virtualization and Cloud Deployments. December 2015 SBC Evolution to Virtualization and Cloud Deployments December 2015 Copyright Copyright 2015 Sonus Networks, Inc. All rights reserved. This item and the information contained herein are the property of

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Cconducted at the Cisco facility and Miercom lab. Specific areas examined Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security

More information

Sonus SBC 2000 Web Based Management

Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Today IT organizations need a cost effective way of managing branch office appliances. The Sonus SBC 2000 web based management tool

More information

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications

Oracle s SIP Network Consolidation Solutions. Using SIP to Reduce Expenditures and Improve Communications Oracle s SIP Network Consolidation Solutions Using SIP to Reduce Expenditures and Improve Communications A typical large enterprise could enjoy 401 percent three-year ROI on the Net-Net Enterprise Session

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION

More information

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat An ISS Whitepaper 2

More information

State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network

State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network Website: Geography: Solution: Type: www.delaware.gov State of Delaware Acme Packet Net-Net SBCs Unified Communications

More information

Security Considerations

Security Considerations 112 SIP Trunking VoIP endpoints and call agents such as CUCM and CUCMExpress also have facilities to control and mark packets. These can be used directly if the enterprise markings are the same as the

More information

Voice Over IP (VoIP) Denial of Service (DoS)

Voice Over IP (VoIP) Denial of Service (DoS) Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Denial of Service (DoS) is an issue for any IP network-based

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

Understanding Lync 911 for Enterprises

Understanding Lync 911 for Enterprises Understanding Lync 911 for Enterprises Introduction Microsoft Lync delivers a complete Enterprise Voice solution through an easy-to-use interface. Enhanced 911 (E911) support is a critical component of

More information

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page

More information

Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development

Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development Why Lync MICROSOFT LYNC is an enterprise-ready UNIFIED COMMUNICATIONS PLATFORM LYNC CONNECTS PEOPLE everywhere, on Windows 8 and other

More information

Dialogic BorderNet Session Border Controller Solutions

Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP

More information

SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There

SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There SIP Trunking Steps to Success, Part One: Key Lessons from IT Managers Who ve Been There Q&A Session Date: Wednesday, April 13, 2011 Q: You have to partner with a provider in order to do SIP trunking, correct?

More information

Multi-layered Security Solutions for VoIP Protection

Multi-layered Security Solutions for VoIP Protection Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper

More information

How To Support An Ip Trunking Service

How To Support An Ip Trunking Service Small Logo SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively

More information

WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY?

WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY? WHATARETHEKEYBENEFITS OFMPLSTECHNOLOGY? CHOOSINGTHERIGHTWIDEAREANETWORKSOLUTION FORYOURMULTI-LOCATIONENTERPRISE ExecutiveBrief P a g e 1 Executive Brief What are the Key Benefits of MPLS Technology? Choosing

More information

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking

More information

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8

Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 Security Testing Summary of Next-Generation Enterprise VoIP Solution: Unify Inc. OpenScape SBC V8 SR140531D 19 August 2014 Miercom www.miercom.com Overview Unify Inc. (formerly Siemens Enterprise Communications)

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks

More information

How To Protect Your Business From A Voice Firewall

How To Protect Your Business From A Voice Firewall VOICE FIREWALL Secure your voice network edge and prevent financial losses. The ETM Voice Firewall secures your critical networking resources and lowers telecom expenses by protecting your enterprise voice

More information

WHITE PAPER. SIP Trunks. Keeping your UC System Secure

WHITE PAPER. SIP Trunks. Keeping your UC System Secure WHITE PAPER SIP Trunks Keeping your UC System Secure Table of Contents 1. Executive summary...3 2. Security considerations for SIP trunks...5 2.1. Threats.........................................................

More information

StarLeaf Connectivity Services. Deployment Guide

StarLeaf Connectivity Services. Deployment Guide StarLeaf Connectivity Services Deployment Guide 31 July 2015 Contents Terminology 4 Why are Connectivity Services needed? 4 What are Connectivity Services? 4 Calling scenarios 5 Architecture 7 Security

More information

Secure Voice over IP (VoIP) Solutions

Secure Voice over IP (VoIP) Solutions APPLICATION NOTE Secure Voice over IP (VoIP) Solutions Delivering a robust, secure VoIP solution that counters both external and internal threats while providing superior quality of service Abstract This

More information

SIP Trunking Deployment Steps and Best Practices

SIP Trunking Deployment Steps and Best Practices WHITE PAPER IP Communications SIP Trunking Deployment Steps and Best Practices A practical guide for planning, evaluating, and deploying production service in your network Introduction Today s market conditions

More information

Best Practices for deploying unified communications together with SIP trunking connectivity

Best Practices for deploying unified communications together with SIP trunking connectivity An Allstream White Paper Best Practices for deploying unified communications together with SIP trunking connectivity An Allstream White Paper 1 Table of contents Correct identification and maximization

More information

VoIP Security. Customer Best Practices Guide. August 2015. 2015 IntelePeer

VoIP Security. Customer Best Practices Guide. August 2015. 2015 IntelePeer VoIP Security Customer Best Practices Guide August 2015 2015 IntelePeer Contents Contents... 2 Getting Started... 3 Pre-Deployment Considerations... 3 Preparation Check-List... 3 Common Security Threats...

More information

Business Phone Security. Threats to VoIP and What to do about Them

Business Phone Security. Threats to VoIP and What to do about Them Business Phone Security Threats to VoIP and What to do about Them VoIP and Security: What You Need to Know to Keep Your Business Communications Safe Like other Internet-based applications, VoIP services

More information

Designed For Market Requirements

Designed For Market Requirements Enterprise SIP Designed For Market Requirements Enterprises can combine XO Enterprise SIP with ANY MPLS IP-VPN or Data Network (even from another carrier) for an all-in-one, multi-site IP communications

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With

More information

Copyright and Trademark Statement

Copyright and Trademark Statement Contents VoIP Starts with SmartNode...3 Why SmartNode?...3 SmartNode Product Comparison...5 VoIP Appliance with Embedded Windows...7 Carrier-Grade TDM + VoIP SmartMedia Gateways...8 Enterprise Solutions...9

More information

Security Best Practices for Enterprise VoIP. Preventing Attacks and Managing Risk

Security Best Practices for Enterprise VoIP. Preventing Attacks and Managing Risk Security Best Practices for Enterprise VoIP Preventing Attacks and Managing Risk A Sipera White Paper September 2007 Summary To take full advantage of unified communications (UC), enterprises are extending

More information

2012 SIP Trunking State-of-the-Market Report

2012 SIP Trunking State-of-the-Market Report 2012 SIP Trunking July 2012 Sponsored by: Sonus Networks, Inc. In June 2012, about 300 large enterprise IT professionals 1 responded to our call for information about their deployment status, plans and

More information

Brochure. Dialogic BorderNet Session Border Controller Solutions

Brochure. Dialogic BorderNet Session Border Controller Solutions Brochure Dialogic BorderNet Solutions Supercharge Connections between Networks, Services and Subscribers with Ease and Scale The BorderNet family of session border controllers (SBCs) from Dialogic helps

More information

Cloud Phone 365 Glossary of Terms

Cloud Phone 365 Glossary of Terms Cloud Phone 365 Glossary of Terms As the pace of unified communication adoption increases, small business customers may find themselves struggling to keep up with the complex language that is used in the

More information

6 Steps to SIP trunking security. How securing your network secures your phone lines.

6 Steps to SIP trunking security. How securing your network secures your phone lines. 6 Steps to SIP trunking security How securing your network secures your phone lines. The myths about SIP trunking can be misleading. There are stories that SIP has set off a cyber crime wave of corporate

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013)

SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013) Configuration Guide SBC 1000 / SBC 2000 Series Configuration Guide (For Microsoft Lync Server 2013) For use with AT&T s IP Flexible Reach Enhanced Features Service on MIS, MPLS PNT or AT&T VPN Disclaimers

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Migrating to SIP Trunking with AudioCodes Alan Percy Director, Market Development alan.percy@audiocodes.com August 2011

Migrating to SIP Trunking with AudioCodes Alan Percy Director, Market Development alan.percy@audiocodes.com August 2011 Migrating to SIP Trunking with AudioCodes Alan Percy Director, Market Development alan.percy@audiocodes.com August 2011 AudioCodes: A Brief Introduction Overview: Manufacturer of Media Gateways, Enterprise

More information

An Oracle White Paper July 2013. Session Border Controllers: A Primer

An Oracle White Paper July 2013. Session Border Controllers: A Primer An Oracle White Paper July 2013 Session Border Controllers: A Primer Introduction... 1 Part 1... 2 A Tale of Two Networks... 2 Evolution to a Converged IP Network... 2 Challenges of Delivering Interactive

More information