VoIP Encryption in the Enterprise

Size: px
Start display at page:

Download "VoIP Encryption in the Enterprise"

Transcription

1 VoIP Encryption in the Enterprise

2 Table of Contents Introduction VoIP and UC Increase Productivity and Risk Why VoIP Attacks Are on the Rise Where Does Real-Time Encryption Fit in the Broader VoIP Security Picture?... 2 Encryption of VoIP Signaling and Media The Cost of No Security (sidebar) Effectively Deploying VoIP Encryption in the Enterprise Sonus Session Border Control: Best in Class Conclusion About Sonus

3 With reduced costs and increased productivity as the carrot, and true Unified Communications as the goal, enterprises are consolidating their voice and data communications onto a single, IP-based architecture. The move toward Unified Communications, however, is forcing enterprises to re-examine the security of their Voice over IP (VoIP) capabilities. VoIP communications require unique encryption measures to defend the enterprise network against real-time VoIP-based attacks, and protect both corporate and customer information. They must also comply with government regulations and adhere to industry standards from regulatory agencies that can issue hefty fines. In addressing these goals, enterprises must plan well to implement real-time VoIP encryption or risk reducing their network s capacity. Fortunately for enterprises, VoIP security itself is not a new phenomenon, but has been practiced for years by global carrier networks. VoIP carrier networks rely on several standardized encryption protocols, including Transport Layer Security (TLS) and IPsec for SIP signaling encryption, and Secure Real-time Transport Protocol (SRTP) for RTP media encryption. While a network border element such as a Session Border Controller (SBC) usually performs this encryption, SBC devices can vary widely in how they perform this encryption. For example, some SBCs assign encryption to integrated hardware and dedicated processors, while others perform the encryption via additional hardware devices or in a general-purpose CPU. How an SBC performs signaling and media encryption can have a significant impact on VoIP network performance, from added latency to reduced call capacity. How an SBC performs signaling and media encryption can have a significant impact on VoIP network performance. This white paper examines the drivers and challenges of enterprise VoIP security, with a focus on the factors that an enterprise must consider when implementing VoIP encryption in their network. In addition, the paper covers various SBC encryption methods while highlighting the unique design of Sonus SBCs which provide exceptional network performance even under high encryption loads. VoIP and UC Increase Productivity and Risk There was a time when IT managers lost no sleep at the thought of a voice-based network attack; the migration from legacy TDM to VoIP networks changed all that. IP-based voice communications promised a new era of lower costs, higher bandwidth, and blended voice/data services. Even as that door of opportunity was opened,however, a new danger slipped in: the introduction of IP-based attacks, network intrusions, and information theft through voice communications. In the case of enterprises, the security stakes are especially high as compromised customer data can generate stiff penalties and losses totaling millions of dollars. As enterprises come to rely on real-time, session-based communications, they must also practice real-time VoIP security. This can be increasingly difficult in an environment where SIP-sniffing software is easily available on the Internet. In addition, enterprises must be careful to protect both their internal and external borders, as privacy attacks are as likely to come from internal sources, including employees and partners, as outside the corporate network. Thus the challenge for enterprises is not only protecting the network, but also balancing the interests of security with real-time network performance. The list of widely available (and often free) tools that can eavesdrop on and record VoIP and UC traffic keeps growing. Why VoIP Attacks Are on the Rise The widespread nature of the Internet and the proliferation of tools for intercepting IP packets and cracking code make it increasingly easy for attackers to monitor, record, disrupt, or modify VoIP calls and UC sessions. For example, unauthorized parties can use free network protocol analyzers to surreptitiously capture and interpret VoIP calls, record media streams for later analysis, and intercept Instant Messaging (IM) communications. Hackers use other tools like UCSniff to identify, record, and replay VoIP conversations or IP videoconferencing sessions. And the list of widely available (and often free) tools that can eavesdrop on and record VoIP and UC traffic keeps growing. The roster of potential attackers is expanding, too. Organized criminal groups both at home and abroad have found the Internet a profitable new avenue from which to mount high-tech fraud, identity theft, and extortion schemes. In fact, cybercrime can be so lucrative it has created a cottage industry of hackers-for-hire who sell their services on a contract basis around the globe. Rogue nations are also increasingly involved in Internet-based espionage and attacks on defense, civilian government, and private-industry targets.

4 Hacking into VoIP or UC sessions requires that the malicious party intercept signaling and/or media flowing between two endpoints at any of several points along the communications path. The point of attack may include: > > UC application servers; > > Call control elements such as PBXs and Automatic Call Distributors (ACDs); > > Session-layer servers and proxies such as session border controllers; > > Transport and network layer elements like routers; > > Link-layer elements including Ethernet and wireless LANs; or on the endpoints themselves via malware downloads or administrator-level remote access. Man-in-the-middle attacks are another threat on IP-based communications, in which software injects itself into the voice, video, or instant messaging stream between two endpoints, selectively altering certain packets so as to be nearly undetectable to the end users. Modifying, disrupting, or lowering the quality of IP communications can have a variety of adverse effects on the enterprise. For example, an attacker can modify or discard critical financial transactions, disrupt business operations, or reduce the quality of customer service. Where Does Real-Time Encryption Fit in the Broader VoIP Security Picture? To defend against the widest possible range of VoIP-based attacks, an enterprise VoIP security strategy should protect both the endpoint and the media itself. This can be achieved through a holistic security approach that includes: > > VPNs to logically separate voice and data traffic on the common IP network; > > Border security elements such as session border controllers to provide call admission control and protect against DoS attacks; > > Signaling and media encryption of VoIP sessions, including those sessions stored on voice messaging systems and call recording systems. While many enterprises have implemented VPN and border security technologies to protect their IP-based data networks, the encryption of VoIP signaling and media is a unique consideration that has grown in importance with the advent of more pervasive VoIP/UC implementations in the enterprise. SBCs without dedicated encryption hardware will normally encrypt traffic at the expense of session performance. Encryption of VoIP Signaling and Media The encryption of VoIP signaling and media mitigates a number of IP-based threats including passive monitoring/recording, packet decryption/modification, service/bandwidth theft, endpoint impersonation, denial of service, and escalation of network user privileges. Because signaling and media use different protocols with unique properties and constraints, VoIP networks employ Transport Layer Security (TLS) and/or IPsec for signaling encryption and Secure RTP (SRTP) for encrypting RTP media. TLS and IPsec provide bilateral endpoint authentication and secure transport of signaling information using advanced cryptography. SRTP provides encryption (and decryption) of the RTP media used in real-time IP communications such as VoIP and certain UC applications (e.g., conferencing and IM). TLS, IPsec, and SRTP encryption enable enterprises to secure VoIP communications by performing three key functions: > > Endpoint authentication: This supports the use of digital signatures (which may be proprietary or verified by a trusted third party) and pre-shared, secret-based authentication to verify the identity of session endpoints; > > Message integrity: This ensures that media and signaling messages have not been altered or replayed between endpoints; > > Privacy: Encrypted messages can only be viewed by authorized endpoints, mitigating information/service theft and satisfying both regulatory and corporate requirements for private communications. Ensuring that your VoIP security solution employs the latest encryption/decryption methods is vital to ensuring broad network/ UC interoperability in the future.

5 The Cost of No Security Everyone is familiar with the risks posed by attacks on the data side of the network: stolen credit card numbers, compromised passwords, Denial of Service, financial fraud, Social Security number theft, etc. Those same risks apply to VoIP communications as well, though they may manifest themselves in different ways such as eavesdropping, Telephony Denial of Service (TDoS) attacks, and ANI spoofing targeted to call centers. Yet these can be equally destructive, consuming valuable resources, driving down revenue, and damaging brand equity. The most serious consequence of a nonsecure VoIP network remains the exposure of confidential information: > > Private consumer data (e.g., Social Security numbers); > > Sensitive company information (sales data, marketing plans, new product details); > > Cardholder data (e.g., credit or debit card numbers); > > Patient data (e.g., diagnosis and prescription records). An enterprise security breach that discloses confidential information can result in financial penalties and other sanctions. For example, a single incidence of non-compliance in credit card processing can generate multimillion-dollar fines and liability for losses from fraud and theft. Mandated costs can also include re-issuing cards, communicating the breach to customers, and suspension of card-processing rights. Non-compliance with federal and industry security regulations can cost enterprises millions of dollars in fines, compensation, and lost revenue. Here s a partial list of regulatory measures that govern how enterprises should address VoIP security. AGENCY INDUSTRY GOALS RELEVANT VoIP/ UC ISSUES Gramm-Leach-Bliley Act (GLBA) Any company involved in financial services (banking, credit, securities, insurance, etc.) Privacy for financial services customers, including the security and confidentiality of customer records. Prevent unauthorized VoIP packet interception & decryption. Secure internal wireless networks and communications over public wireless networks. Health Insurance Portability and Accountability Act (HIPAA) Any organization that handles medical records or other personal health information. Privacy for healthcare patients: medical records, diagnosis, x-rays, photos, prescriptions, lab work, and test results. Secure authorized internal & external access to patient data. Sarbanes-Oxley Act (SOX) Public companies Security & auditing of public companies Maintain VoIP usage logs & track administrative changes. Implement strong authentication policies to prevent unauthorized system use. Federal Information Security Management Act (FISMA) Any US federal agency, contractor, or company/ organization that uses/operates an information system on behalf of a federal agency. IT security for US federal agencies. Mandates implementation of policies & procedures to reduce IT security risks. FISMA requirements for System and Information Integrity (SI) for VoIP/UC. Implement solutions to remediate security flaws; provide security alerts & advisories; protect against malicious code; detect & prevent network intrusions and malware; maintain application & information integrity. Payment Card Industry Data Security Standard (PCI DSS) Any company that issues or accepts VISA, MasterCard, American Express, Diners Club, or Discover credit or debit cards. Privacy of confidential cardholder (customer) information. Protect confidential cardholder data and sensitive information shared between employees over VoIP calls or UC sessions. Protect sensitive information stored on voice messaging or call recording systems. Track and monitor access to network resources and cardholder data.

6 Effectively Deploying VoIP Encryption in the Enterprise The presence of TLS, IPsec, and SRTP encryption may increase call latency. Therefore, signaling and media encryption must be thoughtfully integrated into the IP network traffic flow to prevent added network latency or decreased performance under load. Enterprises must weigh several considerations before they deploy VoIP encryption in their network: > > Session Performance Remember that encryption requires additional processing of signaling and media. Extra hops to a separate encryption device in the network or an SBC that performs encryption from the main CPU can add unwanted latency to realtime communications or compromise call-handling capacity. Therefore, it s important to find an encryption solution that has minimal impact on session capacity and network performance. While enterprises should consider implementing security solutions such as standalone Session Border Controllers (SBCs), enterprises should be aware that SBCs without dedicated encryption hardware will normally encrypt traffic at the expense of session performance. SBC 9000 SBC 5200 Built on GSX9000 platform Centralized routing via PSX TDM migrating to IP-PI with media transcoding Compelling migration path of gateway investment Built on pure IP platform Embedded or centralized PSX routing engine IP-IP with media transcoding Industry Leading Performance Densily FIGURE 12. The Next Generation of Border Control > > Multimedia Support As UC initiatives grow, enterprises will be required to handle a variety of multimedia sessions including voice, video, IM, and collaborative applications. To reduce cost and network complexity, enterprises should look for an SBC that has robust transcoding capabilities and supports multiple media types. > > Encryption Standards Simply put, some decryption standards are more accepted/effective than others. Ensuring that your VoIP security solution employs the latest encryption/decryption methods is vital to ensuring broad network/uc interoperability in the future. > > Disaster/Failover Recovery Network equipment failures, fiber cuts, and natural disasters happen despite the best precautions. Enterprise security systems need to be prepared for this reality with a backup/failover plan for all aspects of security including VoIP/UC session encryption. This can best be achieved by deploying SBCs in redundant, paired configurations. > > Centralized Policy Management For the reasons cited above as well as human error and operational cost, a central management console for encryption policies in the network is both desirable and essential. Sonus Session Border Control: Best in Class When it comes to VoIP network security, enterprises need a solution that protects their network and customer data without compromising real-time communications performance. As a leader in secure VoIP networks, Sonus Networks has for many years offered its customers a high-performance border solution with the hybrid TDM/IP Sonus SBC 9000 session border controller. The Sonus SBC 5200 session border controller is a pure IP appliance that meets the cost and performance requirements of enterprise VoIP deployments. The SBC 5200 is built on an IP-optimized platform that delivers plug-and-play functionality and high (99.999%) reliability. Sonus SBCs feature a unique architectural design that differs from other SBCs on the market today by aggregating all of the session border functionality security, encryption, transcoding, call routing, and session management into a single device and distributing those functions to embedded hardware within the device. For example, media transcoding on the SBC 5200 and SBC 9000 is performed on an embedded DSP farm while much of the encryption is handled on embedded cryptographic hardware, providing optimal SBC performance during real-world workloads, overloads, and attacks.

7 Because SRTP and IPsec occur lower in the protocol stack, Sonus has elected to perform these tasks on dedicated hardware within the SBC 5200 and SBC This provides much better performance during heavy encryption workloads than SBCs that use software for encryption, which can divert processing power from the main CPU. Conclusion As enterprises shift more of their critical internal and external communications to a unified, IP-based voice/data network, they are increasing their network s exposure to VoIP-based attacks. Meanwhile, the cost of not practicing secure VoIP communications is rising in the form of stricter government and industry regulations and the direct costs of lost confidential information, lost service, and lost credibility. With the trend toward real-time unified communications, the requirements of VoIP security will increase exponentially, placing added importance on solutions that deliver high scalability and high performance. Sonus SBCs provide enterprises with a cost-effective and scalable solution for VoIP security and encryption. With a unique architecture that divides security functions among multiple processors on a single chassis, Sonus SBCs deliver the highperformance encryption and security that enterprises need to navigate the future of all-ip communications safely and securely. About Sonus Sonus is a leading provider of media gateway, centralized call routing, and session border control solutions for enterprises. Sonus solutions enable enterprises to reduce their recurring telecom costs, gracefully manage the migration from legacy voice to VoIP, and mitigate business continuity and security threats for critical enterprise voice and contact center infrastructure. Sonus solutions are deployed throughout the world s largest SIP networks, driving over 5,854 SIP sessions every second.

8 Sonus Networks North American Headquarters Sonus Networks APAC Headquarters Tel: GO-SONUS 1 Fullerton Road #02-01 One Fullerton Singapore Singapore tel: Sonus Networks EMEA Headquarters Sonus Networks CALA Headquarters 4 Technology Park Drive Westford, MA U.S.A. 56 Kingston Road Staines, TW18 4NL United Kingdom Tel: Mexico City, Campos Eliseos Polanco Andrés Bello 10, Pisos 6 y 7, Torre Forum Col. Chapultepec Morales, Ciudad de México Mexico City, Mexico Tel: The content in this document is for informational purposes only and is subject to change by Sonus Networks without notice. While reasonable efforts have been made in the preparation of this publication to assure its accuracy, Sonus Networks assumes no liability resulting from technical or editorial errors or omissions, or for any damages resulting from the use of this information. Unless specifically included in a written agreement with Sonus Networks, Sonus Networks has no obligation to develop or deliver any future release or upgrade or any feature, enhancement or function. Copyright 2012 Sonus Networks, Inc. All rights reserved. Sonus is a registered trademark and SBC 5200 and SBC 9000 are trademarks of Sonus Networks, Inc. All other trademarks, service marks, registered trademarks or registered service marks may be the property of their respective owners. Printed in the USA 05/12 WP-1125 Rev. B

VoIP Encryption in the Enterprise

VoIP Encryption in the Enterprise VoIP Encryption in the Enterprise Table of Contents Introduction..................................... 1 VoIP and UC Increase Productivity and Risk................... 1 Why VoIP Attacks Are on the Rise.........................

More information

Sonus SBC 2000 Web Based Management

Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Sonus SBC 2000 Web Based Management Today IT organizations need a cost effective way of managing branch office appliances. The Sonus SBC 2000 web based management tool

More information

Securing Unified Communications for Healthcare

Securing Unified Communications for Healthcare Securing Unified Communications for Healthcare Table of Contents Securing UC A Unique Process... 2 Fundamental Components of a Healthcare UC Security Architecture... 3 Making Unified Communications Secure

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

SIP SECURITY JULY 2014

SIP SECURITY JULY 2014 SIP SECURITY JULY 2014 Executive Overview As with any data or communication service, it s important that all enterprises understand potential security issues related to SIP Trunking. This paper provides

More information

The Evolution of Session Border Control

The Evolution of Session Border Control The Evolution of Session Border Control The Early Days of SBC Session Border Controllers (SBCs) originated as discrete devices in an IP network to provide two key functions: connectivity and security.

More information

Understanding Lync 911 for Enterprises

Understanding Lync 911 for Enterprises Understanding Lync 911 for Enterprises Introduction Microsoft Lync delivers a complete Enterprise Voice solution through an easy-to-use interface. Enhanced 911 (E911) support is a critical component of

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

How Service Providers Can Seize the SBC as a Service Opportunity

How Service Providers Can Seize the SBC as a Service Opportunity How Service Providers Can Seize the SBC as a Service Opportunity Table of Contents Introduction..................................... 3 More Business for Service Providers....................... 3 Bringing

More information

What is an E-SBC? WHITE PAPER

What is an E-SBC? WHITE PAPER Executive Summary Enterprise communications is in a state of transformation. Businesses are replacing conventional PBX systems with VoIP and Unified Communications (UC) solutions and cloud-based services

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings

More information

Sonus Networks engaged Miercom to evaluate the call handling

Sonus Networks engaged Miercom to evaluate the call handling Lab Testing Summary Report September 2010 Report 100914 Key findings and conclusions: NBS5200 successfully registered 256,000 user authenticated Total IADs in 16 minutes at a rate of 550 registrations

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Information Security: A Perspective for Higher Education

Information Security: A Perspective for Higher Education Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose

More information

SIP Trunking and the Role of the Enterprise SBC

SIP Trunking and the Role of the Enterprise SBC SIP Trunking and the Role of the Enterprise SBC a Tango Networks ebriefing SIP trunks offer companies of all sizes the opportunity to improve and simplify their communications network while reducing costs.

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications

Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................

More information

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma [email protected]

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma shorton@sangoma.com SangomaSBCs Keeping Your VoIP Network Secure Simon Horton Sangoma [email protected] Inside this Deck About Sangoma/ProVu SIP Market SBCs Demystified Business Applications and Use Cases Portfolio of SBCs

More information

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009

S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009 S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure

More information

Wireless Security with Cyberoam

Wireless Security with Cyberoam White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture

More information

Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment

Office 365 Cloud PBX. Options of Migrating to a Skype for Business Cloud Deployment Office 365 Cloud PBX Options of Migrating to a Skype for Business Cloud Deployment Table of Contents Introduction..................................... 3 Skype for Business within Your Enterprise...........................

More information

Mitigating the Security Risks of Unified Communications

Mitigating the Security Risks of Unified Communications 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose

More information

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller?

An Oracle White Paper August 2013. What Is an Enterprise Session Border Controller? An Oracle White Paper August 2013 What Is an Enterprise Session Border Controller? Introduction... 1 Redefining Enterprise Communications... 2 E-SBCs Protect and Control IP Communications... 3 E-SBCs Do

More information

Solution Brief. Secure and Assured Networking for Financial Services

Solution Brief. Secure and Assured Networking for Financial Services Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to

More information

Security & Encryption

Security & Encryption Security & Encryption Introduction: the importance of encryption nected networks, spies can tap into the connection from Encryption for security is thousands of years old. With the No longer can any business

More information

SBC WHITE PAPER. The Critical Component

SBC WHITE PAPER. The Critical Component SBC WHITE PAPER The Critical Component Table of Contents of your VoIP Infrastructure... 3 Enter the SBC... 4 Functions... 5 Security... 5 Denial of Service... 5 Toll Fraud... 6 Encryption... 6 Policy...

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks

More information

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.

More information

Voice over IP Security

Voice over IP Security Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

Security and the Mitel Teleworker Solution

Security and the Mitel Teleworker Solution Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

Acme Packet session border controllers in the enterprise

Acme Packet session border controllers in the enterprise Acme Packet session border controllers in the enterprise Large enterprises have been expanding their deployments of IP telephony (IPT) for several years now. Planning has already begun to extend the benefits

More information

Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks

Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Leveraging Synergies across Diameter and SIP Signaling in 4G/LTE Networks Today, the mobile industry is in the midst of a fundamental transformation. Circuit-switched TDM technology, which has been the

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue. Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

OpenScape UC Firewall and OpenScape Session Border Controller

OpenScape UC Firewall and OpenScape Session Border Controller UC Firewall and Session Border Controller Security within and beyond the boundaries Security within and beyond your network s boundaries Our connected world We are living and working in a new world that

More information

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Session Border Controllers in the Cloud

Session Border Controllers in the Cloud Session Border Controllers in the Cloud Introduction Mobile Network Operators (MNOs), carriers and enterprises must virtualize Session Border Controllers (SBCs) and deploy them in the cloud to support

More information

Enterprise Computing Solutions

Enterprise Computing Solutions Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats Symantec Enterprise Security WHITE PAPER Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats INSIDE Executive Summary Challenges to securing NAS An effective

More information

Professional Services Overview

Professional Services Overview Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded

More information

Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis

Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis White Paper Microsoft Lync and SIP trunking - Ensuring multi-vendor technology success with Prognosis by Sue Bradshaw: Technology Writer, Integrated Research Ensuring new technology like Lync delivers

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

PCI Data Security Standards (DSS)

PCI Data Security Standards (DSS) ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION

More information

Secure VoIP for optimal business communication

Secure VoIP for optimal business communication White Paper Secure VoIP for optimal business communication Learn how to create a secure environment for real-time audio, video and data communication over IP based networks. Andreas Åsander Manager, Product

More information

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Cconducted at the Cisco facility and Miercom lab. Specific areas examined Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security

More information

SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks

SDN Orchestration Explained. A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks SDN Orchestration Explained A Deep Dive into a Crucial Component of Software-Defined Cloud Exchange Networks Table of Contents Introduction. 3 Back Story: Defining Terms. 3 Cloud Exchange Network. 3 Orchestration

More information

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks 4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers

More information

Building the Lync Security Eco System in the Cloud Fact Sheet.

Building the Lync Security Eco System in the Cloud Fact Sheet. Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure all entries to the fastest growing Unified Communication application (UC) and allow for complete inter-operability

More information

Dialogic BorderNet Session Border Controller Solutions

Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking

More information

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital

More information