Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance
|
|
- Curtis Anthony
- 8 years ago
- Views:
Transcription
1 Telephony Denial of Service (TDoS) Attacks Dan York, CISSP Chair, VoIP Security Alliance May 29, 2013
2 My Background danyork.me DisruptiveTelephony.com blueboxpodcast.com
3 Evolution of PSTN connectivity
4 What's In A Name? Many names for new "carriers": Internet Telephony Service Provider () SIP Service Provider (SSP) Voice (or VoIP) Service Provider (VSP) Service Provider Key point is that they provide gateway from IP communications to Public Switched Telephone Network (PSTN)
5 The Old Boys Club Carrier Carrier Carrier Carrier PSTN Carrier Carrier Carrier
6 The Wild West PSTN
7 Telephony Denial of Service (TDoS) Attacks
8
9 TDoS Attacks Generation of a LARGE number (hundreds, thousands ) of phone calls toward a target An objective is to overwhelm target system to prevent recipient from being able to receive legitimate phone calls May also incur costs to target or cause software/equipment failures Typically use Caller-ID spoofing to mask origin of calls
10 Target does NOT have to use VoIP IMPORTANT: This is NOT about the target using "voice-over-ip" This can happen to you TODAY using a "regular" / "traditional" phone system However, an attacker can use VoIP to generate large number of calls
11 Attacking via VoIP Attacker can quickly set up IP-based PBX using open source software Can run attack software in cloud platforms (ex. Amazon EC2) Obtain PSTN connectivity through many different s Including via compromised accounts on s (i.e. legitimate account where the credentials have been broken) Use spoofed Caller-ID to hide origin Tools are out there to simplify / automate this process Calls appear to target as originating from many different providers
12 Attacking via VoIP Attacker PSTN YOU!
13 Distributing The Attack Botnets Operating Many Different PBX Instances (ex. cloud providers) Using Compromised Account Info Services You Can Purchase
14 Mitigating TDoS Attacks
15 No Silver Bullet Combination of: Network architecture Service provider capabilities On-premises security devices Ability of staff (your staff and at service provider) to respond during the attack
16 NENA TDoS Checklist NENA Recommended Best Practices Checklist for TDoS Before a TDoS attack: Speak with service providers Ensure PSAP staff have contact info for service providers Examine architecture to identify potential ways to mitigate risks During an attack: Save the voice recordings Record all phone numbers and account information if the attacker makes contact Retain all call logs and IP logs Attempt to separate affected phone number from emergency numbers
17 Additional Aspects of VoIP (if you move to IP)
18 Evolution of Attacks
19 Complexity IM Networks IP-PBX Operating Systems Mobile Devices PSTN Gateways Internet VoIP Application Servers Web Servers IP Network Firewalls Social Networks Servers Voic Desktop PCs Session Border Controller s Physical Wiring CRM Systems Directory Servers Database Servers
20 However, additional tools come with IP Session Border Controllers (SBCs) DoS/DDoS specific security devices Firewalls Mechanisms under development with Session Initiation Protocol (SIP) to add further security
21 Resources
22 NENA Best Practices Checklist Service-Attacks-Against Centers.htm Short form: Direct PDF:
23
24 Security Links VoIP Security Alliance - Threat Taxonomy - Blog - Security Tools list - Blue Box: The VoIP Security Podcast - NIST SP800-58, Security Considerations for VoIP Systems Network Security Tools Hacking Exposed VoIP site and tools Seven Deadliest Unified Communications Attacks
25 Back to you, Brian
26 Thank you! Q & A? Dan York - dan.york@voipsa.org twitter.com/danyork
White Paper. avaya.com 1. Table of Contents. Starting Points
White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting
More informationIngate Firewall/SIParator SIP Security for the Enterprise
Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...
More informationSecurity & Reliability in VoIP Solution
Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad ram@ranchnetworks.com About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture
More informationSecuring SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
More informationENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION
More informationPETER CUTLER SCOTT PAGE. November 15, 2011
Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic
More informationTHE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER
THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER How to ensure a cloud-based phone system is secure. BEFORE SELECTING A CLOUD PHONE SYSTEM, YOU SHOULD CONSIDER: DATA PROTECTION.
More informationRisk Free Migration to Lync Kevin Isacks, VP SBC & CA Development
Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development Why Lync MICROSOFT LYNC is an enterprise-ready UNIFIED COMMUNICATIONS PLATFORM LYNC CONNECTS PEOPLE everywhere, on Windows 8 and other
More informationOfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
More informationCyber Security and Next Gen Systems
Cyber Security and Next Gen Systems Jay English Director Comm. Center & 9-1-1 Services APCO International 2013; all rights reserved Topics to Cover NG9-1-1 Emerging technology and emerging threats Basic
More informationIP-PBX Buyers Guide 2006
IP-PBX Buyers Guide 2006 Produced by: Contents PBX Basics What s Different about IP-PBX Basic Features of IP-PBX Advanced Features Other Issues Conclusion IP-PBX Guide 2 PBX Basics A PBX is essentially
More informationOpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border
Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives
More informationHow To Make A Cell Phone Converged Into A Cell Network
MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationComparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios
An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice
More informationWHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS
Position Paper AN INTRODUCTION TO NETWORK TELEPHONY WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS www.techknowpartners.com Position Paper AN INTRODUCTION TO NETWORK TELEPHONY WHY IP-PBX SYSTEMS ARE GOOD FOR
More informationBest Practices for Securing IP Telephony
Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram
More informationAdding Telephony to Microsoft Lync with Office 365 & Other Use Cases June 11, 2013
Adding Telephony to Microsoft Lync with Office 365 & Other Use Cases June 11, 2013 Attendee Dashboard Control Panel Click plus [+] icon to expand menus Click minus [-] icon to collapse menus Questions
More informationCalculate Your Savings
Calculate Your Savings See how the right phone system can improve your bottom line. Are you missing important calls and lost revenue? Are missing important calls and lost revenue? Could you provide a better
More informationNEW!!! Industry s only Comprehensive VoIP Security Boot Camp
NEW!!! Industry s only Comprehensive VoIP Security Boot Camp IP 3, Inc. the nation s leading trainer for Securing Emerging Technologies has partnered with Salare Security to launch one of the most intense
More informationKISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60
SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS
More informationNICC ND 1438 V1.1.1 (2016-03)
NICC Document Voluntary Code of Practice Mitigating Theft of Service from End User Voice over IP Communications Systems Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636
More informationFirewalls vs. ESBCs: You May Be Under Attack and Not Even Know It. Mike Reiman Director of Software Solutions
Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It Mike Reiman Director of Software Solutions Edgewater Networks Overview Based in San Jose, California, Edgewater Networks was founded in
More informationVOIP Security Essentials. Jeff Waldron
VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry
More informationMicrosoft Response Point
Small business communication made easy. Introducing Microsoft Response Point, ground-breaking phone system software created specifically for small businesses with up to 50 employees. Loaded with advanced
More informationVoIP Security: How Secure is Your IP Phone?
VoIP Security: How Secure is Your IP Phone? Dan York, CISSP Director of IP Technology, Office of the CTO Chair, Mitel Product Security Team Member, Board of Directors, VoIP Security Alliance (VOIPSA) ICT
More informationAn outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
More informationA Microsoft Qualified Solution for Lync TM Survivability at the Branch Office
White Paper A Microsoft Qualified Solution for Lync TM Survivability at the Branch Office Introducing NET s UX2000 Real Time Services Platform Michael J. Finnerman President dbrn Associates dbrnassociates.com
More informationFAQ - Device Question Can I forward calls to my mobile device? Question Can I have my greetings professionally recorded? www.coxprovoice.
FAQ - Device Question: Can I forward calls to my mobile device? Yes, the VoiceManager IP Centrex service allows you to forward calls to your mobile device or any other phone number. Question: Can I have
More informationFDIC Division of Supervision and Consumer Protection
FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering
More informationSelecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014
Selecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014 There are many Session Initiation Protocol (SIP) phones on the market manufactured by IP PBX vendors and third parties. Selecting
More informationSIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
More informationOVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS
OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS ANSWER THE CALL TO KEEP COSTS DOWN CONTENTS YOUR VOICE SERVICES NEED TO KEEP UP WITH YOUR BUSINESS 01 EVOLVING AT A PACE THAT SUITS YOU 02 OUTBOUND VOICE SOLUTIONS
More informationThreat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
More informationImplementing VoIP monitoring solutions. Deployment note
Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and
More informationBuilding the Lync Security Eco System in the Cloud Fact Sheet.
Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure all entries to the fastest growing Unified Communication application (UC) and allow for complete inter-operability
More informationFAQ - Features Question Question Question Question Question Question
FAQ - Features Question: What feature does Virtual Number Service replace? Answer: Virtual Number Service replaces Remote Call Forwarding. Question: What is call screening? Answer: Call screening is the
More informationVoIP Security Methodology and Results. NGS Software Ltd
VoIP Security Methodology and Results NGS Software Ltd Barrie Dempster Senior Security Consultant barrie@ngssoftware.com Agenda VoIP Security Issues Assessment Methodology Case Study: Asterisk VoIP Security
More informationSession Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
More informationSIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
More informationHow To Implement A Cisco Vip From Scratch
Overview of Cisco VoIP Infrastructure Solution for SIP The Cisco VoIP Infrastructure Solution for SIP implements a voice-over-packet network design using SIP to provide telephony services. It lays the
More informationTELECOM FRAUD CALL SCENARIOS
TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple
More informationSITEL Voice Architecture
SITEL Voice Architecture www.sitel.com SIP Voice Architecture: What is it? And how contact center operators can save money using it. By: Kevin Weier, Director, Global Voice Infrastructure and Architecture,
More informationIBM WebSphere Application Server Communications Enabled Applications
IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment
More informationVOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call
More informationAcme Packet session border controllers in the enterprise
Acme Packet session border controllers in the enterprise Large enterprises have been expanding their deployments of IP telephony (IPT) for several years now. Planning has already begun to extend the benefits
More informationState of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network
State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network Website: Geography: Solution: Type: www.delaware.gov State of Delaware Acme Packet Net-Net SBCs Unified Communications
More informationApplication Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0 Abstract These Application Notes describe the steps
More informationSIP trunking: The what, how and why
SIP trunking: The what, how and why Table of Contents Section 1: SIP and IP Telephony... 1 Section 2: SIP has emerged as the protocol winner. Now what?... 2 Section 3: A SIP trunking checklist... 3 Section
More informationCisco Certified Network Associate (CCNA) Cisco Certified Network Associate (CCNA)
Cisco Certified Network Associate (CCNA) CISCO Certification Path IIHT Nagpur is one of the best IT training Institutes that provides Cisco, Cloud Computing, hardware and networking courses. Address -
More informationIP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week
Course Title: No. of Hours: IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week 1 Course Duration: 3 Months (12weeks) No. Of Hours: 7 Hrs./Day- 5 days/week.
More informationVoIP and Beyond. Alex Gatiragas Product Manager Enterprise Convergence NEC Business Solutions Limited
VoIP and Beyond Alex Gatiragas Product Manager Enterprise Convergence NEC Business Solutions Limited July 2005 Agenda 2004 a year in review. Hybrid / Pure IP Telephony platforms. 2005 and Beyond Voice
More informationCommunications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise
Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling
More informationFirewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
More informationDeploying SIP Phones into Unified Communications Solutions with the Dialogic Media Gateway Series
Communication is an important part of business enterprises, and many are adopting Unified Communications (UC) solutions to improve business processes and enhance communications. These UC solutions typically
More informationOverview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)
Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence
More informationCounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath.
CounterPath Bria with Oracle TSC Feature Pack A Solution for Operator and Enterprise (OTT) Service Delivery Solution Brief Internet OTT (over-the-top) changes the way people communicate. Internet OTT services
More informationPRESENTER NAME Communication Capabilities E-mail/Calendaring Mobile Phones Voicemail Fax Integrated Communication Solutions IM and Presence Web and Video Conferencing VoIP PBX Integration Integration
More informationSecurity issues in Voice over IP: A Review
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu
More informationHOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION 01 INTRODUCTION Inclarity is the UK s leading provider of Hosted Telephony, Hosted UC and Hosted Video solutions. We help our customers to communicate
More informationSaving Money and Simplifying Architecture with the Session Initiation Protocol
SIP-O-Nomics Saving Money and Simplifying Architecture with the Session Initiation Protocol By Irwin Lazar Vice President, Communications Research, Nemertes Research Executive Summary SIP, the Session
More informationDoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
More informationICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network
ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and
More informationContents. Specialty Answering Service. All rights reserved.
Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from
More informationLync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013
Lync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013 Live from WPC 2013! 2 Inside this Deck Unified Communications Defined Lync 2013 Demystified Lync Express
More informationVoIP Survivor s s Guide
VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the
More informationAn Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision
An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks
More information2 Voice over IP Network
2 Voice over IP Network VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 8 2.1 VoIP Network Elements...3 2.2 Single-Site VoIP Location...4 2.3 Multi-Site VoIP Location...5 2.4 PBX Networking
More informationEnabling Users for Lync services
Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option
More informationVerizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories.
Verizon 2009 All Rights Reserved. 1 Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration Gaston Ormazabal Verizon Laboratories May 13, 2009 June 16, 2009 Verizon 2009 All
More informationNorth American VoIP Access and SIP Trunking Services Markets
North American VoIP Access and SIP Trunking Services Markets UC Adoption and Increasing Customer Awareness Drive Demand for SIP Trunking Services September 2011 Table of Contents Executive Summary - Executive
More informationBreaking up with your Landline Unified Communications: VoIP Phone Systems. MTUG Conference May 2014. service. proactive. value
service proactive Breaking up with your Landline Unified Communications: VoIP Phone Systems value MTUG Conference May 2014 WELCOME!!! Ricoh Team: Dave McLaughlin, Solution Consultant, Ricoh USA Todd Milbrand,
More informationDate: May 1, 2009. Unified Communications Strategic Planning
Date: May 1, 2009 Unified Communications Strategic Planning Date: January, 2012 Table Of Contents 1. Executive Overview... 2 2. Strategic Planning Tool... 3 3. Identify Communication Requirements... 4
More informationSecurity and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all
More informationSam Cavaliere. Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860
Sam Cavaliere Unified Communications Solutions Sales Professional Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860 Agenda Define UC Foundation for Communications Demo Wrap up Q&A Confusing,
More informationPocket E-Guide. Sponsored By:
Pocket E-Guide Top disaster recovery tips for protecting your VoIP systems For today's enterprise, (VoIP) offers immense business benefits, including unified, voice-enabled applications and significant
More informationRam Dantu. VOIP: Are We Secured?
Ram Dantu Professor, Computer Science and Engineering Director, Center for Information and Computer Security University of North Texas rdantu@unt.edu www.cse.unt.edu/~rdantu VOIP: Are We Secured? 04/09/2012
More informationNuvia Cloud UC Interconnect Reference Guide
Nuvia Cloud UC Interconnect Reference Guide Not all Cloud UC services are created equal. Large organizations need a solution that provides the security, flexibility, and reliability required for mission-critical
More informationBEng (Hons) Telecommunications. Examinations for 2011 2012 / Semester 1
BEng (Hons) Telecommunications Cohort: BTEL/10A/FT Examinations for 2011 2012 / Semester 1 MODULE: IP Telephony MODULE CODE: TELC3107 Duration: 2 Hours Reading time: 15 Minutes Instructions to Candidates:
More informationService Schedule 2 MS Lync Terms & Conditions v1.0
Service Schedule 2 MS Lync Terms & Conditions v1.0 Overriding provisions All quotations are made and all orders are accepted subject to these conditions ( these Schedule Terms ) and our Active Support
More informationConnect and Collaborate With Unified Communications
1 Connect and Collaborate With Unified Communications David Schenkel, ADTRAN, david.schenkel@adtran.com Industry Briefings 2 Sunday, 16 January 2011, 13:30 15:00 Location: Nautilus 1 2 Who is ADTRAN? Leading
More informationBusiness Value Drives VoIP and IP-Telephony Layering
Decision Framework, B. Elliot Research Note 16 July 2003 Business Value Drives VoIP and IP-Telephony Layering Enterprises must view IP telephony and voice over IP projects as functional layers composed
More informationConfiguring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011
Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Solution Overview... 3 Network Topology... 4 Network Configuration...
More informationPreparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014
Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014 [Type text] As the limited number of remaining IPv4 addresses are allocated to ISPs, it is becoming increasingly
More informationCreating the Unified Multi-Service Demarcation Point
Creating the Unified Multi-Service Demarcation Point Powered by AudioCodes Multi-Service Business Gateways (MSBG) The Challenge Enterprise organizations building their ICT infrastructure face many challenges.
More information2- Technical Training (9 weeks) 3- Applied Project (3 weeks) 4- On Job Training (OJT) (4 weeks)
Course Title: Prerequisites: Training Program (5 months) IP Implementation in Private Branch Exchanges Must fresh graduates Communication/Electronics Engineers" 1- Soft Skills Training (4 weeks) 1. Communication
More informationSIP Trunking DEEP DIVE: The Service Provider
SIP Trunking DEEP DIVE: The Service Provider Larry Keefer, AT&T Consulting UC Practice Director August 12, 2014 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T
More informationVulnerabilities in SOHO VoIP Gateways
Vulnerabilities in SOHO VoIP Gateways Is grandma safe? Peter Thermos pthermos@vopsecurity.org pthermos@palindrometechnologies.com 1 Purpose of the study VoIP subscription is growing and therefore security
More informationUnified Trading Communications
SOLUTIONS BRIEF SOLUTIONS BRIEF Unified Trading Communications Make sure your trading teams operate at peak efficiency with advanced communications and collaboration solutions from IP Trade. INTUITIVE
More informationPENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
More informationVoice Over IP is it hype or can it work for me? By American Business Communication Inc.
Voice Over IP is it hype or can it work for me? By American Business Communication Inc. In the world of telecom, it seems like everywhere you turn there is a buzz about Voice over IP (VoIP). Hardly a day
More informationFabrizio Volpe. MVP Directory Services MCITP Lync 2010. @Fabriziovlp. Fabrizio.volpe@gmx.com. http://www.linkedin.com/in/fabriziov
Fabrizio Volpe MVP Directory Services MCITP Lync 2010 @Fabriziovlp Fabrizio.volpe@gmx.com http://www.linkedin.com/in/fabriziov Agenda Intro to Lync Server Lync Features : Presence Integration with Sharepoint,
More informationComUnity. Move your organization s telephony from servers to service
ComUnity Move your organization s telephony from servers to service ComUnity brings you Telephony over IP, delivered in the cloud. You reduce costs and infrastructure, but improve communication throughout
More informationVOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
More informationBusiness Continuity protection for SIP trunking service
An Allstream White Paper Business Continuity protection for SIP trunking service An Allstream White Paper 1 Table of contents The value of SIP trunking 1 The issue of business continuity 1 SIP trunking
More informationLEAVING LEGACY BEHIND: TRANSITIONING TO AN IP VOICE COMMUNICATIONS SOLUTION WHITE PAPER
LEAVING LEGACY BEHIND: TRANSITIONING TO AN IP VOICE COMMUNICATIONS SOLUTION WHITE PAPER Leaving Legacy Behind: Transitioning to an IP Voice Communications Solution Introduction Seeking to be more efficient
More informationSIP Trunking to Microsoft Lync (Skype for Business) Server
SIP Trunking to Microsoft Lync (Skype for Business) Server SIP Trunking to Lync/Skype for Business Server The emergence of Unified Communications integrating communications services into desktop and mobile
More informationHosted vs On-Site IP-PBX A Guide for SMEs
A Guide for SMEs When switching to Voice over Internet Protocol (VoIP) telephony, the decision of whether to use a hosted or on-site phone system (IP-PBX) must be made. Both have fundamental differences
More informationGet the right communications toolkit to achieve business growth
Get the right communications toolkit to achieve business growth The way your business communicates is changing. As businesses increasingly adopt more flexible ways of working, is it time for you to consider
More informationCOMMUNICATIONS & COLLABORATION. Ryan Lenger Scott Fuller. Isaac Podolefsky
COMMUNICATIONS & COLLABORATION Project Information Project Team Leads: Project Manager: Ryan Lenger Scott Fuller Isaac Podolefsky TeamDynamix Project Number: 241101 Project Overview Modernize and improve
More information