Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

Size: px
Start display at page:

Download "Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance"

Transcription

1 Telephony Denial of Service (TDoS) Attacks Dan York, CISSP Chair, VoIP Security Alliance May 29, 2013

2 My Background danyork.me DisruptiveTelephony.com blueboxpodcast.com

3 Evolution of PSTN connectivity

4 What's In A Name? Many names for new "carriers": Internet Telephony Service Provider () SIP Service Provider (SSP) Voice (or VoIP) Service Provider (VSP) Service Provider Key point is that they provide gateway from IP communications to Public Switched Telephone Network (PSTN)

5 The Old Boys Club Carrier Carrier Carrier Carrier PSTN Carrier Carrier Carrier

6 The Wild West PSTN

7 Telephony Denial of Service (TDoS) Attacks

8

9 TDoS Attacks Generation of a LARGE number (hundreds, thousands ) of phone calls toward a target An objective is to overwhelm target system to prevent recipient from being able to receive legitimate phone calls May also incur costs to target or cause software/equipment failures Typically use Caller-ID spoofing to mask origin of calls

10 Target does NOT have to use VoIP IMPORTANT: This is NOT about the target using "voice-over-ip" This can happen to you TODAY using a "regular" / "traditional" phone system However, an attacker can use VoIP to generate large number of calls

11 Attacking via VoIP Attacker can quickly set up IP-based PBX using open source software Can run attack software in cloud platforms (ex. Amazon EC2) Obtain PSTN connectivity through many different s Including via compromised accounts on s (i.e. legitimate account where the credentials have been broken) Use spoofed Caller-ID to hide origin Tools are out there to simplify / automate this process Calls appear to target as originating from many different providers

12 Attacking via VoIP Attacker PSTN YOU!

13 Distributing The Attack Botnets Operating Many Different PBX Instances (ex. cloud providers) Using Compromised Account Info Services You Can Purchase

14 Mitigating TDoS Attacks

15 No Silver Bullet Combination of: Network architecture Service provider capabilities On-premises security devices Ability of staff (your staff and at service provider) to respond during the attack

16 NENA TDoS Checklist NENA Recommended Best Practices Checklist for TDoS Before a TDoS attack: Speak with service providers Ensure PSAP staff have contact info for service providers Examine architecture to identify potential ways to mitigate risks During an attack: Save the voice recordings Record all phone numbers and account information if the attacker makes contact Retain all call logs and IP logs Attempt to separate affected phone number from emergency numbers

17 Additional Aspects of VoIP (if you move to IP)

18 Evolution of Attacks

19 Complexity IM Networks IP-PBX Operating Systems Mobile Devices PSTN Gateways Internet VoIP Application Servers Web Servers IP Network Firewalls Social Networks Servers Voic Desktop PCs Session Border Controller s Physical Wiring CRM Systems Directory Servers Database Servers

20 However, additional tools come with IP Session Border Controllers (SBCs) DoS/DDoS specific security devices Firewalls Mechanisms under development with Session Initiation Protocol (SIP) to add further security

21 Resources

22 NENA Best Practices Checklist Service-Attacks-Against Centers.htm Short form: Direct PDF:

23

24 Security Links VoIP Security Alliance - Threat Taxonomy - Blog - Security Tools list - Blue Box: The VoIP Security Podcast - NIST SP800-58, Security Considerations for VoIP Systems Network Security Tools Hacking Exposed VoIP site and tools Seven Deadliest Unified Communications Attacks

25 Back to you, Brian

26 Thank you! Q & A? Dan York - dan.york@voipsa.org twitter.com/danyork

White Paper. avaya.com 1. Table of Contents. Starting Points

White Paper. avaya.com 1. Table of Contents. Starting Points White Paper Session Initiation Protocol Trunking - enabling new collaboration and helping keep the network safe with an Enterprise Session Border Controller Table of Contents Executive Summary...1 Starting

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Security & Reliability in VoIP Solution

Security & Reliability in VoIP Solution Security & Reliability in VoIP Solution July 19 th, 2006 Ram Ayyakad ram@ranchnetworks.com About My background Founder, Ranch Networks 20 years experience in the telecom industry Part of of architecture

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION

More information

PETER CUTLER SCOTT PAGE. November 15, 2011

PETER CUTLER SCOTT PAGE. November 15, 2011 Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic

More information

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER How to ensure a cloud-based phone system is secure. BEFORE SELECTING A CLOUD PHONE SYSTEM, YOU SHOULD CONSIDER: DATA PROTECTION.

More information

Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development

Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development Risk Free Migration to Lync Kevin Isacks, VP SBC & CA Development Why Lync MICROSOFT LYNC is an enterprise-ready UNIFIED COMMUNICATIONS PLATFORM LYNC CONNECTS PEOPLE everywhere, on Windows 8 and other

More information

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be

More information

Cyber Security and Next Gen Systems

Cyber Security and Next Gen Systems Cyber Security and Next Gen Systems Jay English Director Comm. Center & 9-1-1 Services APCO International 2013; all rights reserved Topics to Cover NG9-1-1 Emerging technology and emerging threats Basic

More information

IP-PBX Buyers Guide 2006

IP-PBX Buyers Guide 2006 IP-PBX Buyers Guide 2006 Produced by: Contents PBX Basics What s Different about IP-PBX Basic Features of IP-PBX Advanced Features Other Issues Conclusion IP-PBX Guide 2 PBX Basics A PBX is essentially

More information

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border

OpenScape Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border Siemens Enterprise Communications Session Border Controller Delivering security, interoperability and cost savings to the enterprise network border April 2011 Agenda 1 Industry Trends 2 Customer Initiatives

More information

How To Make A Cell Phone Converged Into A Cell Network

How To Make A Cell Phone Converged Into A Cell Network MPLS: Enabling Fixed-Mobile Convergence Barry M. Tishgart Vice President, Managed Services 2006 11 10 SPRINT, the "Going Forward" logo, the NEXTEL name and logo and other trademarks are trademarks of Sprint

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice

More information

WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS

WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS Position Paper AN INTRODUCTION TO NETWORK TELEPHONY WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS www.techknowpartners.com Position Paper AN INTRODUCTION TO NETWORK TELEPHONY WHY IP-PBX SYSTEMS ARE GOOD FOR

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

Adding Telephony to Microsoft Lync with Office 365 & Other Use Cases June 11, 2013

Adding Telephony to Microsoft Lync with Office 365 & Other Use Cases June 11, 2013 Adding Telephony to Microsoft Lync with Office 365 & Other Use Cases June 11, 2013 Attendee Dashboard Control Panel Click plus [+] icon to expand menus Click minus [-] icon to collapse menus Questions

More information

Calculate Your Savings

Calculate Your Savings Calculate Your Savings See how the right phone system can improve your bottom line. Are you missing important calls and lost revenue? Are missing important calls and lost revenue? Could you provide a better

More information

NEW!!! Industry s only Comprehensive VoIP Security Boot Camp

NEW!!! Industry s only Comprehensive VoIP Security Boot Camp NEW!!! Industry s only Comprehensive VoIP Security Boot Camp IP 3, Inc. the nation s leading trainer for Securing Emerging Technologies has partnered with Salare Security to launch one of the most intense

More information

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60 SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS

More information

NICC ND 1438 V1.1.1 (2016-03)

NICC ND 1438 V1.1.1 (2016-03) NICC Document Voluntary Code of Practice Mitigating Theft of Service from End User Voice over IP Communications Systems Michael Faraday House, Six Hills Way, Stevenage SG1 2AY Tel.: +44(0) 20 7036 3636

More information

Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It. Mike Reiman Director of Software Solutions

Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It. Mike Reiman Director of Software Solutions Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It Mike Reiman Director of Software Solutions Edgewater Networks Overview Based in San Jose, California, Edgewater Networks was founded in

More information

VOIP Security Essentials. Jeff Waldron

VOIP Security Essentials. Jeff Waldron VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry

More information

Microsoft Response Point

Microsoft Response Point Small business communication made easy. Introducing Microsoft Response Point, ground-breaking phone system software created specifically for small businesses with up to 50 employees. Loaded with advanced

More information

VoIP Security: How Secure is Your IP Phone?

VoIP Security: How Secure is Your IP Phone? VoIP Security: How Secure is Your IP Phone? Dan York, CISSP Director of IP Technology, Office of the CTO Chair, Mitel Product Security Team Member, Board of Directors, VoIP Security Alliance (VOIPSA) ICT

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

A Microsoft Qualified Solution for Lync TM Survivability at the Branch Office

A Microsoft Qualified Solution for Lync TM Survivability at the Branch Office White Paper A Microsoft Qualified Solution for Lync TM Survivability at the Branch Office Introducing NET s UX2000 Real Time Services Platform Michael J. Finnerman President dbrn Associates dbrnassociates.com

More information

FAQ - Device Question Can I forward calls to my mobile device? Question Can I have my greetings professionally recorded? www.coxprovoice.

FAQ - Device Question Can I forward calls to my mobile device? Question Can I have my greetings professionally recorded? www.coxprovoice. FAQ - Device Question: Can I forward calls to my mobile device? Yes, the VoiceManager IP Centrex service allows you to forward calls to your mobile device or any other phone number. Question: Can I have

More information

FDIC Division of Supervision and Consumer Protection

FDIC Division of Supervision and Consumer Protection FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering

More information

Selecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014

Selecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014 Selecting the Right SIP Phone for Your IP PBX By Gary Audin May 5, 2014 There are many Session Initiation Protocol (SIP) phones on the market manufactured by IP PBX vendors and third parties. Selecting

More information

SIP and VoIP 1 / 44. SIP and VoIP

SIP and VoIP 1 / 44. SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies

More information

OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS

OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS OVERVIEW OPTUS OUTBOUND VOICE SOLUTIONS ANSWER THE CALL TO KEEP COSTS DOWN CONTENTS YOUR VOICE SERVICES NEED TO KEEP UP WITH YOUR BUSINESS 01 EVOLVING AT A PACE THAT SUITS YOU 02 OUTBOUND VOICE SOLUTIONS

More information

Threat Mitigation for VoIP

Threat Mitigation for VoIP Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

Building the Lync Security Eco System in the Cloud Fact Sheet.

Building the Lync Security Eco System in the Cloud Fact Sheet. Building the Lync Security Eco System in the Cloud Fact Sheet. [Type text] The need to secure all entries to the fastest growing Unified Communication application (UC) and allow for complete inter-operability

More information

FAQ - Features Question Question Question Question Question Question

FAQ - Features Question Question Question Question Question Question FAQ - Features Question: What feature does Virtual Number Service replace? Answer: Virtual Number Service replaces Remote Call Forwarding. Question: What is call screening? Answer: Call screening is the

More information

VoIP Security Methodology and Results. NGS Software Ltd

VoIP Security Methodology and Results. NGS Software Ltd VoIP Security Methodology and Results NGS Software Ltd Barrie Dempster Senior Security Consultant barrie@ngssoftware.com Agenda VoIP Security Issues Assessment Methodology Case Study: Asterisk VoIP Security

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

How To Implement A Cisco Vip From Scratch

How To Implement A Cisco Vip From Scratch Overview of Cisco VoIP Infrastructure Solution for SIP The Cisco VoIP Infrastructure Solution for SIP implements a voice-over-packet network design using SIP to provide telephony services. It lays the

More information

TELECOM FRAUD CALL SCENARIOS

TELECOM FRAUD CALL SCENARIOS TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple

More information

SITEL Voice Architecture

SITEL Voice Architecture SITEL Voice Architecture www.sitel.com SIP Voice Architecture: What is it? And how contact center operators can save money using it. By: Kevin Weier, Director, Global Voice Infrastructure and Architecture,

More information

IBM WebSphere Application Server Communications Enabled Applications

IBM WebSphere Application Server Communications Enabled Applications IBM WebSphere Application Server Communications Enabled Applications Configuring a CEA environment 2011 IBM Corporation This presentation describes how to configure a WebSphere Application Server environment

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

Acme Packet session border controllers in the enterprise

Acme Packet session border controllers in the enterprise Acme Packet session border controllers in the enterprise Large enterprises have been expanding their deployments of IP telephony (IPT) for several years now. Planning has already begun to extend the benefits

More information

State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network

State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network State of Delaware Turns to Acme Packet for End-To-End Multi-Vendor IP Telephony Network Website: Geography: Solution: Type: www.delaware.gov State of Delaware Acme Packet Net-Net SBCs Unified Communications

More information

Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0

Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0 Abstract These Application Notes describe the steps

More information

SIP trunking: The what, how and why

SIP trunking: The what, how and why SIP trunking: The what, how and why Table of Contents Section 1: SIP and IP Telephony... 1 Section 2: SIP has emerged as the protocol winner. Now what?... 2 Section 3: A SIP trunking checklist... 3 Section

More information

Cisco Certified Network Associate (CCNA) Cisco Certified Network Associate (CCNA)

Cisco Certified Network Associate (CCNA) Cisco Certified Network Associate (CCNA) Cisco Certified Network Associate (CCNA) CISCO Certification Path IIHT Nagpur is one of the best IT training Institutes that provides Cisco, Cloud Computing, hardware and networking courses. Address -

More information

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week Course Title: No. of Hours: IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week 1 Course Duration: 3 Months (12weeks) No. Of Hours: 7 Hrs./Day- 5 days/week.

More information

VoIP and Beyond. Alex Gatiragas Product Manager Enterprise Convergence NEC Business Solutions Limited

VoIP and Beyond. Alex Gatiragas Product Manager Enterprise Convergence NEC Business Solutions Limited VoIP and Beyond Alex Gatiragas Product Manager Enterprise Convergence NEC Business Solutions Limited July 2005 Agenda 2004 a year in review. Hybrid / Pure IP Telephony platforms. 2005 and Beyond Voice

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues

Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice

More information

Deploying SIP Phones into Unified Communications Solutions with the Dialogic Media Gateway Series

Deploying SIP Phones into Unified Communications Solutions with the Dialogic Media Gateway Series Communication is an important part of business enterprises, and many are adopting Unified Communications (UC) solutions to improve business processes and enhance communications. These UC solutions typically

More information

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)

Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2) Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence

More information

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath.

CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath. CounterPath Bria with Oracle TSC Feature Pack A Solution for Operator and Enterprise (OTT) Service Delivery Solution Brief Internet OTT (over-the-top) changes the way people communicate. Internet OTT services

More information

PRESENTER NAME Communication Capabilities E-mail/Calendaring Mobile Phones Voicemail Fax Integrated Communication Solutions IM and Presence Web and Video Conferencing VoIP PBX Integration Integration

More information

Security issues in Voice over IP: A Review

Security issues in Voice over IP: A Review www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3879-3883 Security issues in Voice over IP: A Review Rajni a, Preeti a, Ritu

More information

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION 01 INTRODUCTION Inclarity is the UK s leading provider of Hosted Telephony, Hosted UC and Hosted Video solutions. We help our customers to communicate

More information

Saving Money and Simplifying Architecture with the Session Initiation Protocol

Saving Money and Simplifying Architecture with the Session Initiation Protocol SIP-O-Nomics Saving Money and Simplifying Architecture with the Session Initiation Protocol By Irwin Lazar Vice President, Communications Research, Nemertes Research Executive Summary SIP, the Session

More information

DoS/DDoS Attacks and Protection on VoIP/UC

DoS/DDoS Attacks and Protection on VoIP/UC DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

Lync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013

Lync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013 Lync Express The Evolution of UC Frederic Dickey Director of Professional Services July 9, 2013 Live from WPC 2013! 2 Inside this Deck Unified Communications Defined Lync 2013 Demystified Lync Express

More information

VoIP Survivor s s Guide

VoIP Survivor s s Guide VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the

More information

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision

An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks

More information

2 Voice over IP Network

2 Voice over IP Network 2 Voice over IP Network VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 8 2.1 VoIP Network Elements...3 2.2 Single-Site VoIP Location...4 2.3 Multi-Site VoIP Location...5 2.4 PBX Networking

More information

Enabling Users for Lync services

Enabling Users for Lync services Enabling Users for Lync services 1) Login to collaborate.widevoice Server as admin user 2) Open Lync Server control Panel as Run As Administrator 3) Click on Users option and click Enable Users option

More information

Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories.

Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration. Gaston Ormazabal. Verizon Laboratories. Verizon 2009 All Rights Reserved. 1 Verizon Columbia Research on VoIP Security A Model Academia/Industry Collaboration Gaston Ormazabal Verizon Laboratories May 13, 2009 June 16, 2009 Verizon 2009 All

More information

North American VoIP Access and SIP Trunking Services Markets

North American VoIP Access and SIP Trunking Services Markets North American VoIP Access and SIP Trunking Services Markets UC Adoption and Increasing Customer Awareness Drive Demand for SIP Trunking Services September 2011 Table of Contents Executive Summary - Executive

More information

Breaking up with your Landline Unified Communications: VoIP Phone Systems. MTUG Conference May 2014. service. proactive. value

Breaking up with your Landline Unified Communications: VoIP Phone Systems. MTUG Conference May 2014. service. proactive. value service proactive Breaking up with your Landline Unified Communications: VoIP Phone Systems value MTUG Conference May 2014 WELCOME!!! Ricoh Team: Dave McLaughlin, Solution Consultant, Ricoh USA Todd Milbrand,

More information

Date: May 1, 2009. Unified Communications Strategic Planning

Date: May 1, 2009. Unified Communications Strategic Planning Date: May 1, 2009 Unified Communications Strategic Planning Date: January, 2012 Table Of Contents 1. Executive Overview... 2 2. Strategic Planning Tool... 3 3. Identify Communication Requirements... 4

More information

Security and Risk Analysis of VoIP Networks

Security and Risk Analysis of VoIP Networks Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all

More information

Sam Cavaliere. Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860

Sam Cavaliere. Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860 Sam Cavaliere Unified Communications Solutions Sales Professional Microsoft Corporation Sam.Cavaliere@microsoft.com 646-225-4860 Agenda Define UC Foundation for Communications Demo Wrap up Q&A Confusing,

More information

Pocket E-Guide. Sponsored By:

Pocket E-Guide. Sponsored By: Pocket E-Guide Top disaster recovery tips for protecting your VoIP systems For today's enterprise, (VoIP) offers immense business benefits, including unified, voice-enabled applications and significant

More information

Ram Dantu. VOIP: Are We Secured?

Ram Dantu. VOIP: Are We Secured? Ram Dantu Professor, Computer Science and Engineering Director, Center for Information and Computer Security University of North Texas rdantu@unt.edu www.cse.unt.edu/~rdantu VOIP: Are We Secured? 04/09/2012

More information

Nuvia Cloud UC Interconnect Reference Guide

Nuvia Cloud UC Interconnect Reference Guide Nuvia Cloud UC Interconnect Reference Guide Not all Cloud UC services are created equal. Large organizations need a solution that provides the security, flexibility, and reliability required for mission-critical

More information

BEng (Hons) Telecommunications. Examinations for 2011 2012 / Semester 1

BEng (Hons) Telecommunications. Examinations for 2011 2012 / Semester 1 BEng (Hons) Telecommunications Cohort: BTEL/10A/FT Examinations for 2011 2012 / Semester 1 MODULE: IP Telephony MODULE CODE: TELC3107 Duration: 2 Hours Reading time: 15 Minutes Instructions to Candidates:

More information

Service Schedule 2 MS Lync Terms & Conditions v1.0

Service Schedule 2 MS Lync Terms & Conditions v1.0 Service Schedule 2 MS Lync Terms & Conditions v1.0 Overriding provisions All quotations are made and all orders are accepted subject to these conditions ( these Schedule Terms ) and our Active Support

More information

Connect and Collaborate With Unified Communications

Connect and Collaborate With Unified Communications 1 Connect and Collaborate With Unified Communications David Schenkel, ADTRAN, david.schenkel@adtran.com Industry Briefings 2 Sunday, 16 January 2011, 13:30 15:00 Location: Nautilus 1 2 Who is ADTRAN? Leading

More information

Business Value Drives VoIP and IP-Telephony Layering

Business Value Drives VoIP and IP-Telephony Layering Decision Framework, B. Elliot Research Note 16 July 2003 Business Value Drives VoIP and IP-Telephony Layering Enterprises must view IP telephony and voice over IP projects as functional layers composed

More information

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011 Proprietary 2011 Media5 Corporation Table of Contents Introduction... 3 Solution Overview... 3 Network Topology... 4 Network Configuration...

More information

Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014

Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014 Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014 [Type text] As the limited number of remaining IPv4 addresses are allocated to ISPs, it is becoming increasingly

More information

Creating the Unified Multi-Service Demarcation Point

Creating the Unified Multi-Service Demarcation Point Creating the Unified Multi-Service Demarcation Point Powered by AudioCodes Multi-Service Business Gateways (MSBG) The Challenge Enterprise organizations building their ICT infrastructure face many challenges.

More information

2- Technical Training (9 weeks) 3- Applied Project (3 weeks) 4- On Job Training (OJT) (4 weeks)

2- Technical Training (9 weeks) 3- Applied Project (3 weeks) 4- On Job Training (OJT) (4 weeks) Course Title: Prerequisites: Training Program (5 months) IP Implementation in Private Branch Exchanges Must fresh graduates Communication/Electronics Engineers" 1- Soft Skills Training (4 weeks) 1. Communication

More information

SIP Trunking DEEP DIVE: The Service Provider

SIP Trunking DEEP DIVE: The Service Provider SIP Trunking DEEP DIVE: The Service Provider Larry Keefer, AT&T Consulting UC Practice Director August 12, 2014 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T

More information

Vulnerabilities in SOHO VoIP Gateways

Vulnerabilities in SOHO VoIP Gateways Vulnerabilities in SOHO VoIP Gateways Is grandma safe? Peter Thermos pthermos@vopsecurity.org pthermos@palindrometechnologies.com 1 Purpose of the study VoIP subscription is growing and therefore security

More information

Unified Trading Communications

Unified Trading Communications SOLUTIONS BRIEF SOLUTIONS BRIEF Unified Trading Communications Make sure your trading teams operate at peak efficiency with advanced communications and collaboration solutions from IP Trade. INTUITIVE

More information

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com

PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure

More information

Voice Over IP is it hype or can it work for me? By American Business Communication Inc.

Voice Over IP is it hype or can it work for me? By American Business Communication Inc. Voice Over IP is it hype or can it work for me? By American Business Communication Inc. In the world of telecom, it seems like everywhere you turn there is a buzz about Voice over IP (VoIP). Hardly a day

More information

Fabrizio Volpe. MVP Directory Services MCITP Lync 2010. @Fabriziovlp. Fabrizio.volpe@gmx.com. http://www.linkedin.com/in/fabriziov

Fabrizio Volpe. MVP Directory Services MCITP Lync 2010. @Fabriziovlp. Fabrizio.volpe@gmx.com. http://www.linkedin.com/in/fabriziov Fabrizio Volpe MVP Directory Services MCITP Lync 2010 @Fabriziovlp Fabrizio.volpe@gmx.com http://www.linkedin.com/in/fabriziov Agenda Intro to Lync Server Lync Features : Presence Integration with Sharepoint,

More information

ComUnity. Move your organization s telephony from servers to service

ComUnity. Move your organization s telephony from servers to service ComUnity Move your organization s telephony from servers to service ComUnity brings you Telephony over IP, delivered in the cloud. You reduce costs and infrastructure, but improve communication throughout

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

Business Continuity protection for SIP trunking service

Business Continuity protection for SIP trunking service An Allstream White Paper Business Continuity protection for SIP trunking service An Allstream White Paper 1 Table of contents The value of SIP trunking 1 The issue of business continuity 1 SIP trunking

More information

LEAVING LEGACY BEHIND: TRANSITIONING TO AN IP VOICE COMMUNICATIONS SOLUTION WHITE PAPER

LEAVING LEGACY BEHIND: TRANSITIONING TO AN IP VOICE COMMUNICATIONS SOLUTION WHITE PAPER LEAVING LEGACY BEHIND: TRANSITIONING TO AN IP VOICE COMMUNICATIONS SOLUTION WHITE PAPER Leaving Legacy Behind: Transitioning to an IP Voice Communications Solution Introduction Seeking to be more efficient

More information

SIP Trunking to Microsoft Lync (Skype for Business) Server

SIP Trunking to Microsoft Lync (Skype for Business) Server SIP Trunking to Microsoft Lync (Skype for Business) Server SIP Trunking to Lync/Skype for Business Server The emergence of Unified Communications integrating communications services into desktop and mobile

More information

Hosted vs On-Site IP-PBX A Guide for SMEs

Hosted vs On-Site IP-PBX A Guide for SMEs A Guide for SMEs When switching to Voice over Internet Protocol (VoIP) telephony, the decision of whether to use a hosted or on-site phone system (IP-PBX) must be made. Both have fundamental differences

More information

Get the right communications toolkit to achieve business growth

Get the right communications toolkit to achieve business growth Get the right communications toolkit to achieve business growth The way your business communicates is changing. As businesses increasingly adopt more flexible ways of working, is it time for you to consider

More information

COMMUNICATIONS & COLLABORATION. Ryan Lenger Scott Fuller. Isaac Podolefsky

COMMUNICATIONS & COLLABORATION. Ryan Lenger Scott Fuller. Isaac Podolefsky COMMUNICATIONS & COLLABORATION Project Information Project Team Leads: Project Manager: Ryan Lenger Scott Fuller Isaac Podolefsky TeamDynamix Project Number: 241101 Project Overview Modernize and improve

More information