BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

Size: px
Start display at page:

Download "BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP"

Transcription

1 BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

2 Welcome Message Presented By Julian Fellows Executive Vice President Bitek International thanks BTL for this opportunity to present to the CANTO membership BTL is a valued customer and reference site for Bitek Bitek systems offer a unique opportunity for CANTO members to recover revenues lost to VoIP grey traffic Bitek systems will allow full management of VoIP traffic through your country 2

3 BTL Partner Benefits BTL installed Bitek Guardian in June Over the last 7 months the system has provided BTL with the following benefits: Continuous blocking of all grey traffic VoIP into and out of Belize Management and analysis of grey traffic Control over their market position Strong return on their investment Leverage with the National Regulator New revenue creation opportunities Eliminated fraudulent bypass voice 3

4 Company Overview Introducing Bitek International US based company established in 1974 (33 Years) Offices in Los Angeles, Washington DC, San Jose and London Specialises in Call Management Software Solutions History in Traditional Call Accounting and Billing Specialists in IP Billing, Fraud & Packet Management Bitek has over 50 clients on 3 continents Intelligent Network Solutions Bitek is the FIRST and ONLY company to intelligently control and filter all VoIP communications 4

5 Company Overview Bitek Markets Telecom & Cellular Operators (For Grey Traffic Control) Telecom Regulators (For Grey Traffic Auditing) 3G Mobile Operators (VoIP and Skype Bandwidth Control) Internet Service Providers (For Value Added Services) Law Enforcement (ETSI and CALEA Lawful Intercept) Security Services (Incriminating Forensic Data Capture) Enterprise and Government (Information Security) 5

6 Company Overview Bitek Product Lines VoIP Control for Regional and International Telecommunications Operators Intelligent filtering of IP and VoIP for Information Security and IP Control Keeps Skype out of networks for security and resource protection Dynamic and instant control of network priorities to manage bandwidth Call Accounting, Billing, Reporting, VoIP service control & TDM to create revenues 6

7 CHANGES IN THE WAY PEOPLE COMMUNICATE The revolution has already happened!

8 Changes in Communications Traditional Telephony Example USA - Thailand USA PSTN Carrier Traffic Thailand PSTN Traditional Tracking Cell USA Cell Traffic Cell User Thailand 8

9 Changes in Communications Future telephony using VoIP USA PSTN VoIP Traffic Local Call Cell USA Traditional Voice By Pass Grey traffic Lost revenue to Country Thailand PSTN Thailand Cell Cell Via WiFi Wireless Hot Spot USA Thailand Wireless Hot Spot Lap Top Via WiFi PDA Via WiFi Bitek Guardians invisibly detect and stop all un-authorized traffic and are deployed between partners A & B (Detection points) 9

10 The VoIP Revolution What are today s challenges? Free (to consumer) Peer-to-peer Service Skype and the PC Portal Grey Traffic Operators Declining International Rates Lost customers and revenues Confusion for Regulators New markets 10

11 Market Changes VoIP growth presents a significant threat to Telecom Operators Skype subscriptions anticipated to grow at a CAGR of 25% (over the next 5 years) Yahoo, MSN, and AOL: VoIP services anticipated to grow to 19% of IM users (by 2011) Google: Expected growth by a CAGR of 38% (over the next 5 years) Skype projects 7.4% of its users will call landline and cell phones via VoIP (by 2011) Skype has been downloaded more than 250 million times July 31, 2006 (Source Pyramid Research) 11

12 Skype on your network Skype Advantages A popular version of P2P soft phones demonstration Register under any alias name (no verification process) Free calling from anywhere in the world Use from any wireless 2G/3G Create conference calls to your team Provides video conferencing - enabling remote training Send & receive documents & images Access from PDA, 2G (Via GPRS) and 3G handsets 12

13 Skype on your network Skype Threats Agreeing to Skype license means your IP Address can be used as a super node Bitek tests: 1 Skype connection in 1 hour received over 100 international relay calls 1 Skype connection generates 2000 pulses per hour when logged on As Skype breaches firewalls hackers may gain undetected access to your network Your network may be vulnerable to worms and viruses Sensitive documents could be transferred through your firewall without detection Unscrupulous network users can make VoIP calls that are encrypted & undetectable Customer perception is that Free calls are now normal Only Bitek has the technology to combat these threats 13

14 The problems of Grey Traffic? Grey Traffic Operators Bypass taxes and license fees Do not invest in any infrastructure (they use yours) Do not create employment in your country Force a decline in international rates Significantly reduce your customers and revenues Causes confusion for regulators 14

15 Declining International Call Rates Grey traffic & Free P2P Decline Rates $1.00 $0.75 $0.50 $0.25 $0.10 $0.05 $0.015 $0.00 Local Termination Rate Reached lowest $0.015 cents Unable to decline lower Cost of Domestic termination 15

16 WHAT CAN YOU DO TO CONTROL GREY TRAFFIC IN YOUR COUNTRY?

17 Bitek Guardian System Take control of all VoIP Traffic Bold Revenue Protection Strategies Create services and revenues Segment and tailor specific market packages Perhaps provide a wholesale service? Eliminate Fraud Protect jobs and infrastructure investment Challenge the Regulator to protect the market 17

18 Bitek Guardian System Bitek Softphone Bitek provides a softphone that can be operator branded and works through the Guardian System Can be launched at the same time as blocking commences Creates revenue through subscriptions & calls (Private + Business) Registration system to satisfy security requirements Offsets negative public and business PR, reduces political sensitivity 18

19 Bitek Guardian System Selectively Filter or Invisibly Audit all VoIP Traffic Allow or block individually Monitor and audit or capture VoIP with forensic detail; - address - IP Address - IP Number (VoIP phone number etc.) - PSTN phone number - Mac Address Lawful Intercept interface capability 19

20 Bitek Guardian System The Guardian Solution Bitek s Guardian system is ON the network, not IN the network Guardian advanced filtering analyses and controls each IP Packet It operates without adding latency It operates secretly, without detection It allows control of a network to be returned to the owners It can be customized to seek any protocol It benefits from a continual development programme 20

21 Guardian Records and Reports Detailed records are individually searchable Actual IP address initiating and receiving the call/event Actual Mac address initiating and receiving the call/event Actual telephone number initiating and receiving the call/event Actual address initiating and receiving the call/event Time the call/event was initiated and disconnected Possible to produce geographic location of IP addresses/suspect Selectively filtering on a call by call basis to: - Allow identified as authorized - Disconnect identified as un-authorized 21

22 Protocols and Services Controlled Main protocols: SIP, H323, Megaco, MGCP, Skinny, SCCP, IAX, XMPP Well-known Soft Phones and VoIP: MSN, Vonage, NetMeeting, Skype, XLite, Glophone GoogleTalk, Yahoo, Net2phone, Dialpad, Paket8 Gismo Project, TomatoVine, SpeakEasy, Mediaring, SJPhone 22

23 Typical Network Topology Network Operations Centre Bitek Guardian in Monitor mode on the core network Customer Management device Private& Confidential Bitek International Inc

24 GUARDIAN VOIP CONTROL LIVE - COURTESY OF BTL Live Examination of VoIP Control

25 Questions and Answers Julian Fellows Executive Vice President Thank you to BTL and members of Canto

BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING

BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING Welcome Message Bitek International thanks BTL for this opportunity to present to the CANTO membership BTL is a valued customer and reference site for Bitek

More information

NATIONAL COST OF VoIP BYPASS

NATIONAL COST OF VoIP BYPASS NATIONAL COST OF VoIP BYPASS Presented by Graham Butler President & C.E.O Bitek International Inc Caribbean Seminar: Issues in Telecommunication economics and financing 10-13 September 2007, Antigua and

More information

NATIONAL COST OF VoIP BYPASS

NATIONAL COST OF VoIP BYPASS NATIONAL COST OF VoIP BYPASS Presented by Julian Fellows Executive Vice President Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE THE NATIONAL COST OF VoIP BYPASS Welcome Message Presentation

More information

22nd May 2008 GENEVA. THE NATIONAL COST OF VoIP BYPASS

22nd May 2008 GENEVA. THE NATIONAL COST OF VoIP BYPASS 3 rd Facilitation Meeting for WSIS Action Line C5 Building confidence and security in the use of ICT s 22nd May 2008 GENEVA VOICE OVER IP (VoIP) Presented by Graham Butler President & C.E.O Bitek International

More information

Bitek Guardian System

Bitek Guardian System Bitek Guardian System The following table shows the different market areas for Bitek Guardian (Patent Pending). Please identify the market appropriate to your requirements in order to choose the relevant

More information

Voice over IP (VoIP)

Voice over IP (VoIP) Commission on Science and Technology for Development Eleventh session 26 30 May 2008 Voice over IP (VoIP) by Graham Butler President & C.E.O Bitek International Inc. The views expressed are those of the

More information

Best Practices for Controlling Skype within the Enterprise > White Paper

Best Practices for Controlling Skype within the Enterprise > White Paper > White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it

More information

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet. VoIP Glossary Analog audio signals: Analog audio signals are used to transmit voice data over telephone lines. This is done by varying or modulating the frequency of sound waves to accurately reflect the

More information

TECHNICAL CHALLENGES OF VoIP BYPASS

TECHNICAL CHALLENGES OF VoIP BYPASS TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish

More information

CPNI VIEWPOINT 01/2007 INTERNET VOICE OVER IP

CPNI VIEWPOINT 01/2007 INTERNET VOICE OVER IP INTERNET VOICE OVER IP AUGUST 2007 Abstract Voice over IP (VoIP) is the term used for a set of technologies that enable real time voice or video conversations to take place across IP networks. VoIP devices

More information

What is VoIP and How It Can Benefit Your Business? Introduction

What is VoIP and How It Can Benefit Your Business? Introduction What is VoIP and How It Can Benefit Your Business? Introduction Although individuals are increasingly using text messaging and social media for their communication, telephony remains an essential tool

More information

Using IP Networks for voice and video: benefits and challenges

Using IP Networks for voice and video: benefits and challenges Using IP Networks for voice and video: benefits and challenges Peter Cox CEO UM Labs Ltd October 2010 About UM Labs UK Based company Founded 2008 by Peter Cox and other cofounders of Borderware Technologies

More information

Threat Mitigation for VoIP

Threat Mitigation for VoIP Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 Coral IP Solutions TABLE OF CONTENTS 1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4 2.1 UGW 4 2.2 IPG 4 2.3 FLEXSET IP 5 2.4 FLEXIP SOFTPHONE 6 2.5 TELEPORT FXS/FXO GATEWAYS 7 2.6 CORAL SENTINEL 7 3 CORAL IP

More information

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office Voice over Internet Protocol Kristie Prinz The Prinz Law Office I. What is Voice over Internet Protocol ( VoIP )? Voice over Internet Protocol ( VoIP ) is a technology, which facilitates the transmission

More information

VOIP Security Essentials. Jeff Waldron

VOIP Security Essentials. Jeff Waldron VOIP Security Essentials Jeff Waldron Traditional PSTN PSTN (Public Switched Telephone Network) has been maintained as a closed network, where access is limited to carriers and service providers. Entry

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs Research firm IDC 1 has estimated that a VoIP system can reduce telephony-related expenses by 30%. Voice over Internet Protocol (VoIP) has become a viable solution

More information

FDIC Division of Supervision and Consumer Protection

FDIC Division of Supervision and Consumer Protection FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering

More information

Calling All Countries: The VoIP Revolution is Here!

Calling All Countries: The VoIP Revolution is Here! Calling All Countries: The VoIP Revolution is Here! Panel: Sheba Chacko BT Global Services Tony Oliver Microsoft Corporation Andrew Powell Leap Wireless International, Inc. Agenda What is VoIP? Regulating

More information

VOICE OVER IP VIEWPOINT 01/2006

VOICE OVER IP VIEWPOINT 01/2006 VOICE OVER IP VIEWPOINT 01/2006 17 JANUARY 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the

More information

VoIP Resilience and Security Jim Credland

VoIP Resilience and Security Jim Credland VoIP Resilience and Security Jim Credland About THUS plc Provider and user of VoIP and Soft Switch technologies Developing Enterprise Security Standards NISCC VoIP Working Group Security Considerations

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

Technical innovations

Technical innovations Technical innovations Wireless VoIP What threat to mobile operators? (*) Frédéric PUJOL IDATE, Montpellier S everal technologies and networks have the capacity to enable mobile VoIP: 2.5G and 3G cellular

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance Valerie J.M. Watzlaf, PhD, RHIA, FAHIMA, Sohrab Moeini, MS, and Patti Firouzan, MS, RHIA Department of Health Information

More information

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and

More information

Voice Over Internet Protocol (VOIP)

Voice Over Internet Protocol (VOIP) Voice Over Internet Protocol (VOIP) Helping with your telecoms management Voice over Internet Protocol (VoIP) What is VoIP? VoIP is the ability to transmit voice over the Internet VoIP was adopted by the

More information

BroadTouch Business Communicator

BroadTouch Business Communicator BroadTouch Business Communicator Admin Guide Release 10.0.1 Document Version 1.0 Table of Contents 1 Summary of Changes...1 1.1 Changes for Release 10.0.1 Document Version 1... 1 2 About BroadTouch Business

More information

Drug Enforcement Administration Office of Investigative Technology

Drug Enforcement Administration Office of Investigative Technology Drug Enforcement Administration Office of Investigative Technology Emerging Communications New York April 8, 2010 DEA Sensitive I nformation May Not Be Used Or Disclosed Outside DEA Next Generation Wireless

More information

VoIP Survivor s s Guide

VoIP Survivor s s Guide VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the

More information

VoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion

VoIP. Overview. Jakob Aleksander Libak jakobal@ifi.uio.no. Introduction Pros and cons Protocols Services Conclusion VoIP Jakob Aleksander Libak jakobal@ifi.uio.no 1 Overview Introduction Pros and cons Protocols Services Conclusion 2 1 Introduction Voice over IP is routing of voice conversations over the internet or

More information

WHITE PAPER. Gaining Total Visibility for Lawful Interception

WHITE PAPER. Gaining Total Visibility for Lawful Interception WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...

More information

UNS White Paper - What is hosted voice?

UNS White Paper - What is hosted voice? UNS White Paper - What is hosted voice? Learn more about how a Business hosted voice solution could benefit you Hosted Telephony is one of the most powerful ways to make your business more agile and save

More information

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment White Paper Solutions to VoIP (Voice over IP) Recording Deployment Revision 2.1 September 2008 Author: Robert Wright (robert.wright@ultra-audiosoft.com), BSc (Hons) Ultra Electronics AudioSoft, October

More information

VoIP. Voice over Internet Protocol Presentation to the IEE (Hong Kong) Lecture Theatre LT18, City University 22nd January 2005

VoIP. Voice over Internet Protocol Presentation to the IEE (Hong Kong) Lecture Theatre LT18, City University 22nd January 2005 VoIP Voice over Internet Protocol Presentation to the IEE (Hong Kong) Lecture Theatre LT18, City University 22nd January 2005 John Ure Associate Professor and Director Telecom Research Project, University

More information

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis Alexandria University Institute of Graduate Studies and Research Department of Information Technology. Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat

More information

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES The way the Internet is used evolves rapidly all the time. Where traffic was once limited to the exchange of multimedia, today it

More information

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment ISI SOLUTIONS WHITE PAPER ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment By: Mitchell Weiss Director of Product Strategy ISI Telemanagement

More information

Key Drivers of Hosted Voip

Key Drivers of Hosted Voip Key Drivers of Hosted Voip CONTENTS Overview.... 3 Capital Cost savings:.... 4 Stress free implementation:... 4 Lower phone bills:... 4 Easily set up remote workers:... 5 No busy signals:... 5 Save on

More information

2008 NAEO Annual Conference Matthew S. Crocker. Computing power Networking power

2008 NAEO Annual Conference Matthew S. Crocker. Computing power Networking power 2008 NAEO Annual Conference Matthew S. Crocker Computing power Networking power Prediction: Computers will get faster! Moore s law Computing power will double every 2 years Virtualization CPU power is

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet. KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to

More information

Session Border Controllers in Enterprise

Session Border Controllers in Enterprise A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing

More information

Police. 21st Century Security Problem for Police Authorities.

Police. 21st Century Security Problem for Police Authorities. Police 21st Century Security Problem for Police Authorities. The complete story of how to deliver a new wave of security for voice/video software, that we deploy alongside productivity tools in every 21

More information

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service VoIP Architecture VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service Marcin Godlewski Lead Engineer Scientific Atlanta, a Cisco Company Charles Moreman

More information

Contents. Specialty Answering Service. All rights reserved.

Contents. Specialty Answering Service. All rights reserved. Contents 1 Introduction... 2 2 PBX... 3 3 IP PBX... 4 3.1 How It Works... 4 3.2 Functions of IP PBX... 5 3.3 Benefits of IP PBX... 5 4 Evolution of IP PBX... 6 4.1 Fuelling Factors... 6 4.1.1 Demands from

More information

How To Make A Multi-Line Phone A Multi Line Phone A Money Maker

How To Make A Multi-Line Phone A Multi Line Phone A Money Maker Fixed Mobile Convergence Brough Turner Senior Vice President, Chief Technology Officer http://blogs.nmscommunications.com/communications NMS at a Glance Founded in 1983, publicly traded since 1994 Technology

More information

VolP for the Small Business

VolP for the Small Business Reducing your telecommunications costs Research firm IDC1 has estimated that a VolP system can reduce telephony-related expenses by 30%. Voice over Internet Protocol (VoIP) has become a viable solution

More information

Is Skype Safe for Judges?

Is Skype Safe for Judges? Is Skype Safe for Judges? By Martin Felsky, PhD, JD, for the Judges Technology Advisory Committee, Canadian Judicial Council, 1 Version 2.0 July 6, 2010 In this article I will try to help judges understand

More information

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60 SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Sametime 101: Feature Overview. Roberto Chiabra IBM Certified IT Specialist

Sametime 101: Feature Overview. Roberto Chiabra IBM Certified IT Specialist Sametime 101: Feature Overview Roberto Chiabra IBM Certified IT Specialist IBM Sametime software 101: Feature Overview Rich Presence Enterprise Instant Messaging Mobility Online Meetings Voice & Video

More information

GSM or GPRS. JaeWon Kang, Badri Nath. Dataman Lab Department of Computer Science Rutgers University

GSM or GPRS. JaeWon Kang, Badri Nath. Dataman Lab Department of Computer Science Rutgers University GSM or GPRS JaeWon Kang, Badri Nath Dataman Lab Department of Computer Science Rutgers University Introduction The impressive growth : cellular mobile telephony + the number of Internet users wireless(cellular)

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

VoIP P2P: breakthrought technology, lot of hype (after Skype) but which business impacts at the end?

VoIP P2P: breakthrought technology, lot of hype (after Skype) but which business impacts at the end? VoIP P2P: breakthrought technology, lot of hype (after Skype) but which business impacts at the end? Marco Salvadori, General Secretary BB Biz Forum - Rome, Oct. 27, 2005 ThinkTel C.so Venezia 34/36 20121

More information

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005 Voice over IP VoIP (In) Security Presented by Darren Bilby NZISF 14 July 2005 Security-Assessment.com Who We Are NZ s only pure-play security firm Largest team of security professionals in NZ Offices in

More information

VoIP: Enterprise Adoption Trends in India and Grey Market Traction in India. Shubham Jaiswal

VoIP: Enterprise Adoption Trends in India and Grey Market Traction in India. Shubham Jaiswal VoIP: Enterprise Adoption Trends in India and Grey Market Traction in India Shubham Jaiswal Index VoIP: An Introduction Classification of VoIP Global Presence of Enterprises Consolidation of PSTN and VoIP

More information

Business Phone Security. Threats to VoIP and What to do about Them

Business Phone Security. Threats to VoIP and What to do about Them Business Phone Security Threats to VoIP and What to do about Them VoIP and Security: What You Need to Know to Keep Your Business Communications Safe Like other Internet-based applications, VoIP services

More information

Voice over IP Basics for IT Technicians

Voice over IP Basics for IT Technicians Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements

More information

VoipSwitch softphones

VoipSwitch softphones VoipSwitch softphones sales@voipswitch.com 3/21/2011 Voiceserve ltd.grosvenor House,1 High Street,London United Kingdom 1 Contents Introduction and solution overview... 2 iphone mobile softphone... 3 Google

More information

5C-315. Presentation To. United States Department of Justice Office of Enforcement Operations Narcotics & Dangerous Drugs Section

5C-315. Presentation To. United States Department of Justice Office of Enforcement Operations Narcotics & Dangerous Drugs Section 5C-315 Presentation To United States Department of Justice Office of Enforcement Operations Narcotics & Dangerous Drugs Section Office of Investigative Technology Deputy Assistant Administrator ELECTRONIC

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs has estimated that a VoIP system can reduce telephony-related expenses by 30%. 1 Voice over Internet Protocol (VoIP) has become a viable solution for even the smallest

More information

Internet: Telephone Calls for Free with Vo I P I 19/1. Your PC can Make Telephone Calls to Anywhere in the World for Free!

Internet: Telephone Calls for Free with Vo I P I 19/1. Your PC can Make Telephone Calls to Anywhere in the World for Free! Internet: Telephone Calls for Free with Vo I P I 19/1 Your PC can Make Telephone Calls to Anywhere in the World for Free! With the information in this article you can: Try out a selection of the best free

More information

Security and Risk Analysis of VoIP Networks

Security and Risk Analysis of VoIP Networks Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Christina Hattingh Darryl Sladden ATM Zakaria Swapan Cisco Press 800 East 96th Street Indianapolis, IN 46240 SIP Trunking Contents Introduction xix Part I: From TDM Trunking to SIP Trunking

More information

[Asterisk IP Telephony Solutions]

[Asterisk IP Telephony Solutions] 2016 [Asterisk IP Telephony Solutions] Azim U. Hoque President University IT Forum Bangladesh 1/30/2016 Workshop on Asterisk IP Telephony Solutions Over the existing Wi-Fi, LAN/MAN/WAN/ EPN/VPN, 3G and

More information

2008 3G CDMA Latin America Regional Conference

2008 3G CDMA Latin America Regional Conference 2008 3G CDMA Latin America Regional Conference 1 Ignacio Angulo With a BSc in Engineering from Universidad Simon Bolivar in Venezuela, Ignacio has extensive experience in Network Engineering, having worked

More information

Leveraging Asterisk to Deliver Large Scale VoIP Services in a Carrier Environment. JR Richardson

Leveraging Asterisk to Deliver Large Scale VoIP Services in a Carrier Environment. JR Richardson Leveraging Asterisk to Deliver Large Scale VoIP Services in a Carrier Environment JR Richardson Early VoIP Environment Telecom Act of 1996, mass competition, Telco's needed value add features and capabilities,

More information

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Written by: Salman A. Baset and Henning G. Schulzrinne (Colombia University, NY) CIS 6000 Distributed Systems Benjamin Ferriman bferrima@uoguelph.ca

More information

Convergence: The Foundation for Unified Communications

Convergence: The Foundation for Unified Communications Convergence: The Foundation for Unified Communications Authored by: Anthony Cimorelli, Senior Product Marketing Manager Onofrio Norm Schillaci, Principal Sales Engineer Michelle Soltesz, Director, Marketing

More information

TAXONOMY OF TELECOM TERMS

TAXONOMY OF TELECOM TERMS TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe

More information

Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the

Voice over IP, or VoIP for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Internet. Several solutions exist to make VoIP: Some use

More information

Agenda What can we do now? And 5 years from now we will still be current!

Agenda What can we do now? And 5 years from now we will still be current! Pittsburgh Steelers Alcatel-Lucent OmniPCX Enterprise IP Telephone System Alcatel-Lucent OmniSwitch Network Infrastructure Alcatel-Lucent Collaboration and Fax Server AVST Unified Messaging Wireless Network

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Skype network has three types of machines, all running the same software and treated equally:

Skype network has three types of machines, all running the same software and treated equally: What is Skype? Why is Skype so successful? Everybody knows! Skype is a P2P (peer-to-peer) Voice-Over-IP (VoIP) client founded by Niklas Zennström and Janus Friis also founders of the file sharing application

More information

Voice and Data Convergence

Voice and Data Convergence Voice and Data Convergence Business Benefits and Deployment Strategy WHITEPAPER - MAY 2012 Data & Internet Voice & Mobile VOICE AND DATA COVERGENCE 2012 2 INTRODUCTION Over the past six years we have seen

More information

Cisco CME Features and Functionality

Cisco CME Features and Functionality Cisco CME Features and Functionality Supported Protocols and Integration Options This topic describes the supported protocols and integration options of Cisco CME. Supported Protocols and Integration FAX

More information

GIGASTREAM BASIC BROADBAND Bristol and Bath Science Park

GIGASTREAM BASIC BROADBAND Bristol and Bath Science Park GIGASTREAM BASIC BROADBAND The ideal broadband solution for start-ups and small businesses Gigastream Basic Broadband is an internet service provided by Bridge Partners for tenants of SPark One. Excellent

More information

Voice over IP Networks: Ensuring quality through proactive link management

Voice over IP Networks: Ensuring quality through proactive link management White Paper Voice over IP Networks: Ensuring quality through proactive link management Build Smarter Networks Table of Contents 1. Executive summary... 3 2. Overview of the problem... 3 3. Connectivity

More information

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Secure Voice over IP (VoIP) Networks

Secure Voice over IP (VoIP) Networks Secure Voice over IP (VoIP) Networks How to deploy a robust, secure VoIP solution that counters both external and internal threats and, at the same time, provides top quality of service. This White Paper:

More information

OVERVIEW OF ALL VOIP SOLUTIONS

OVERVIEW OF ALL VOIP SOLUTIONS OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype

More information

Pronto Mobile Convergence Platform

Pronto Mobile Convergence Platform Pronto Mobile Convergence Platform Table of Contents 1. Preface.. 3 2. Pronto Mobile Convergence Platform. 3 3. Technical Architecture. 4 4. Key Elements of Mobile Convergence Platform... 5 5. Features

More information

VoIP Security, an overview of the Threat Landscape

VoIP Security, an overview of the Threat Landscape VoIP Security, an overview of the Threat Landscape Peter Cox CTO Borderware Technologies peter@borderware.com Abstract Voice over IP (VoIP) services are, as the name suggests a method of running Voice

More information

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style

More information

Hosted VoIP Your guide to next-generation telephony

Hosted VoIP Your guide to next-generation telephony Hosted VoIP Your guide to next-generation telephony Hosted VoIP Guide 2015 2 Table of Contents INTRODUCTION 3 VoIP vs. TRADITIONAL TELEPHONY TRADITIONAL TELEPHONY 4 HOSTED TELEPHONY 4 BENEFITS OF HOSTED

More information

Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing).

Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing). Introduction to IP Telephony In today s competitive marketplace, small businesses need a network infrastructure that will not only save their business money, but also enable them to be more efficient and

More information

Voice over IP (VoIP) Basics for IT Technicians

Voice over IP (VoIP) Basics for IT Technicians Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides

More information

How To Use Voip Over Ip Over A Cell Phone (Telco) Over A Pc Or Ip (Telcom) Over The Internet (Telnet) Over Ppl Or Ip/Ip) Over Landline (Teltophone) Over Ip

How To Use Voip Over Ip Over A Cell Phone (Telco) Over A Pc Or Ip (Telcom) Over The Internet (Telnet) Over Ppl Or Ip/Ip) Over Landline (Teltophone) Over Ip Introduction to VOIP Stephen Okay Abdus Salam Int l Center for Theoretical Physics Trieste, Italy, February 21, 2006 Intro to VOIP Classic Telephony Data Networks(Review) VOIP What it is Protocols Hardware

More information

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,

More information

VOIP/Skype Phone. Price term: FOB(shenzhen) Model Picture Spec Price

VOIP/Skype Phone. Price term: FOB(shenzhen) Model Picture Spec Price TSK-04 Seamless integration with Skype without need of any special drivers or plug-in software Rings loudly on an incoming call;fully functional keypad enables you to make/receive calls even easier Hook

More information

TELEPHONY Bristol & Bath Science Park

TELEPHONY Bristol & Bath Science Park TELEPHONY Business-grade telephony delivered over your existing internet connection What is it? Bridge Partners provides a managed phone system to tenants of. Based on the SARK telephony platform the service

More information

DRAFT Second Circulation for Comments

DRAFT Second Circulation for Comments 1 DRAFT Second Circulation for Comments Barbados (VoIP) Voice Over Internet Protocol Policy Policy in accordance with sections 4 (2)(b) and 4 (2)(f) of the Telecommunications Act 2001-36. This policy describes

More information

Compliance and Unified Communication

Compliance and Unified Communication Compliance and Unified Communication January 2015 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how

More information