How To Protect Your Business From A Voice Firewall



Similar documents
PERFORMANCE MANAGER. Carrier-grade voice performance monitoring tools for the enterprise. Resolve service issues before they impact your business.

SecureLogix. Managed Security Service for Voice. Proactively Monitor and Respond to Voice/UC Threats. Harvest Your Maximum Cost Savings Potential.

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

ETM System SIP Trunk Support Technical Discussion

Release 6.1. ETM System. User Guide DOC-UG-ETM

Release 5.2. Voice Firewall. User Guide DOC-FW-ETM

Securing SIP Trunks APPLICATION NOTE.

SIP Trunking with Microsoft Office Communication Server 2007 R2

Ingate Firewall/SIParator SIP Security for the Enterprise

Installation Certification Program. Deployment of the ETM System

Securing Unified Communications for Healthcare

White Paper. avaya.com 1. Table of Contents. Starting Points

SIP Trunking DEEP DIVE: The Service Provider

Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services

Voice Over IP and Firewalls

Oracle s Session Initiation Protocol Trunking Solution. Increase Agility and Reduce Costs with Session Initiation Protocol Trunks

Grandstream Networks, Inc. UCM6100 Security Manual

How To Support An Ip Trunking Service

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

VoIP Survivor s s Guide

SangomaSBCs Keeping Your VoIP Network Secure. Simon Horton Sangoma

SIP Trunking Configuration with

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment

BlackBerry Mobile Voice System

Ram Dantu. VOIP: Are We Secured?

An Oracle White Paper February Centralized vs. Distributed SIP Trunking: Making an Informed Decision

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

V1.4. Spambrella Continuity SaaS. August 2

PETER CUTLER SCOTT PAGE. November 15, 2011

Configuring Quadro IP PBXs with "SIP Connect"

Step into the next level of office communication

Wave 500 IP PBX v4.5. SIP Trunking using the Optimum Business Sip Trunk Adaptor and the Wave 500 IP PBX v4.5

VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide

Access Mediation: Preserving Network Security and Integrity

Enterprise Phone Systems. The Complete Buyer s Guide

Oracle Enterprise Communications Solutions for Microsoft Lync. Migrate seamlessly to Microsoft Lync while reducing cost and complexity

How To Use Blackberry Mobile Voice System On A Blackberry Phone

Gateways and Their Roles

Release 6.1. ETM System. Installation Guide DOC-IN-ETM

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

Presented by: John Downing, B.Eng, MBA, P.Eng

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

X X X X X. Platinum Edition. Unlimited Extensions. Unlimited Auto Attendants. Unlimited Voic Boxes. ACD Features

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Proven LANDesk Solutions

Symantec Messaging Gateway 10.5

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ehealth and VoIP Overview

Symantec Messaging Gateway 10.6

Voice Over IP (VoIP) Denial of Service (DoS)

Cisco Unified MobilityManager Version 1.2

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Xorcom CompletePBX Overview

Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios

Cisco ASA 5500 Series Business Edition

HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION

Is SIP Trunking on Your Horizon?

Basic Vulnerability Issues for SIP Security

Threat Mitigation for VoIP


Application Notes for Configuring Microsoft Office Communications Server 2007 R2 and Avaya IP Office PSTN Call Routing - Issue 1.0

SIP-Based Solutions in the Contact Center: Using Dialogic Media Gateways with the Genesys Voice Platform

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Contents. Specialty Answering Service. All rights reserved.

Siemens OpenScape Voice V7 SIP Connectivity with OpenScape SBC V7. to Integra SIP Service

Application Notes for Configuring SIP Trunking between Metaswitch MetaSphere CFS and Avaya IP Office Issue 1.0

SIP Security Controllers. Product Overview

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

Using Asterisk with Odin s OTX Boards

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Oracle Enterprise Communications Solutions for Microsoft Lync. Migrate seamlessly to Microsoft Lync while reducing cost and complexity

Allstream Converged IP Telephony

Software-Powered VoIP

Optimizing the Avaya Communications Architecture: Calculating SIP Bandwidth With Infortel Select 9.0 Reporting

Convergence: The Foundation for Unified Communications

Enabling Users for Lync services

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

SIP Trunking Service Configuration Guide for Broadvox Fusion

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Best Practices for Securing IP Telephony

Transcription:

VOICE FIREWALL Secure your voice network edge and prevent financial losses.

The ETM Voice Firewall secures your critical networking resources and lowers telecom expenses by protecting your enterprise voice network/uc edge from TDM and VoIP attacks, disruption, and service abuse. The Voice Firewall logs, monitors, and controls all inbound/outbound voice network activity on a per-call basis through user-defined call access control (CAC) policies. These granular security and usage policies alert or prevent abusive or malicious use of your enterprise voice resources by internal or external callers. The Voice Firewall solves a host of realworld voice application security issues, enabling a large and immediate ROI while providing an elegant, cost-effective, easy-to-manage path to full Unified Communications (UC) security. It prevents data network penetrations over modems, attacks on telephony systems and other key infrastructure, unauthorized Internet sessions on phone lines, data leakage, harassing/ threatening calls, long distance abuse, calls to/from restricted parties, and other forms of phone line disruption, misuse and abuse. Companion SIP application security software will be available to augment the Voice Firewall s VoIP security capabilities and secure your migration to VoIP/UC by alerting and blocking VoIP/SIP-specific application threats such as flood DoS, fuzzed messages, directory scanning, and zero-day attacks. The ETM System Voice Firewall supports and unifies TDM and VoIP security, and works across any network mix of IP- PBX switch vendors. The system s Unified Communications Policy Management capabilities allow for the creation, remote distribution, and monitoring of consistent voice security and usage enforcement policies across a heterogeneous enterprise voice/uc network from a single administrative console. It truly unifies the security of voice/uc traffic and infrastructure across the entire enterprise. The Voice Firewall is a critical component of your regulatory information security compliance measures, providing application-layer security to real-time media that works side-by-side with your data firewall, helping complete the security of your corporate electronic perimeter for 360-degree protection and monitoring.

Prevent malicious or unwanted voice traffic to dramatically boost your security, compliance, and cost reduction efforts. PROBLEM SECURITY BREACHES SERVICE ABUSE DATA LEAKAGE EXPENSES & FINANCIAL LOSSES INVESTIGATIONS & LEGAL RISK COMPLIANCE VOICE FIREWALL SOLUTION Prevents network security breaches that result in network resource corruption, lost/stolen information, financial losses, and business operation disruption by alerting and/or blocking: Penetration attacks against the corporate data network via unauthorized inbound modem calls. Unauthorized outbound modem calls and private ISP dial-up connections that open security back doors into networking resources. Telecom system tampering, restricted long distance (LD) access, and voice mail/ IP-PBX attacks. Virus infections and restricted file transfers over dial-up connections. Prevents misuse of corporate voice services that poses a security, safety, or legal threat including: Unauthorized employee dial-up Internet use and restricted web content over phone lines. Harassing, threatening, and caller ID (CLID) blocked calls. Inbound social engineering/identity theft calls from known perpetrators. Other restricted inbound and outbound calls. Extends data leakage protection (DLP) to voice lines and communications, including data file transfers via modems and faxes of proprietary information. Reduces telecom expenses by detecting and blocking unauthorized or abusive use of corporate phone service and resources including: Unauthorized employee ISP dial-up connections and restricted Internet access. Data file transfers/faxes of restricted, proprietary information over phone lines. Internal voice service misuse/abuse. Non-business LD and international calling. Restricted toll calls to pay-per-call services (e.g., 1-900, 1-XXX-976). Directory assistance calls, connection fees, and out-of-service toll charges. LD and modem calls on fax lines. Long duration LD from common resource areas. Fax and VoIP spam. And much more. Decreases legal risk and liability exposure, and aids security investigations by tracking and alerting key calls of interest such as: 911 emergency calls, or other key calls of regulatory, legal, or business interest. Calls to/from employees or outside parties under investigation for fraudulent, threatening, or illegal conduct. Calls to/from restricted trade embargo-listed countries or other outside parties under suspicion for threatening activity. Adds security to voice lines to help complete the protection of your corporate network perimeter and strengthens regulatory security compliance.

Secure your voice network edge for complete, 360 perimeter protection. OFFICE LOCATION VoIP Trunk (SIP) VOICE SERVICES PROVIDER DATA THE ETM SYSTEM VOICE FIREWALL TDM Trunk (T1 CAS, E1 CAS, ISDN PRI, E1 PRI, SS7, Analog) Data Firewall Servers PBX Fax Modems LAN IP Phones TDM Phones Workstations Most organizations have deployed traditional data network firewalls to guard against network-level IP threats to data networks. However, without a Voice Firewall, your enterprise is open to a host of real-time voice/uc security threats, including voice fraud and modem connection back doors into data networks through unsecured enterprise phone lines. Additional SIP security software will also protect against SIP specific application threats. SAMPLE VOICE FIREWALL POLICY The firewall policy GUI is similar to those found in industry-standard IP-data firewalls. The above rule set automatically terminates threatening and abusive call activity such as restricted employee calls to ISPs over unauthorized modems (Rule 5), non-fax calls on dedicated fax lines during non-business hours (Rule 6), inbound VoIP spam (Rule 1), and toll calls such as 411 and 1-900. (Rule 2). The policy also sends real-time alerts via email to certain security and telecom management personnel when these types of abusive calls occur.

Deliver unified voice/uc network access and usage policies across your multi-vendor, mixed TDM and VoIP enterprise. FEATURE FUNCTIONALITY Enterprise-Wide Security & Usage Policy Enforcement Continuous Call-Type/ Codec Monitoring Rule-Based Security Policy GUI Granular Policy Construction Centralized or Distributed Policy Administration Policy-Based AAA Services Real-Time Alerts and Call Termination Wildcards, Phone Numbers & VoIP Addresses Secure and control your voice network by prescribing which inbound and outbound calls are allowed, terminated, and alerted with real-time, inline, usage monitoring/call blocking policy enforcement. Restrict or monitor calls by call type or call type associated with a VoIP codec. Inline ETM Appliances continually monitor all signaling for calltype changes. Mid-transmission changes are logged and the call is reevaluated against the active firewall policy. Construct security and usage policies of individual rules in an easy-to-use graphical user interface, similar to those in industry-standard IP firewalls. Specify different call criteria in each rule to cover all of your voice network restrictions. Construct rules to alert and control call activity by specifying any combination of policy fields call type; absence or blocking of caller ID, call source and destination numbers; call direction; time of call; call length; and certain VoIP call attributes, such as excessive media rate. Administer enterprise-wide, departmental, or station-specific security and usage policies from one central management console or from multiple distributed consoles. Secure access to authorized modems and other restricted services to authenticated users only. Authorized users of protected inbound or outbound systems authenticate to a distributed AAA Server Appliance running in IVR mode. Configure policy rules to send a real-time security event alert via console message, email, and/or SNMP trap. Rules can also be configured to automatically terminate calls that match specified criteria call type, time, source/destination, and more. Use wildcards to restrict inbound or outbound calls associated with a specific country, area code, city code, or VoIP domain. Use phone number groups, ranges, and filters to restrict PSTN or VoIP calls. SecureLogix.com

SecureLogix Corporation 13750 San Pedro Ave. Suite 820 San Antonio, TX 78232 1-800-817-4837 securelogix.com ETM, TeleWatch Secure, TWSA, We See Your Voice, Unified Communications Policy Manager, SecureLogix, SecureLogix Corporation, as well as the ETM Emblem, SecureLogix Emblem and the SecureLogix Diamond Emblem are trademarks and/ or service marks or registered trademarks and/or service marks of SecureLogix Corporation in the U.S.A. and other countries. All other trademarks mentioned herein are believed to be trademarks of their respective owners. Copyright 2009 SecureLogix Corporation. All Rights Reserved. SecureLogix technologies are protected by one or more of the following patents: US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,700,964 B1, US 6,718,024 B1, US 6,735,291 B1, US 6,760,420 B2, US 6,760,421 B2, US 6,879,671 B1, US 7,133,511 B2, US 7,231,027 B2, US 6,226,372 B1, US 7,440,558 B2, and CA 2,354,149. U.S. and Foreign Patents Pending. Other ETM Applications Usage Manager Performance Manager Voice IPS Call Recorder