BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP



Similar documents
BITEK INTERNATIONAL INC PRESENTS: VoIP FILTERING

NATIONAL COST OF VoIP BYPASS

NATIONAL COST OF VoIP BYPASS

22nd May 2008 GENEVA. THE NATIONAL COST OF VoIP BYPASS

Bitek Guardian System

Voice over IP (VoIP)

Best Practices for Controlling Skype within the Enterprise > White Paper

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

TECHNICAL CHALLENGES OF VoIP BYPASS

What is VoIP and How It Can Benefit Your Business? Introduction

Threat Mitigation for VoIP

An outline of the security threats that face SIP based VoIP and other real-time applications

1 ABSTRACT 3 2 CORAL IP INFRASTRUCTURE 4

Voice over Internet Protocol. Kristie Prinz. The Prinz Law Office

VOIP Security Essentials. Jeff Waldron

VoIP for the Small Business

Calling All Countries: The VoIP Revolution is Here!

VoIP Resilience and Security Jim Credland

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Top tips for improved network security

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

Voice Over Internet Protocol (VOIP)

BroadTouch Business Communicator

VoIP Survivor s s Guide

VoIP. Overview. Jakob Aleksander Libak Introduction Pros and cons Protocols Services Conclusion

WHITE PAPER. Gaining Total Visibility for Lawful Interception

UNS White Paper - What is hosted voice?

White Paper. Solutions to VoIP (Voice over IP) Recording Deployment

VoIP. Voice over Internet Protocol Presentation to the IEE (Hong Kong) Lecture Theatre LT18, City University 22nd January 2005

Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud Supervisor: Prof.Dr. Shawkat K.Guirguis

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

Session Border Controllers in Enterprise

Police. 21st Century Security Problem for Police Authorities.

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

Contents. Specialty Answering Service. All rights reserved.

How To Make A Multi-Line Phone A Multi Line Phone A Money Maker

Is Skype Safe for Judges?

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Ingate Firewall/SIParator SIP Security for the Enterprise

Sametime 101: Feature Overview. Roberto Chiabra IBM Certified IT Specialist

GSM or GPRS. JaeWon Kang, Badri Nath. Dataman Lab Department of Computer Science Rutgers University

Lucent VPN Firewall Security in x Wireless Networks

VoIP: Enterprise Adoption Trends in India and Grey Market Traction in India. Shubham Jaiswal

Business Phone Security. Threats to VoIP and What to do about Them

Voice over IP Basics for IT Technicians

VoipSwitch softphones

VoIP for the Small Business

Internet: Telephone Calls for Free with Vo I P I 19/1. Your PC can Make Telephone Calls to Anywhere in the World for Free!

Security and Risk Analysis of VoIP Networks

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

[Asterisk IP Telephony Solutions]

Leveraging Asterisk to Deliver Large Scale VoIP Services in a Carrier Environment. JR Richardson

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Convergence: The Foundation for Unified Communications

TAXONOMY OF TELECOM TERMS

Agenda What can we do now? And 5 years from now we will still be current!

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Skype network has three types of machines, all running the same software and treated equally:

Voice and Data Convergence

Cisco CME Features and Functionality

GIGASTREAM BASIC BROADBAND Bristol and Bath Science Park

Voice over IP Networks: Ensuring quality through proactive link management

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

VOICE OVER IP SECURITY

Secure Voice over IP (VoIP) Networks

OVERVIEW OF ALL VOIP SOLUTIONS

VoIP Security, an overview of the Threat Landscape

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

Figure 1. Traditional PBX system based on TDM (Time Division Multiplexing).

Voice over IP (VoIP) Basics for IT Technicians

Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum

Compliance and Unified Communication

Transcription:

BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

Welcome Message Presented By Julian Fellows Executive Vice President Bitek International thanks BTL for this opportunity to present to the CANTO membership BTL is a valued customer and reference site for Bitek Bitek systems offer a unique opportunity for CANTO members to recover revenues lost to VoIP grey traffic Bitek systems will allow full management of VoIP traffic through your country 2

BTL Partner Benefits BTL installed Bitek Guardian in June 2006. Over the last 7 months the system has provided BTL with the following benefits: Continuous blocking of all grey traffic VoIP into and out of Belize Management and analysis of grey traffic Control over their market position Strong return on their investment Leverage with the National Regulator New revenue creation opportunities Eliminated fraudulent bypass voice 3

Company Overview Introducing Bitek International US based company established in 1974 (33 Years) Offices in Los Angeles, Washington DC, San Jose and London Specialises in Call Management Software Solutions History in Traditional Call Accounting and Billing Specialists in IP Billing, Fraud & Packet Management Bitek has over 50 clients on 3 continents Intelligent Network Solutions Bitek is the FIRST and ONLY company to intelligently control and filter all VoIP communications 4

Company Overview Bitek Markets Telecom & Cellular Operators (For Grey Traffic Control) Telecom Regulators (For Grey Traffic Auditing) 3G Mobile Operators (VoIP and Skype Bandwidth Control) Internet Service Providers (For Value Added Services) Law Enforcement (ETSI and CALEA Lawful Intercept) Security Services (Incriminating Forensic Data Capture) Enterprise and Government (Information Security) 5

Company Overview Bitek Product Lines VoIP Control for Regional and International Telecommunications Operators Intelligent filtering of IP and VoIP for Information Security and IP Control Keeps Skype out of networks for security and resource protection Dynamic and instant control of network priorities to manage bandwidth Call Accounting, Billing, Reporting, VoIP service control & TDM to create revenues 6

CHANGES IN THE WAY PEOPLE COMMUNICATE The revolution has already happened!

Changes in Communications Traditional Telephony Example USA - Thailand USA PSTN Carrier Traffic Thailand PSTN Traditional Tracking Cell USA Cell Traffic Cell User Thailand 8

Changes in Communications Future telephony using VoIP USA PSTN VoIP Traffic Local Call Cell USA Traditional Voice By Pass Grey traffic Lost revenue to Country Thailand PSTN Thailand Cell Cell Via WiFi Wireless Hot Spot USA Thailand Wireless Hot Spot Lap Top Via WiFi PDA Via WiFi Bitek Guardians invisibly detect and stop all un-authorized traffic and are deployed between partners A & B (Detection points) 9

The VoIP Revolution What are today s challenges? Free (to consumer) Peer-to-peer Service Skype and the PC Portal Grey Traffic Operators Declining International Rates Lost customers and revenues Confusion for Regulators New markets 10

Market Changes VoIP growth presents a significant threat to Telecom Operators Skype subscriptions anticipated to grow at a CAGR of 25% (over the next 5 years) Yahoo, MSN, and AOL: VoIP services anticipated to grow to 19% of IM users (by 2011) Google: Expected growth by a CAGR of 38% (over the next 5 years) Skype projects 7.4% of its users will call landline and cell phones via VoIP (by 2011) Skype has been downloaded more than 250 million times July 31, 2006 (Source Pyramid Research) 11

Skype on your network Skype Advantages A popular version of P2P soft phones demonstration Register under any alias name (no verification process) Free calling from anywhere in the world Use from any wireless 2G/3G Create conference calls to your team Provides video conferencing - enabling remote training Send & receive documents & images Access from PDA, 2G (Via GPRS) and 3G handsets 12

Skype on your network Skype Threats Agreeing to Skype license means your IP Address can be used as a super node Bitek tests: 1 Skype connection in 1 hour received over 100 international relay calls 1 Skype connection generates 2000 pulses per hour when logged on As Skype breaches firewalls hackers may gain undetected access to your network Your network may be vulnerable to worms and viruses Sensitive documents could be transferred through your firewall without detection Unscrupulous network users can make VoIP calls that are encrypted & undetectable Customer perception is that Free calls are now normal Only Bitek has the technology to combat these threats 13

The problems of Grey Traffic? Grey Traffic Operators Bypass taxes and license fees Do not invest in any infrastructure (they use yours) Do not create employment in your country Force a decline in international rates Significantly reduce your customers and revenues Causes confusion for regulators 14

Declining International Call Rates Grey traffic & Free P2P Decline Rates $1.00 $0.75 $0.50 $0.25 $0.10 $0.05 $0.015 $0.00 Local Termination Rate Reached lowest level @ $0.015 cents 2000 2003 2006 2007 Unable to decline lower Cost of Domestic termination 15

WHAT CAN YOU DO TO CONTROL GREY TRAFFIC IN YOUR COUNTRY?

Bitek Guardian System Take control of all VoIP Traffic Bold Revenue Protection Strategies Create services and revenues Segment and tailor specific market packages Perhaps provide a wholesale service? Eliminate Fraud Protect jobs and infrastructure investment Challenge the Regulator to protect the market 17

Bitek Guardian System Bitek Softphone Bitek provides a softphone that can be operator branded and works through the Guardian System Can be launched at the same time as blocking commences Creates revenue through subscriptions & calls (Private + Business) Registration system to satisfy security requirements Offsets negative public and business PR, reduces political sensitivity 18

Bitek Guardian System Selectively Filter or Invisibly Audit all VoIP Traffic Allow or block individually Monitor and audit or capture VoIP with forensic detail; - Email address - IP Address - IP Number (VoIP phone number etc.) - PSTN phone number - Mac Address Lawful Intercept interface capability 19

Bitek Guardian System The Guardian Solution Bitek s Guardian system is ON the network, not IN the network Guardian advanced filtering analyses and controls each IP Packet It operates without adding latency It operates secretly, without detection It allows control of a network to be returned to the owners It can be customized to seek any protocol It benefits from a continual development programme 20

Guardian Records and Reports Detailed records are individually searchable Actual IP address initiating and receiving the call/event Actual Mac address initiating and receiving the call/event Actual telephone number initiating and receiving the call/event Actual email address initiating and receiving the call/event Time the call/event was initiated and disconnected Possible to produce geographic location of IP addresses/suspect Selectively filtering on a call by call basis to: - Allow identified as authorized - Disconnect identified as un-authorized 21

Protocols and Services Controlled Main protocols: SIP, H323, Megaco, MGCP, Skinny, SCCP, IAX, XMPP Well-known Soft Phones and VoIP: MSN, Vonage, NetMeeting, Skype, XLite, Glophone GoogleTalk, Yahoo, Net2phone, Dialpad, Paket8 Gismo Project, TomatoVine, SpeakEasy, Mediaring, SJPhone 22

Typical Network Topology Network Operations Centre Bitek Guardian in Monitor mode on the core network Customer Management device Private& Confidential Bitek International Inc 2007 23

GUARDIAN VOIP CONTROL LIVE - COURTESY OF BTL Live Examination of VoIP Control

Questions and Answers Julian Fellows Executive Vice President Thank you to BTL and members of Canto