Firewalls vs. ESBCs: You May Be Under Attack and Not Even Know It Mike Reiman Director of Software Solutions
Edgewater Networks Overview Based in San Jose, California, Edgewater Networks was founded in November 2002 We are a leading provider of Enterprise Session Border Controllers (ESBCs) Over 200 Service Provider Partners Over 300,000 Systems Shipped Our products are sold to SMBs and Enterprises through leading service providers and other channels Over 6 Million Sessions Since 2010 Over 18 Million Endpoints under Management
Agenda SIP Attacks They Can Happen To Anyone Industry Statistics The Prevalence of Attacks The Cost of Toll Fraud Changing the Landscape Difference Between Firewalls and ESBCs Q&A
SIP Attacks It Can Happen to Anyone Hackers are smart Automated tools bombard the network Bogs down network Can rack up thousands of dollars in toll fraud Incredibly difficult to identify as constantly moving Breaches on converged network 185K Requests for Access to Corporate Voice Services ESBC blocks 180K Illegitimate Requests December 2014 All 185K Requests passed by next gen, application aware Firewall
Industry Statistics Revenue (US$ Billions) Trunks (Millions) $10 As SIP proliferates with staggering growth rates... $8 $6 $4 $2 $0 Revenue Trunks CY11 CY12 CY13 CY14 CY15 CY16 CY17 CY18 Infonetics Research: SIP Trunking Services Market Size and Forecasts, Oct. 2014 Business Cloud VoIP and UC Services Market Size and Forecasts, Aug. 2014 40 35 30 25 20 15 10 5 0... Attacks are on the rise... Monthly fraud cases reported up 121% in the last 5 years SIP Hacking accounts for over 25% of all cases Cost of SIP Hacking is estimated at $11.7 billion Communications Fraud Control Association - 2014 Annual Survey And, despite awareness, customers are not addressing them. 91% of businesses cite security as a critical concern when selecting a SIP provider But, 52% connect SIP Trunks natively to their PBX Source: Infonetics Research, UC Cloud and On-Premises Strategies and Vendor Leadership: North American Enterprise Survey, March 2015
Changing Attack Targets Smaller firms with little or no IT staff are becoming targets for Fraud Attacks Atlanta architecture firm - $166K New York dry cleaning chain - $147K Albany consulting company - $200K Larger firms and their Service Providers not sure who should be responsible for security
Industry Statistics
How They re Happening PBX Feature Server SIP Trunk PRI SIP Trunk Public IP Cloud 3G/LTE Partners
How They re Happening Feature Server IP-PBX ISDN TDM Public IP Cloud 3G/LTE Partners
What s the Common Denominator? All deployments had a firewall A firewall was NOT enough
Understand the OSI Stack OSI model differentiates functions of firewalls vs ESBCs Firewalls control Layer 2 to Layer 4 ESBCs control Layer 2 to Layer 4, but excels in Layer 7 functionality
Firewalls and the OSI Model Static technology Turn on / off interfaces throughout its 3 layers Firewalls don t control these layers QoS issues in VoIP network will occur here Firewall changes are made only at these layers
ESBCs Fit into the OSI Model Take traffic management to the next level Security and application concerns managed through a single network management solution ESBCs coordinate security policy management at Layers 2 and 4 and application resource allocation at Layer 7 with message handling at Layer 5 Quality issues do NOT affect end-users
Advantage of ESBCs over Firewalls Session Layer (5) control Presentation Layer (6) control Application Layer (7) control Protocol transcoding Visibility into voice KPIs (jitter, latency, throughput, etc.) Dynamic policy control for communications applications
ESBCs Ensure VoIP Security Protecting from malicious attacks Toll fraud protection Encryption Topology hiding IP traffic management
There s a Place for Both H.323/SIP Call Control Public IP Cloud 3G/LTE Demarcation Point Partners
Two Choices for Deployment Option 1 Option 2 Connect SIP trunks directly to ESBCs Let ESBC take lead on security and traffic management Firewalls take lead w/esbc on interior Prioritizes QoS, enable interoperability across all communications applications Connect SIP trunks directly to ESBCs
Conclusion Total VoIP Security Firewalls alone are not enough to guarantee VoIP Security Without an SBC, IT groups fight QoS fires that can be difficult to resolve
Questions? www.edgewaternetworks.com sales@edgewaternetworks.com (408) 351-7200 Next Webinar: October 15, 2015 Market Analysis for UC & Hosted Services in the SMB Market: Building the Best Offer to Meet Market Needs http://bit.ly/smbresearch2