Post on 29-Jul-2018
transcript
1 Ribbon Communications Confidential and Proprietary
About Ribbon
Ribbon is a global leader in secure real-time communicationsproviding software, cloud and network infrastructure solutions
to communications service providers and enterprises
Transforming Communications Networks
Enabling Cloud Communications
Securing Communications
2 Ribbon Communications Confidential and Proprietary
The threat vector is a dynamic process, with each stage of technology development being accompanied by a near-concurrent development of threats by which to exploit that technology.
Source:https://carlforknerconsulting.net/2016/12/07/emerging-threats-to-network-security/
“
”
2
3 Ribbon Communications Confidential and Proprietary
CONNECTIVITY IS OVER
THE INTERNET
ECOSYSTEM PROVIDES NEW POINTS OF ENTRY AND EXFILTRATION
3
5 Ribbon Communications Confidential and Proprietary
What is Changing Around our RTC Networks?
Zero-Trust• There are no security borders
• SIP opens new doors; every application must be secured
• The security stack must be re-architected for data & voice
Implications to Your Business• Attacks are becoming increasingly sophisticated
• A single network element cannot handle them alone
• Real-time communications are not fully secured
6 Ribbon Communications Confidential and Proprietary
Video
WebRTCVo-Wifi
RTC&CMobility
Toll Fraud
Caller ID Spoofing
Denial of Service (DoS) /
Distributed Denial of
Service (DDoS)
Telephony Denial of
Service (TDoS)
Eavesdropping
Exfiltration of data
via media sessions
Malware embedded in signaling
and media session
Call Hijacking
Number Harvesting
Voice Phishing
SPIT
New Security Threats Against Unified Communications
7 Ribbon Communications Confidential and Proprietary
Ribbon SBC PortfolioUnrivaled SBC Innovation in Cloud & Security
192 Sessions 600 Sessions 10,000 Sessions
64,000 Sessions 75,000 Sessions 150,000 Sessions
Enterprise
& Managed
Services
Large
Enterprise
& Service
Provider
Virtual
NFV/Cloud
70K Sessions
Virtual / uCPE Virtual VNF/Cloud
8 Ribbon Communications Confidential and Proprietary
Fraud ManagementThree Key
Focus Areas
Security & Compliance for Unified Communications Threats
Intelligent Operations and Troubleshooting
9 Ribbon Communications Confidential and Proprietary
Defining the RTC Security Applications
• Advanced algorithm and machine learning techniques
to siphon out unwanted, disruptive calls from your
communications networks and applications
• Detect calling anomalies based on metrics such as
CAC by Calling number or long/short call durations, etc
• Automatically alert on and blocks rogue calling patterns
NETProtect
TDOSProtect
• Threat intelligence sharing
• NGFW integration
• Blacklist, DBL sharing
10 Ribbon Communications Confidential and Proprietary
Defining the Fraud Management Applications
• Identify repetitive calling patterns to anomalous places
and flag them in real-time based on destination
detection
• As more fraudulent calls are made they are quickly
identified and terminated, thus mitigating any
expensive toll charges
• Detects calls to premium numbers; exceeding BW
utilization or peak call rate
• Automatically alerts and/or blocks rogue calling
patterns
• Integrated 3rd party Robo-database
• Higher effective rate
• Automated System Wide Remediation Via SBC’s or
PSX Policy enforcement
ROBOProtect
FRAUDProtect
11 Ribbon Communications Confidential and Proprietary
Defining the Intelligent Network Operations Applications
• Trunk Group Performance Metrics and KPI reporting
• MOS, Jitter based Static/Average QOS Reporting
• Dashboards & charts
• Time based Scheduled reports
• Troubleshooting and alerting
• Packet Capture
• End-to-end SIP call ladder diagram
• Static and Dynamic Alarms
• Threshold based reporting
• CDR Drill-down
• Performance Planning
• Trending and Forecasting
Planner
Monitor
Discover
12 Ribbon Communications Confidential and Proprietary
12
UNIFIEDCOMMUNICATION
With Comprehensive Security
UNIFIEDCOMMUNICATION
With Traditional Firewall
Securing Communications is IMPORTANT!
“What cyber threat intelligence is showing us is
that most threats simply exploit a series of
well-documented vulnerabilities and other
weak points to move along the path of least
resistance – and the most profit.”
“Attackers may be looking for the path of least
resistance, but there is no shortcut to securing
your platform. Vulnerabilities in the SS7
protocol recently made headlines, where
cybercriminals compromised bank accounts by
hijacking SMS messages sent to victims’ phones to
bypass second-factor authentication.”
“This novel data exfiltration technique using video
marks an escalation in the conflict as ever more
sophisticated attackers adopt the same tools that
drive productivity and growth in the corporate world to
steal its most sensitive assets.”
Kaushik Narayan
Co-founder and CTO at Skyhigh Networks
14 Ribbon Communications Confidential and Proprietary
14
RibbonProtect
Palo Alto Firewall Sonus SBC
The Next Level
SBC provides intelligence on UC flows to Palo Alto firewall which in turn takes action
Wildfire PSTN
Internet
Customer Traffic
15 Ribbon Communications Confidential and Proprietary
.
RIBBON COMMUNICATIONS HAS THE
SECURITY AND INTELLIGENT OPERATION
SOLUTIONS FOR TODAY’S RTC NETWORK