+ All Categories
Home > Documents > providing software, cloud and network infrastructure ... · •CDR Drill-down •Performance...

providing software, cloud and network infrastructure ... · •CDR Drill-down •Performance...

Date post: 29-Jul-2018
Category:
Upload: dokiet
View: 213 times
Download: 0 times
Share this document with a friend
16
1 Ribbon Communications Confidential and Proprietary About Ribbon Ribbon is a global leader in secure real-time communications providing software, cloud and network infrastructure solutions to communications service providers and enterprises Transforming Communications Networks Enabling Cloud Communications Securing Communications
Transcript

1 Ribbon Communications Confidential and Proprietary

About Ribbon

Ribbon is a global leader in secure real-time communicationsproviding software, cloud and network infrastructure solutions

to communications service providers and enterprises

Transforming Communications Networks

Enabling Cloud Communications

Securing Communications

2 Ribbon Communications Confidential and Proprietary

The threat vector is a dynamic process, with each stage of technology development being accompanied by a near-concurrent development of threats by which to exploit that technology.

Source:https://carlforknerconsulting.net/2016/12/07/emerging-threats-to-network-security/

2

3 Ribbon Communications Confidential and Proprietary

CONNECTIVITY IS OVER

THE INTERNET

ECOSYSTEM PROVIDES NEW POINTS OF ENTRY AND EXFILTRATION

3

4 Ribbon Communications Confidential and Proprietary

IDENTITY

AUDIO

VIDEO

COLLABORATION

4

5 Ribbon Communications Confidential and Proprietary

What is Changing Around our RTC Networks?

Zero-Trust• There are no security borders

• SIP opens new doors; every application must be secured

• The security stack must be re-architected for data & voice

Implications to Your Business• Attacks are becoming increasingly sophisticated

• A single network element cannot handle them alone

• Real-time communications are not fully secured

6 Ribbon Communications Confidential and Proprietary

Video

WebRTCVo-Wifi

RTC&CMobility

Toll Fraud

Caller ID Spoofing

Denial of Service (DoS) /

Distributed Denial of

Service (DDoS)

Telephony Denial of

Service (TDoS)

Eavesdropping

Exfiltration of data

via media sessions

Malware embedded in signaling

and media session

Call Hijacking

Number Harvesting

Voice Phishing

SPIT

New Security Threats Against Unified Communications

7 Ribbon Communications Confidential and Proprietary

Ribbon SBC PortfolioUnrivaled SBC Innovation in Cloud & Security

192 Sessions 600 Sessions 10,000 Sessions

64,000 Sessions 75,000 Sessions 150,000 Sessions

Enterprise

& Managed

Services

Large

Enterprise

& Service

Provider

Virtual

NFV/Cloud

70K Sessions

Virtual / uCPE Virtual VNF/Cloud

8 Ribbon Communications Confidential and Proprietary

Fraud ManagementThree Key

Focus Areas

Security & Compliance for Unified Communications Threats

Intelligent Operations and Troubleshooting

9 Ribbon Communications Confidential and Proprietary

Defining the RTC Security Applications

• Advanced algorithm and machine learning techniques

to siphon out unwanted, disruptive calls from your

communications networks and applications

• Detect calling anomalies based on metrics such as

CAC by Calling number or long/short call durations, etc

• Automatically alert on and blocks rogue calling patterns

NETProtect

TDOSProtect

• Threat intelligence sharing

• NGFW integration

• Blacklist, DBL sharing

10 Ribbon Communications Confidential and Proprietary

Defining the Fraud Management Applications

• Identify repetitive calling patterns to anomalous places

and flag them in real-time based on destination

detection

• As more fraudulent calls are made they are quickly

identified and terminated, thus mitigating any

expensive toll charges

• Detects calls to premium numbers; exceeding BW

utilization or peak call rate

• Automatically alerts and/or blocks rogue calling

patterns

• Integrated 3rd party Robo-database

• Higher effective rate

• Automated System Wide Remediation Via SBC’s or

PSX Policy enforcement

ROBOProtect

FRAUDProtect

11 Ribbon Communications Confidential and Proprietary

Defining the Intelligent Network Operations Applications

• Trunk Group Performance Metrics and KPI reporting

• MOS, Jitter based Static/Average QOS Reporting

• Dashboards & charts

• Time based Scheduled reports

• Troubleshooting and alerting

• Packet Capture

• End-to-end SIP call ladder diagram

• Static and Dynamic Alarms

• Threshold based reporting

• CDR Drill-down

• Performance Planning

• Trending and Forecasting

Planner

Monitor

Discover

12 Ribbon Communications Confidential and Proprietary

12

UNIFIEDCOMMUNICATION

With Comprehensive Security

UNIFIEDCOMMUNICATION

With Traditional Firewall

Securing Communications is IMPORTANT!

“What cyber threat intelligence is showing us is

that most threats simply exploit a series of

well-documented vulnerabilities and other

weak points to move along the path of least

resistance – and the most profit.”

“Attackers may be looking for the path of least

resistance, but there is no shortcut to securing

your platform. Vulnerabilities in the SS7

protocol recently made headlines, where

cybercriminals compromised bank accounts by

hijacking SMS messages sent to victims’ phones to

bypass second-factor authentication.”

“This novel data exfiltration technique using video

marks an escalation in the conflict as ever more

sophisticated attackers adopt the same tools that

drive productivity and growth in the corporate world to

steal its most sensitive assets.”

Kaushik Narayan

Co-founder and CTO at Skyhigh Networks

14 Ribbon Communications Confidential and Proprietary

14

RibbonProtect

Palo Alto Firewall Sonus SBC

The Next Level

SBC provides intelligence on UC flows to Palo Alto firewall which in turn takes action

Wildfire PSTN

Internet

Customer Traffic

15 Ribbon Communications Confidential and Proprietary

.

RIBBON COMMUNICATIONS HAS THE

SECURITY AND INTELLIGENT OPERATION

SOLUTIONS FOR TODAY’S RTC NETWORK

Thank You


Recommended