1 Southern Africa Telecoms Fraud Management, Revenue Assurance and Network Security Meeting.

Slides:



Advertisements
Similar presentations
Planning and Administering Windows Server® 2008 Servers
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Next Generation Internet (NGI) Connecting to the Future.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 Agent Program Partner With Us. 2 About Xact Communications Xact provides superior cloud-based and traditional IP voice and data technology and is founded.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
(Geneva, Switzerland, September 2014)
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Network Management: Accounting and Performance Strategies - Graphically Rich Book Network Management: Accounting and Performance Strategies by Benoit Claise.
Securing your IP based Phone System By Kevin Moroz VP Technology Snom Inc.
Website Hardening HUIT IT Security | Sep
Norman SecureSurf Protect your users when surfing the Internet.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Network Techlab (India) Pvt. Ltd.
Spitfire Partner Service 3CX Training Peter Goddard– Partner Account Manager.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Chapter 6 of the Executive Guide manual Technology.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
Module 11: Remote Access Fundamentals
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
NuolSec VIspace Vientiane, Laos.
MoVoIX CSD 2005 mozambique voice over ip and ix extension FINAL PRESENTATION.
Integrating an OMS and VOIP Inmate Phone System Maine Department of Corrections xwave Corporation May 2007.
UC Opportunities For Service Providers. Agenda Software + Services recap Services through SPLA –Exchange Hosted Services –Live Meeting –Dedicated Hosted.
1 Business in a Box Partner With Us. 2 What is Business in a Box? Business in a Box Xact Communications leverages VoIP (Voice Over Internet Protocol)
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
Chapter 8 Auditing in an E-commerce Environment
Broadband Delivery Models.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Next Generation OSS – Leveraging Revenue Producing Resources Todd Benjamin President & CEO Rodopi Software February, 25, 2004.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Copyright 2008 © Mobile Telephone Networks. All rights reserved. MTN Business Hosting Services: Efficient Localization of Web & Digital Content Tolulope.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Standard IP Solutions - Call us Now at or Toll Free
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Voice services in NGN/IMS architectures March 2008.
Working at a Small-to-Medium Business or ISP – Chapter 8
International TOP ups Business presentation
Network management system
Firewalls.
What’s New in Fireware v12.1.1
Your Business Opportunity
Enterprise Single Sign-On
CORPORATE PROFILE JUNE 2016
Norton customer support Number
UNM Enterprise Firewall
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Park A Call Meeting Notes (2/21/17 09:23) ok
IS4680 Security Auditing for Compliance
JT Group Revenue Assurance Kathryn Garland Fraud & Revenue Assurance Manager The Origin of Species and Notes From a Small Island I live in the tropical.
Professional Network Services
Providing Teleworker Services
Providing Teleworker Services
Revenue Assurance Best Practices & Fraud Management
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Wide Area Network Fundamentals
AT&T/Cisco Partnership…Enabling Customer Success
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Agenda Overview Extending the Reach of VoIP Application Examples Standards and Other Resources Summary.
IBM Software A financial services company speeds up fraud detection Protecting customers and innovating new product offerings with an IBM business rules.
Global One Communications
Providing Teleworker Services
Presentation transcript:

1 Southern Africa Telecoms Fraud Management, Revenue Assurance and Network Security Meeting

Revenue Assurance Framework QMS system TQM approach Blue Prints – Implementation – Monitoring (auditing) –Evaluation – Control Ensures continuous improvement Internal audits mostly focused on finance

Software Security Features Password protection Allocation of roles & rights Audit trails Authentication before offering services

Revenue Assurance Issues  Fradulent VoIP traffic  Data Network threats

Characteristics of Fradulent VoIP Traffic

Salient Points Fraudster’s server is known by the local telephone operator. Enters into an agreement for terminating traffic with local telephone operator & receives commission Partner hacks enterprise SIP phone through ISP & initiates fraudulent calls through server Enterprise is billed for fraudulent calls & fraudster receives commission for received calls Fraudster & partner server may be colocated

Solutions Connect through VPN & GSM/CDMA Activate Prepaid Billing to set a ceiling for outgoing traffic Install anti-fraudulent traffic system before ublocking all public IP addresses for internet connected customers Blacklist hot destinations Consult network experts Reconcile traffic

Solutions Leverage on International law on fraudulent traffic Identified fraudulent traffic should not be paid for so that the end customer will not benefit Its easier to just settle fraudulent traffic accounts but this promotes the bad practice

Thank You END