Copyright 2013 FairPoint Communications Network safety and security – Protecting your communications resources Karen Romano, Vice President, Government.

Slides:



Advertisements
Similar presentations
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
Advertisements

Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
Separate Domains of IT Infrastructure
Accelerate Your Business RP IaaS (Infrastructure as a Service) IaaS.
Security Controls – What Works
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Sample Diagram.
EarthLink Business IT Services. EarthLink Business IT Services Snapshot Comprehensive IT services portfolio −Data center, virtualization, IT security,
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Security Guidelines and Management
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
IT Infrastructure Chap 1: Definition
EXPLORING Strategic Partnership “Collaboration” Prepared by NET6.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
©2015 EarthLink. All rights reserved. EarthLink overview.
Your Business Challenges
Voice over IP Are we there yet ? Presented by: Mark Caswell, Empire Technologies, LLC. Voice over IP.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
Welcome to Hosted VoIP Eric Thomas Founder & CEO, FreedomVOICE Systems. Creators of FreedomIQ Hosted VoIP PBX. Over twelve years experience as a leading.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Security fundamentals Topic 6 Securing the network infrastructure.
Private Branch eXchange (PBX)
CPT 123 Internet Skills Class Notes Internet Security Session B.
IS3220 Information Technology Infrastructure Security
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Copyright 2006 Intelligent Enterprise, Inc. 1 5 Easy Ways to Save $$$ With Technology -or- How to Immediately Improve Your Bottom Line.
Managed IT Services JND Consulting Group LLC
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
CCI BUSINESS James W. Yates, MBA Regional Solutions Engineering Manager.
Avtec Inc Virtualization - Securely Moving to the Cloud.
UNIT V Security Management of Information Technology.
Onsite CRM Security
Chapter 1: Explore the Network
Information Systems Security
Chapter 1 Introduction to Networking
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Cybersecurity - What’s Next? June 2017
Cloud Firewall.
Working at a Small-to-Medium Business or ISP – Chapter 8
Data Center Firewall.
IS4550 Security Policies and Implementation
Decisions, Decisions… Hosted vs. Premises-based VoIP Deployment
Protect critical systems with secure remote connectivity.
AT&T Firewall Battlecard
Presentation transcript:

Copyright 2013 FairPoint Communications Network safety and security – Protecting your communications resources Karen Romano, Vice President, Government and Education Solutions; and Steve Buza, Sales Engineer; FairPoint Communications

Copyright 2013 FairPoint Communications Introduction 2 MAINE VERMONT NEW HAMPSHIRE Incumbent communications provider in ME, NH and VT $350M in ubiquitous, next- generation network in Maine Largest network in northern NE, over 16k fiber route miles Services include voice (IP and traditional), internet, data, managed services, datacenter Scalable, highly resilient data network with speeds up to 10G Approximately 1200 local employees 1,000 vehicles Over $360K in community and civic contributions $60M/yr local purchasing FairPoint Maine

Copyright 2013 FairPoint Communications Where does security start? 3 Understanding Common Concerns Threat Identification Vulnerability Assessment Mitigation Techniques

Copyright 2013 FairPoint Communications Concerns Data Network Security Voice Security Disaster Recovery Security and protection start with identifying threats and understanding your vulnerabilities in these main areas. 4 Understanding Common Concerns

Copyright 2013 FairPoint Communications Threats Data Network: Denial of Service (DoS) Hacking Virus Voice Network: Eavesdropping Toll/PBX Fraud Emergency Response Failure Disaster Recovery: Lack of Diversity and Redundancy Single Points of Failure Failover Capabilities 5 Threat Identification

Copyright 2013 FairPoint Communications Vulnerabilities 6 DataVoiceDisaster Recovery Private vs. Public networks Firewalls, Intrusion Detection/Prevention systems Operating Systems Shared Accounts Physical Security End-point protection DNS Private Branch Exchange (PBX) Security IP/Hosted PBX Security Voice system failover and overflow Emergency Response Single Points of Failure Redundancy Diversity Data Center Vulnerabilities Assessment

Copyright 2013 FairPoint Communications Data Network Security 7 Mitigation Techniques SANS ( Best Security Practices Network Security Policy Employee Training Security Certifications Administrative Access High-strength passwords Firewalls Anti-Virus/Anti- Malware End-Point Protection

Copyright 2013 FairPoint Communications Network Security Policy 8 Mitigation Techniques Preparation Acceptable Usage Policy Risk Assessment Prevention Approving Changes Network Monitoring Response Security Violations Restoration Review

Copyright 2013 FairPoint Communications Data Network Security 9 Mitigation Techniques Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS) Network & Server Event Logging and Analysis Operating System Security Patches Network Segmentation Quarterly Device Reviews

Copyright 2013 FairPoint Communications Voice Security – PBX Fraud 10 Mitigation Techniques PBX Fraud Becoming increasingly common. Municipalities being targeted PBX Vulnerability Weak authentication and access control Relying solely on equipment for security Inadequate Virtual LAN segregation IP PBX & SIP transitioning Public Networks Mitigation Use high-strength passwords Use digital dial block Do not auto-transfer inbound callers Disable the remote call-out feature Disconnect remote maintenance line International Toll Block

Copyright 2013 FairPoint Communications Voice - Emergency Response 11 Mitigation Techniques Vulnerabilities Municipality has multiple buildings or a multi-floor building. Not all floors or buildings appear in the E911 database. E911 and CNAM (Caller ID) Database Accuracy Mitigation Private Switch Automatic Location (PS-ALI) Inexpensive, life-saving feature May be required by the Public Utilities Commission Provides emergency services with specific location information for telephones. Can specify even the room number, floor, and best building entrance to use.

Copyright 2013 FairPoint Communications Voice – IP Security / Failover 12 Mitigation Techniques SIP Trunks & Hosted PBX Services Vulnerability: Voice services are on IP Networks Mitigation: Session Border Controllers Private Network Security Policy Voice Failover Vulnerability: Voice Service Outage Mitigation: Automated Failover Planned Failover Custom Redirect

Copyright 2013 FairPoint Communications Single Points of Failure 13 Mitigation Techniques Mission Critical Servers Fault Tolerance Backup / Backup Rotation / Off-Site Storage Data Center and Server Replication Public & Private Network Diversity Geographically Diverse Facilities Diverse Entrances Alternate Serving Wire Centers

Copyright 2013 FairPoint Communications Geographic Diversity 14 Mitigation Techniques

Copyright 2013 FairPoint Communications Geographic Diversity 15 Mitigation Techniques

Copyright 2013 FairPoint Communications Diversity w/ ASWC 16 Mitigation Techniques

Copyright 2013 FairPoint Communications Diversity with Data Center 17 Mitigation Techniques

Copyright 2013 FairPoint Communications Your Service Provider 18 How your service provider can help: Managed Network Services Alleviate IT staff from router management burden Pro-Active Troubleshooting, Ticketing, and Monitoring Management Portal (Router Health, Utilization) Intrusion Detection and Prevention (IDS/IPS) IOS Upgrades and Patches Private Wide Area Network (WAN) Private, Secure Improved performance and scalability vs. VPN Redundant and Resilient Network Designs for Voice & Data Service Provider

Copyright 2013 FairPoint Communications Your Service Provider 19 PRI Service with PS-ALI Inexpensive and Life Saving Feature that identifies the specific location of the caller to Emergency Services. SIP Trunking & Hosted PBX Secure, Private Network Reduced Capital Expenditures Consolidation of Telephone Services Data Center Cost Effective Scalable Secure Highly Reliable Service Provider

Copyright 2013 FairPoint Communications Questions 20 Thank You!

Copyright 2013 FairPoint Communications Your FairPoint Contacts Karen Romano, V-P Government and Education Beth McCarthy, Senior Account Manager Carl Richardson, Sales Engineer