Addressing Security Issues IT Expo East 2011. Addressing Security Issues Unified Communications SIP Communications in a UC Environment.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
SIP Trunk-UC Workshop IT Expo 2011.
Aeonix & Ingate Role in Enterprise
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
1 What’s Next For SIP Trunking? Carriers Enabling and Bringing WebRTC Features With Their Trunks © 2015 Ingate Systems AB Prepared for:Ingate SIP Trunking,
What does an SBC do? Speaker Notes/Script:
1 Tapping the Potential of the PBX Lindsay Kintner VP Product Management Tadiran Telecom.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
SIP Security & the Future of VoIP Nate Klingenstein APAN 26 Queenstown August 5, ~ndk/apanSIP.pdf.
Karl Stahl CEO/CTO Ingate Systems Ingate’s SBCs do more than POTSoIP SIP. They were developed.
Ingate Firewall & SIParator Product Training
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
TeleWall, TeleSweep Secure, TeleAudit, TeleVPN, ETM, TeleView, TeleBridge, TeleIDS, TeleWall NET, SecureLogix, SecureLogix Corporation and the SecureLogix.
Securing Unified Communications Mor Hezi VP Unified Communications AudioCodes.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
1 MSIT 458 Information Security and Assurance VoIP Xeon Group Rohit Bhat Ryan Hannan Alan Mui Irfan Siddiqui.
1 VOIP Network Threats Let the subscribers beware Gerard Wilkes October 24, 2006.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
1 The Need for Enterprise Session Border Controller The E-SBC allows the enterprise to control its SIP implementation The Ingate SIParator ®
Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.
Enterprise Infrastructure Solutions for SIP Trunking
Vocalcom Cloud Contact Center
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
Voice over IP Fundamentals M. Arvai NEC Senior Technical Eng. 1.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
October 10-13, 2006 San Diego Convention Center, San Diego California Taking IP Security to the Next Level Real-time threat mitigation.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
SIP Explained Gary Audin Delphi, Inc. Sponsored by
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Agenda Voice Security Architecture VoIP Risk VoIP threats Service disruption Design Consideration Attacks.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Version 1.0June 11th 2013 VIRTUAL CONTACT CENTER in the Cloud Cloud Contact Center Global Infrastructure for Aditya Birla Minacs.
Protecting VoIP networks against denial of service and service theft Henning Schulzrinne with Gaston Ormazabal (Verizon) and IRT graduate students Dept.
1 A high grade secure VoIP using the TEA Encryption Algorithm By Ashraf D. Elbayoumy 2005 International Symposium on Advanced Radio Technologies Boulder,
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Emerging Technologies. Emerging Technology Overview  Emerging technologies are those which are just beginning to be adopted or are at the initial acceptance.
VoIP Applications for the Small Business
January 23-26, 2007 Ft. Lauderdale, Florida SIP Trunking for the Intermediate/Advanced Reseller The SIP Connection From A to Z Presented by Pete Sandstrom,
October 10-13, 2006 San Diego Convention Center, San Diego California SIP Trunking… Why is it so important?
VoIP Privacy April ©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 2 About BroadSoft Market Leader Market.
SIP Trunking As a Managed Service Why an E-SBC Matters By: Alon Cohen, CTO Phone.com.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
ITEXPO 2015 Khris Kendrick Vice President Business Development Ingate’s mission is to enable the best access for telephony,
To Rent or Buy the IP PBX? Maybe it’s Both…. Building a VoIP Solution That Enables Both.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
© 2011 AudioCodes Ltd. All rights reserved. AudioCodes Confidential Proprietary Avaya DevConnect Certified Enterprise Session Border Controllers April.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 7 Layer 3 Networking, Campus Backbones, WANs, and.
A Listener Among the Static: Christian Prescott Gabriel Fair Security and Voice over IP.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
March 2009 Sipera Overview. 2 © 2009 Sipera Systems, Inc. All Rights Reserved. About Sipera  Leader in real-time Unified Communications (UC) security.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Fortinet VoIP Security June 2007 Carl Windsor.
Trends in Enterprise VoIP
Ingate & Dialogic SIP Trunking
Ingate & Dialogic Technical Presentation
Presentation transcript:

Addressing Security Issues IT Expo East 2011

Addressing Security Issues Unified Communications SIP Communications in a UC Environment

Addressing SIP Security Security Why is Security Important? End of Geography IP Protocol is an OPEN network system, no longer need to be physically present Any IP Address can connect with any other IP Address, WAN to WAN, WAN to LAN, LAN to WAN, and LAN to LAN. Prevent Fraudulent Activities Prevent Disruption of Service

SIP Trunk-UC Workshop The Role of an E-SBC - Security Common SIP Attacks Intrusion of Services (or Stealth of Service) Devices attempting Register with a IP-PBX in an attempt to look like an IP-PBX extension and gain IP-PBX services SPIT (SPAM over Internet Telephony) Toll Fraud A form of an Intrusion of Service, where malicious attempts to send INVITEs to an IP-PBX to gain access to PSTN Gateways and SIP Trunking to call the PSTN Denial of Service INVITE (or any SIP Request) Flood in an attempt to slow services or disrupt services Or any UDP or TCP traffic directed at a SIP Service on SIP Ports Indirect Security Breaches

Typical Network Deployments Internet Managed Service Provider Hosted or Cloud Services

Addressing Security Issues Secured Unified Communications over the Internet

Addressing Security Issues Typical Network Deployments Internet Telephony Service Providers Delivery of SIP Trunking Services over the Public Internet Security Advantages One Control Point Any Trunking Service from Anywhere Terminate Local, Out of State, and International numbers Most Flexible delivery of SIP in UC Optimize Bandwidth for Voice & Data traffic – QoS Security Disadvantages Highest level of typical Internet security concerns, DoS, Vishing, Fuzzying, Thieft of Service (Toll Fraud) and others Access Control Lists are not enough, more detailed inspection is required

Addressing Security Issues Typical Network Deployments - ITSP Addressing Internet SIP Security There is an obvious need to have a Security, as Internet is the Most insecure network Prevent Fraudulent Activities Identify Theft, Toll Fraud, Spoofing, Misuse SPAM, SPIT Vishing Eavesdropping Data Mining Reconnaissance Prevent Disruption of Service Denial of Service Fuzzing

Addressing Security Issues Secured Unified Communications over a Managed Service Provider

Addressing Security Issues Typical Network Deployments Managed Telephony Service Providers Delivery of SIP Trunking Services over the Private Carrier Service The Enterprise Customer still needs to protect their assets and intellectual property. Security Advantages No Internet SIP security concerns from the Carrier– Whoo Hoo! Security Disadvantages No Optimization of Voice and Data Bandwidth Customer Enterprise still connecting to an Untrusted Network There is still an Internet Connection somewhere at the Enterprise… What if the Managed Service Provider is providing both Internet and SIP?

Addressing Security Issues Typical Network Deployments - Managed Addressing Managed Service Provider SIP Security There little to no risk of Internet type Security Risks From the Enterprise Customers perspective, The Carrier Network is still Untrusted – Anything that is not their own and not under their security to protect their assets and intellectual property Only allow SIP Communications from the Carrier Prevent Fraudulent Activities Identify Theft, Toll Fraud, Spoofing, Misuse – In Both Directions Data Mining

Addressing Security Issues Secured Unified Communications over a Hosted Service Provider

Addressing Security Issues Typical Network Deployments Hosted Telephony Service Providers Delivery of SIP Trunking and other Services over a Hosted Service Provider (Services In the Cloud) Can be delivered over the Internet or Managed private carrier service In ether deployment Enterprise Customer has to protect their assets and intellectual property Advantages & Disadvantages When over the Internet – Same as before When over Managed – Same as before

Addressing Security Issues Typical Network Deployments - Managed Addressing Hosted Service Provider SIP Security Depends on method of deployment, following issues mentioned before. From the Enterprise Customers perspective: The Carrier Network is still Untrusted – Anything that is not their own and not under their security to protect their assets and intellectual property Only allow SIP Communications to the Carrier Prevent All Fraudulent Activities Identify Theft, Toll Fraud, Spoofing, Misuse – In both directions Data Mining

SIP Trunk-UC Workshop The Role of an E-SBC - Security Why is SIP Security Better than PSTN? Encryption Transport Layer Security (TLS) – Encryption of SIP Signaling

SIP Trunk-UC Workshop The Role of an E-SBC - Security Why is SIP Security Better than PSTN? Encryption Secure RTP (SRTP) – Encryption of Media

SIP Trunk-UC Workshop The Role of an E-SBC - Security Why is SIP Security Better than PSTN? Prevent Fraudulent Activities Access Control Traffic Policies Topology Hiding Encryption Prevent Disruption of Service Intrusion Detection Service / Intrusion Prevention Service Blacklisting

THE END