CounterPath Corporation William Khris Kendrick: – Director of Business Development and Channel Marketing – www.counterpath.com www.counterpath.com –

Slides:



Advertisements
Similar presentations
Cloud Communications Ecosystem Panel Alan Bugos, Vice President of Technology October 15th, 2013.
Advertisements

The leader in session border control for trusted, first class interactive communications.
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Lync /11/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Securing Unified Communications Mor Hezi VP Unified Communications AudioCodes.
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
5/3/2006 tlpham VOIP/Security 1 Voice Over IP and Security By Thao L. Pham CS 525.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
1 The Need for Enterprise Session Border Controller The E-SBC allows the enterprise to control its SIP implementation The Ingate SIParator ®
Enterprise Infrastructure Solutions for SIP Trunking
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Data LAN Ingate Firewall ® Creating a Common Data and VoIP LAN for SIP-Trunking over the Internet PSTN Public Internet SIP Trunking Provider GW SIP System.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
SIP Explained Gary Audin Delphi, Inc. Sponsored by
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Towards a Scalable and Secure VoIP Infrastructure Towards a Scalable and Secure VoIP Infrastructure Lab for Advanced Networking Systems Director: David.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Module 4: Designing Routing and Switching Requirements.
Module 5: Configuring Access for Remote Clients and Networks.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Voice over IP B 林與絜.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
SIP Trunking As a Managed Service Why an E-SBC Matters By: Alon Cohen, CTO Phone.com.
VoIP Security Sip.EDU workshop February 2007 Walt Magnussen, Ph.D. Director TAMU ITEC.
ITEXPO 2015 Khris Kendrick Vice President Business Development Ingate’s mission is to enable the best access for telephony,
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Providing Secure Access to Remote Offices.
Chapter 12: Secure Communications and Network Attacks.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
March 2009 Sipera Overview. 2 © 2009 Sipera Systems, Inc. All Rights Reserved. About Sipera  Leader in real-time Unified Communications (UC) security.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
VPN: Virtual Private Network
Logo here Module 8 Implementing and managing Azure networking 1.
11/12/2018.
UNM Enterprise Firewall
Virtual Private Network (VPN)
WebRTC for Bria Khris Kendrick
Security Protocols in the Internet
Enterprise Infrastructure Solutions for SIP Trunking
VPN: Virtual Private Network
Helping to Achieve ROI Targets with SIP Trunking
OUT OF BAND AUTHENTICATION
Ingate & Dialogic Technical Presentation
Providing Teleworker Services
Presentation transcript:

CounterPath Corporation William Khris Kendrick: – Director of Business Development and Channel Marketing – – – Linkedin Khris Kendrick

E-SBC Deep Dive What is an SBC or E-SBC? Why do they exist and Matter? Can SBC’s save you money? What features and functions Matter – Would a large multinational not use an SBC? What is a Soft SBC? – Purpose Built versus COTS IPPBX Attacks (Not if,….. but When) DDOS Attacks and Floods

Securing the Network Secure Tunnels (VPN) Authentication – IP address, Client Header – Hiding of the Topology – Encryption (SRTP, TLS, Ipsec) – Detecting DDOS

E-SBC Deep Dive Deployment Strategies – Premise or cloud – Solves NAT issues – Message Manipulation (normalizing variants of SIP) – Translation of protocols – E-SBC is the Enterprises Network Traffic COP – Black List and White List

Enterprise Support for Remote Workers Home user Remote Worker Traveling user Home NAT SIP capable proxy- based firewall Hotel NAT Hotspot Internet Remote SIP Connectivity module Clear Media / Signal Encrypted Media / Signal

Measures quality of voice path and near-end and far-end – Based on RTCP-XR data provided by far-end client, the receiver is also able to determine the voice quality as perceived at the far-end Voice Quality Monitoring Dashboard – In addition to MOS, the following characteristics are measured: jitter, packet loss, burst gap loss, delay, signal level, noise level and echo return loss End to End Voice Quality Monitoring 8

E-SBC Deep Dive Resources

Try Bria Play – Realtime Mobility& Security in action 10

E-SBC Deep Dive Thank you! Khris Kendrick Dir of Business Dev and Channel