CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Product & Services Overview Analyze, control, and secure your telephone applications September 2006.

Slides:



Advertisements
Similar presentations
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Advertisements

RiT PatchView Solution
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Sonus SBC1000, SBC 2000 Competitive Positioning
Overview of DVX 9000.
Vodacom Microsoft Hosted Lync
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Voice over IP (VoIP) and Unified Messaging (UM) - NETS testing update NETS Presentation - 11-Dec-2001 Jeff Custard Teresa Shibao Jim VanDyke.
Polycom Unified Conferencing. Presentation Agenda Why Unified Conferencing? Polycom Unified Conferencing Polycom Unified Conferencing Experience MGC Platform.
Digital video security systems 2 Multi-functional CCTV Management System The Most Complete Integrated Digital CCTV Management System.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Ozeki Informatics Ltd. | | info.ozekiphone.com | Ozeki Informatics Ltd. | | +36.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Highly Available Central Services An Intelligent Router Approach Thomas Finnern Thorsten Witt DESY/IT.
IS Network and Telecommunications Risks
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Module/Subject #/title here Copyright Objectworld Communications Corp. SIP Trunking Seminar Series In conjunction withSponsored by TMC San Diego, CA Oct.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
LDK-24(Nexer). LDK-24 Flexible architecture Flexible architecture Integrated LAN switch & ADSL Router Integrated LAN switch & ADSL Router Basic & enhanced.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
Real Time ACD Package DIGITAL COMMUNICATIONS PLATFORM Digital Communications Platform.
WavioNet 2.0. Proprietary Information. 2 Objective Introduce WavioNet application NMS Learn how to perform basic device management Understand WavioNet.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Honeypot and Intrusion Detection System
Module 7: Fundamentals of Administering Windows Server 2008.
Chapter 6 of the Executive Guide manual Technology.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Voice over IP (VoIP) and Unified Messaging (UM) -- NETS testing update NCAB Presentation 19-Dec-2001 Jeff Custard Teresa Shibao Jim VanDyke.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot CheckPhone.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
October 10-13, 2006 San Diego Convention Center, San Diego California Effective Deployment and Migration Strategies Leigh Fatzinger, VP.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Cscape EnvisionRV Horner APG, LLC. EnvisionRV - What Does it Do? Allows viewing and interacting with remote OCS controllers. The PC displays screens that.
Implementing Microsoft Exchange Online with Microsoft Office 365
Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Carrier’s Web Solution. Carrier’s new web user interface –New BACnet system –Built completely on web technology –Simple to install –Unparalleled feature.
IS3220 Information Technology Infrastructure Security
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
MiVoice Office Eight parties per conference Max 20 parties / single conference Total of 40 parties Dial able Conference Assistant and conference.
Rohde & Schwarz Topex TOPEX IP Radio Gateway July 2011.
Interwise Connect Version 8. Interwise Connect V8: What’s New  Conferencing -Web Client -Extended platform support -Faster application sharing -Automatic.
Secure Access Link (SAL): Supporting Cost Savings and Improving Secure Access.
InGenius Connector Enterprise Microsoft Dynamics CRM
AT&T Premises-Based Firewall Enhanced SBS Solution
Module Overview Installing and Configuring a Network Policy Server
Securing the Network Perimeter with ISA 2004
What’s New in Fireware v12.1.1
AT&T Firewall Battlecard
Presentation transcript:

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Product & Services Overview Analyze, control, and secure your telephone applications September 2006

Page 2 CHECKPHONE_PPT_131205_FR.ppt Agenda CheckPhone’s Solution  CheckPhone’s Approach  ETSS® System  ETSS® GUI  ETSS® Security Management System Probes  ETSS® Expert  ETSS® Tools  ETSS® V3  ETSS® System Evolution  Use Cases  CheckPhone’s Services  Customer Service & Support  Services Strategy Benefits Summary

Page 3 CHECKPHONE_PPT_131205_FR.ppt Prevent & Detect: Centralized security policy definition and management Real-time application of the security policy (disconnection of unauthorized communication) Measure & Report: Automatic imports of PBX configuration Assessments of risks and severity Determination of countermeasures Centralized view of risk reports Detection alerts on vulnerabilities Track & Analyze: Logs and Configuration tracking. Analysis enabled by the robust data visualization tool Prevent & Detect: Centralized security policy definition and management Real-time application of the security policy (disconnection of unauthorized communication) Measure & Report: Automatic imports of PBX configuration Assessments of risks and severity Determination of countermeasures Centralized view of risk reports Detection alerts on vulnerabilities Track & Analyze: Logs and Configuration tracking. Analysis enabled by the robust data visualization tool Management of security rules Definition of the security policy ETSS® IP/TDM Probe Drop unauthorized communication PREVENT & DETECTMEASURE & REPORT Configuration imports Centralization of configuration data Vulnerability reports Threats, Severity & Countermeasures ETSS® System CheckPhone’s Approach Architecture:  Distributed (redundant and autonomous probes)  Multi-technology (TDM, Hybrid, Full IP)  Multi-protocol (SIP,ISDN, vendor specific)  Multi-platform (major equipment manufacturers) Architecture:  Distributed (redundant and autonomous probes)  Multi-technology (TDM, Hybrid, Full IP)  Multi-protocol (SIP,ISDN, vendor specific)  Multi-platform (major equipment manufacturers) TRACK & ANALYZE Configuration and Logs History Configuration, Call flows & Probe status Analysis Variance assessments, Custom Views

Page 4 CHECKPHONE_PPT_131205_FR.ppt CheckPhone’s Solution Expert Telecom Security System® (ETSS®) ETSS® Security  ETSS® Security Manager enables the creation of rules, management of profiles and display of warnings. Together with the ETSS® probes they enable the implementation of security policy in the enterprise. Access to historical archives of call logs allows access to vital call detail information.  IP and TDM Probes that monitor and analyze traffic in real time and apply rules as defined using the ETSS® Security application ETSS® Expert imports configuration from PBXs provides on demand vulnerability assessments and alerts. A historical archive of imports and the ability to identify variances on PBX configuration is available. Expert Telecom Security System® (ETSS®) ETSS® Security  ETSS® Security Manager enables the creation of rules, management of profiles and display of warnings. Together with the ETSS® probes they enable the implementation of security policy in the enterprise. Access to historical archives of call logs allows access to vital call detail information.  IP and TDM Probes that monitor and analyze traffic in real time and apply rules as defined using the ETSS® Security application ETSS® Expert imports configuration from PBXs provides on demand vulnerability assessments and alerts. A historical archive of imports and the ability to identify variances on PBX configuration is available. CheckPhone’s Security Professional Services Security Services  VoIP Security Consulting Service  Strategy/Policy/Architecture  Assessments & Audits  Customer defined  Implementation & Support  Vulnerability Assessments  Penetration Assessments  War Dialing  Compliance Service  Regulatory  Legal  Standards  Managed Service  24x5, 24X7  Demand Based (Daily, Weekly, Monthly, etc.) Certifications  CISSP  DCSSI- France’s National Defense Certification (in progress) CheckPhone’s Security Professional Services Security Services  VoIP Security Consulting Service  Strategy/Policy/Architecture  Assessments & Audits  Customer defined  Implementation & Support  Vulnerability Assessments  Penetration Assessments  War Dialing  Compliance Service  Regulatory  Legal  Standards  Managed Service  24x5, 24X7  Demand Based (Daily, Weekly, Monthly, etc.) Certifications  CISSP  DCSSI- France’s National Defense Certification (in progress)

Page 5 CHECKPHONE_PPT_131205_FR.ppt ISDN Full IP Telephony TDM Telephony Telecom Cabinet Call Server Proxy IP Phones ETSS® IP Probe Legacy Phones Fax ISDN IP Hybrid telephony ETSS® Suite IPABX administration desk Printer ETSS® IP Probe ETSS®TDM Probe ETSS® IP Probe ETSS® TDM Probe IP Phones CheckPhone’s Voice Security in Enterprise Networks PBX Legacy Phones PABX administration desk Telecom Cabinet Fax Switch / Router

Page 6 CHECKPHONE_PPT_131205_FR.ppt Data vs Multimedia – Fundamental Differences Data Client Server Architecture Non-Real Time Communication Not Synchronized Voice Features  Not applicable Service Level Agreements Market Expected Availability  Best efforts Network points of vulnerability  Traditional Multimedia Peer to Peer Architecture Real Time Communication Synchronized Voice Features – new vulnerabilities  Call ID, call forward, voic , three-way calling Stringent QoS Market Expected Availability  % Network points of vulnerability  New technologies: IP, advanced wireless  New elements: telephone handsets, conferencing units, call processors/controllers, media gateways

Page 7 CHECKPHONE_PPT_131205_FR.ppt ETSS® System – Leading Edge Technology OpenBSD Operating System  Free, Open source & open documentation  Security: built-in cryptography and PF Firewall suite SQL Database  Open Source, Easy to Use  Adopted standard by ANSI & ISO “.Net” Real-time Client  Best class GUI  Real time view IDS/IPS Security Principles  Real-time localized detection  Low false alarms  Enterprise wide prevention IDS/IPS Security Principles  Real-time localized detection  Low false alarms  Enterprise wide prevention

Page 8 CHECKPHONE_PPT_131205_FR.ppt ETSS® System Graphical User Interface (GUI)

Page 9 CHECKPHONE_PPT_131205_FR.ppt User Interface Benefits Description Utilities Window, Point and Click, Intuitive Icons Pull Down menus, predefined lists Enhanced Administrator rights management Password based Login, Auto disconnect Graphical view of call traffic data Telescoping views Multi-domain Benefits Easy to use Real-time security related call traffic graphs Multiple sites in a single screen Easy access to data and tools Secure access to ETSS® System:  Customized administrator rights profile  Login Password  Auto-disconnect

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot ETSS® Security Analyze, control, and secure your telephone applications

Page 11 CHECKPHONE_PPT_131205_FR.ppt ETSS® Security Key Administrator capabilities: Add/Delete Rules Manage Settings View Warnings, call history, real time calls Antifuzz profiles Automate alerts Overview Security Policy  Rule definition  Rule filters  Implement button Settings  Lists  Automation  Schedules  Actions  Antifuzz protection Real-time Calls  24 hours rolling, by call type view  Last 5 calls History Calls Statistics

Page 12 CHECKPHONE_PPT_131205_FR.ppt Security Policy

Page 13 CHECKPHONE_PPT_131205_FR.ppt ACTIONS  Each rule entails an action, either directly or after a settable timeout  Ban: disconnection of the communication or temporary banishment  Authorization  Special tagging that flags these calls within the logs for external analysis  Analysis: tracking of calls to qualify them with regard to occurrence over time Rule Application

Page 14 CHECKPHONE_PPT_131205_FR.ppt Stateful rules  Management of counters to determine the number of calls in progress with the same internal no. (transfers and conference calls)  Determination of an initial threshold with action  Determination of a second threshold with action  Management of counters to determine the number of calls in progress with the same external no.  Determination of an initial threshold with action  Determination of a second threshold with action  Management of a counter to determine the number of calls received during a specific period of time. (e.g.: war dialing, etc.)  Determination of an initial threshold with action  Determination of a second threshold with action  Automatic update of a list of external numbers based on a set of criteria (e.g.: SPAM)  The number of calls received from a given source  Frequency of calls received from a given source  The administrator may transfer this list to a green list or a black list Stateful Management

Page 15 CHECKPHONE_PPT_131205_FR.ppt Call History

Page 16 CHECKPHONE_PPT_131205_FR.ppt Real-time Calls

Page 17 CHECKPHONE_PPT_131205_FR.ppt Statistics Include V3 Screen

Page 18 CHECKPHONE_PPT_131205_FR.ppt ETSS® TDM Probe

Page 19 CHECKPHONE_PPT_131205_FR.ppt ETSS® Probes – Key Functions Probes operate on the IDS/IPS principle Inspection of all communications flows Communication management  IP Probe: Tagging, Disconnection  TDM Probe: Tagging, Disconnection,  High Impedance, By-Pass in stand-by mode Time/dating stamping of communication Media type identification:  IP Probe: Voice, Fax, Video, Data, Application  TDM Probe: Voice, Fax, Modem Identification of users:  IP IP and No. of source and destination ports, source and destination URIs  TDM Probe: Caller/Called No. Transmit real-time call events to the ETSS® Security module via a secured SSL link and allows for an optimum management solution.

Page 20 CHECKPHONE_PPT_131205_FR.ppt ETSS® System – TDM & IP Probe Specifications Technical Specifications ETSS® IP Probe  Spans: 3 ethernet 10/100  Server Specifications for IP Probe:  Operating System: OpenBSD 3.9  Processor: Pentium 4, 3GHz  Memory: HD - SATA 80 Gb, RAM - 2Gb  Power: 120/230Vac – 50/60 Hz  Protocols: SIP, vendor specific  Local Maintenance ports: USB, RS232 ETSS® TDM Probe  1U rack mountable  Spans:  2 PRI (E1/T1)  2 BRI  Power: 120/230Vac – 50/60 Hz  Redundant power supplies  Protocols: Euro ISDN  Maintenance: 2 ethernet 10/100  Local Maintenance: USB, RS232, VGA  Intrusion and power alarms Technical Specifications ETSS® IP Probe  Spans: 3 ethernet 10/100  Server Specifications for IP Probe:  Operating System: OpenBSD 3.9  Processor: Pentium 4, 3GHz  Memory: HD - SATA 80 Gb, RAM - 2Gb  Power: 120/230Vac – 50/60 Hz  Protocols: SIP, vendor specific  Local Maintenance ports: USB, RS232 ETSS® TDM Probe  1U rack mountable  Spans:  2 PRI (E1/T1)  2 BRI  Power: 120/230Vac – 50/60 Hz  Redundant power supplies  Protocols: Euro ISDN  Maintenance: 2 ethernet 10/100  Local Maintenance: USB, RS232, VGA  Intrusion and power alarms ETSS® TDM & IP Probes  Compliant with environment, safety and security standards  Centralized SW upgrades, downloadable from ETSS® Server. ETSS® TDM & IP Probes  Compliant with environment, safety and security standards  Centralized SW upgrades, downloadable from ETSS® Server.

Page 21 CHECKPHONE_PPT_131205_FR.ppt ETSS® Security Key Benefits Centralized management of security in the enterprise:  Centralized enterprise perimeter-wide views of security warnings  Centralized definition of enterprise perimeter-wide security policy rules  Centralized download of rules to probes, upload of logs from the probes Easy to use graphical user interface  Pull-down menus for defined profiles, Scroll bars, action buttons  Call Type Icons  Select/Deselect boxes Choice of operating modes  Block Mode: all calls not authorized by a specific rule are blocked  Authorization Mode: all calls not blocked by a specific rule are allowed Minimizes risk of disruptive security implementation with flexibility to monitor, tag and block calls. Enhanced SIP security management – Antifuzz profiler Automation of key security tool functions

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot ETSS® Expert Analyze, control, and secure your telephone applications

Page 23 CHECKPHONE_PPT_131205_FR.ppt ETSS® Expert The Administrator can: Upload PBX Configuration Generate/Delete Report: vulnerabilities, severity and countermeasures provided Automate imports and variance reports Define and Manage Application Parameters Overview Expert PBX  PBX “n” (per PBX Expert view)  Configuration  Variances  Reports Threats Severity Countermeasures  Automation  Manage Connectors Expert IP  Reports  Settings  Automation

Page 24 CHECKPHONE_PPT_131205_FR.ppt Expert PBX - Configuration

Page 25 CHECKPHONE_PPT_131205_FR.ppt Expert PBX – Configuration Difference

Page 26 CHECKPHONE_PPT_131205_FR.ppt Expert PBX - Reports

Page 27 CHECKPHONE_PPT_131205_FR.ppt Expert PBX - Automation

Page 28 CHECKPHONE_PPT_131205_FR.ppt Expert IP - Report

Page 29 CHECKPHONE_PPT_131205_FR.ppt Expert IP - Automation

Page 30 CHECKPHONE_PPT_131205_FR.ppt ETSS® Expert Key Benefits Centralized :  Centralized import of PBX configurations. Key industry PBX types supported.  Centralized view of Reports: threats, severity and countermeasures  Centralized history of PBX configurations & variances Easy to use graphical user interface  Scroll bars to explore lists  Tree based hierarchical views of the file system  Point and Click to select tree elements Automation  Uploads of configurations  Creation of threat reports Knowledge base of more than 3,000 vulnerabilities and more than 300 scenarios IP Security Scanner

Page 31 CHECKPHONE_PPT_131205_FR.ppt Probe Administration

Page 32 CHECKPHONE_PPT_131205_FR.ppt Real-time Monitoring

Page 33 CHECKPHONE_PPT_131205_FR.ppt System Events The administrator can: View logs of administrator actions View internal events (probe disconnects, etc.) The administrator can: View logs of administrator actions View internal events (probe disconnects, etc.)

Page 34 CHECKPHONE_PPT_131205_FR.ppt Users Administration

Page 35 CHECKPHONE_PPT_131205_FR.ppt ETSS® System – Specifications ETSS® Server Operating System: OpenBSD 3.9 Processor: Pentium 4, 3.0 GHz Memory: 80 GB HD, 2 Gb RAM Power: 120/230Vac – 50/60 Hz Ports: 1 ethernet 100 Mbps ETSS® Server Operating System: OpenBSD 3.9 Processor: Pentium 4, 3.0 GHz Memory: 80 GB HD, 2 Gb RAM Power: 120/230Vac – 50/60 Hz Ports: 1 ethernet 100 Mbps ETSS® Administration Station Operating System: Windows XP SP2 Processor: 3 GHz Memory: 1 Gb HD, 1 Gb RAM Power: 120/230Vac – 50/60 Hz ETSS® Administration Station Operating System: Windows XP SP2 Processor: 3 GHz Memory: 1 Gb HD, 1 Gb RAM Power: 120/230Vac – 50/60 Hz

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Version 3.0 Update

Page 37 CHECKPHONE_PPT_131205_FR.ppt What is new? FeaturesV2.1V3 Enhanced Architecture – Capacity, Enhanced SW Upgrade● Centralized Security Management – Multi-site●E IP and TDM Probes●E User Friendly GUI – Tree based data views, Point and Click, Pull down Menus, Lists ●E Enhanced GUI● Real-time Reports in data graphs: Configurations, Call Traffic, Probe Status ● System Activity Journal● Automation – Warnings, Reports●E PBX Virtual Management (PBX & IP PBX)● ETSS® Security●E ETSS® Expert●E Enhanced SIP security● Enhanced Reporting● E = Enhancements

Page 38 CHECKPHONE_PPT_131205_FR.ppt Architecture – Reliable Description  Still based on a secure OS : OpenBSD  SQL Database system  Multi job architecture  Enhanced Distributed architecture delivering automatic firmware upgrades Benefits  Improved capacity for large systems (up to 5 times faster)  Easier maintenance & upgrades  Reliability  Improvement of the application security  GUI independent architecture

Page 39 CHECKPHONE_PPT_131205_FR.ppt Centralized View & Element Status Description Multi- domain, single system Centralized Real-time data access Centralized tools: Security & Expert Centralized: Probes status, Call logs, SW Updates Centralized: Configurations, Variances System Event Journals Benefits Optimal use of resources: people, tools Seamless migration to VoIP Ease of Security management in an evolving/growing network Reduced response time

Page 40 CHECKPHONE_PPT_131205_FR.ppt IPBX Virtual Management (read/write privileges) Description :  Multi domain administration : split telephony infrastructure in different sub domains  Multiple administrators, with different administration rights for each sub domain Benefits:  Ability to handle complex infrastructures  Flexibility and adaptation with the existing organization of large customers  Splitting each task : Access Control List, Rules management, User management, Log review, Probe monitoring …  Ability to outsource specific tasks on a defined sub-domain. Site 1 RulesCorrespondents Site 2 RulesCorrespondents Admin A Admin B Admin C

Page 41 CHECKPHONE_PPT_131205_FR.ppt IPBX Virtual Management (read/write privileges)

Page 42 CHECKPHONE_PPT_131205_FR.ppt New SIP functionality Description :  Software probe acting as a network IPS  Compliancy project with OEM partnership  Advanced filtering on SIP protocol Benefits  Seamless migration from PSTN to VOIP system  Centralize telephony security management of multi-vendors & multi- technology systems during the migration phase.  Secure the new threats specific to the SIP protocol : (Flooding, Fuzzing, Spoofed messages, Network Denial of Service).

Page 43 CHECKPHONE_PPT_131205_FR.ppt Enhanced Reporting Benefits Description Text and graphical reports 24 hour rolling view  Call traffic  Call spread Last 5 calls, Last 5 system events IP Security Scanner Benefits Configurations/Variances at a glance Easy access to trends with graphical views Easy Access to recent call traffic and system events Improved IP security management reports detail  Anti-fuzz  IP Security Scans

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot ETSS® System Evolution Analyze, control, and secure your telephone applications

Page 45 CHECKPHONE_PPT_131205_FR.ppt ETSS® (Expert Telecom Security Solution®) Evolution 1.Short Term Deliver ETSS® V3 with: Mature GUI Enhanced Features Fully Commercialized Define New Market Requirements – North America and Western Europe V4/V5 Customer, Market and Technology Requirements and Implementation 2.Strategic Create “Best in Class” UI – Simplification Performance and Protection Improvements Complete the Tool Suite Product Integration – UTM/Call Managers Extend the Security Suite IM & Multimedia Small Business and Consumer Wireless

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Use Cases Analyze, control, and secure your telephone applications

Page 47 CHECKPHONE_PPT_131205_FR.ppt Finance Industry Retail banking business continuity not covered while migrating  Isolate and be protected against DoS attacks  Call centers are crucial and are not secured Investment Banking business integrity not covered while migrating  Against worms and intrusions  Against spy and fraudulent attacks Enforce Basel II compliance (traceability, due diligence, …)  Track changes and assess the security rules  Audit and Report against policies in place Return on Investment is critical  Centralized management  Automated processes  Alerting and forensics  Risk Management Security is an integral part of service continuity and media integrity. Need to address vulnerabilities in IP and «unique attributes » of voice.

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Checkphone Services Analyze, control, and secure your telephone applications

Page 49 CHECKPHONE_PPT_131205_FR.ppt Customer Migration Support Technical Support Service Delivery  Voice, hybrid, IP networks  Network migration support  PBX upgrade support  PBX migration support  7X24X365 customer support via channels and CheckPhone  Global trouble call resolution system  Security architecture and installation  Audit service delivery  Software upgrades  Documentation & training Customer Service & Support

Page 50 CHECKPHONE_PPT_131205_FR.ppt Services is a key early Revenue & Technology enabler Services Strategy Consultin g Assessme nt & Audit Specialized VoIP tools Open Source Tools & Commercial Tools Compliance Plus VoIP Security Deployment VoIP Managed Security VoIP Security KB +

Page 51 CHECKPHONE_PPT_131205_FR.ppt Key Benefits CheckPhone meets voice security needs in the enterprise:  Real-time monitoring and localized protection against security breaches in the voice network  Seamless integration into the existing network infrastructure and migration to VoIP  Optimal use of security resources with centralization of security management  Advanced vulnerability audit and reporting on PBX configuration  Ease of use  Effective voice security technology CheckPhone addresses major security threats in the voice network  Integrity  Eavesdropping  Interception and modification  Service abuse  Denial of service CheckPhone a trust worthy Security Solution supplier  300+ years of Security, IP and telephony experience  Proven track record for products and services – a note worthy customer base  A future proof approach – Open Source OS and SQL Database, video and voice security, “.Net” connectivity

CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Thank You Analyze, control, and secure your telephone applications