VoIP Privacy April 2007. ©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 2 About BroadSoft Market Leader Market.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
Hosted PBX And VoIP Phone Systems LOGICAL Alternatives to Traditional PBXs ELLEGENT SYSTEMS, Inc.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
SIP Trunking and the SMB Jason Walker Cbeyond. Cbeyond Solution Productivity Enhancing Applications for Entrepreneurial Business –Voice & Broadband –Mobile.
© 2006 Solegy LLC Internal Use Only Getting Connected with SIP Encryption _______________________________ By Eric Hernaez Solegy LLC May 16, 2007.
1 VOIP Network Threats Let the subscribers beware Gerard Wilkes October 24, 2006.
Web server security Dr Jim Briggs WEBP security1.
Steven J. Johnson President, Ingate Systems Inc. Enabling Trusted Unified Communications.
Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.
Enabling SIP to the Enterprise Steven Johnson, Ingate Systems.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
VoIP - Abridged - Stephen R. Nelson November 11,
January 23-26, 2007 Ft. Lauderdale, Florida Integrating Your IP PBX with an ITSP Leveraging SIP Trunking for Broadband Services John Blasko Vice President.
Is VoIP Dead? Where Does it Stand? James Rafferty Product Line Director, Dialogic September 3, 2009.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Peering, network sharing, interconnects Eckart Zollner September 2014.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
Presenters :Deepak Yadav Voice Over Internet Protocol.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Hosted Communications and Services David Byrd Chief Marketing Officer.
1 BBTelsys and Secure SIP Calling Providing Solutions that Work in the Real World.
1 © 2002, Cisco Systems, Inc. All rights reserved. H.323 Voice Market H.323-Forum, November 2002, New York, USA H.323 Voice Market Haluk Keskiner Cisco.
1 The Next Step In IP Telephony: Hosted PBX Services Scott Wharton, Vice President of Marketing.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Voice over IP Are we there yet ? Presented by: Mark Caswell, Empire Technologies, LLC. Voice over IP.
1 © 2008 Avaya Inc. All rights reserved. Enterprise Infrastructure Anne L Coulombe Global Unified Communications Solutions September.
August 2004 Developing Hosted IP PBX Applications Bob Minai.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
2004 APPA Community Broadband Conference Emerging Technologies: Voice Over IP October 11, 2004 Tim Hoolihan V.P. Marketing and Product Management (949)
IP Telephony
David Byrd VP Marketing and Product Management January 23, 2007 David Byrd VP Marketing and Product Management January 23, 2007 Assessing SIP Trunking.
October 10-13, 2006 San Diego Convention Center, San Diego California SIP Trunking… Why is it so important?
 Introduction – Consumer Market  Benefits – Operational Cost & Flexibility  Challenges – Quality of Service & Securing VOIP  Legal Issuers  Risk.
ISSA June 2005 Luncheon Are You Ready for VOIP? Tim McCreight – CISSP CPP ARC Business Solutions Inc.
Jan 24, 06William Rich, Pingtel Corp. IT Expo. Pingtel Corp., William Rich, IT Expo, Jan 24, 06 VoIP is Here… Source: IDC IP PBX vs. TDM PBX.
Internet telephony
Topic 5: Basic Security.
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
VoIP -Voice over Internet Protocol COE 341 Self-Learning Assignment By: Ayman Al-Bassam Amar Farouk Merah
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Ericsson IMS CANTO 2005, St. Kitts Antonio Gómez Business Unit Systems.
1 © 2006 Nokia Fixed Mobile Convergence The future of communication networks János Kurtz 11/05/2006.
Enabling Converged Services Changing the Way the World Communicates Jim Dondero Vice-President Global Solutions Marketing CANTO, June 21st.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
Solutions for Unified Enterprise IP Communication Steven J. Johnson President, Ingate Systems Inc.
Next Generation Switching Solutions Explored
Communication Methods
Introduction Steven Johnson President Ingate Systems Inc.
1 Session Controllers Micaela Giuhat AVP Product Management Netrake
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
SIP’s Role In Open Source Al Brisard, Vice President, Marketing Pingtel.
Session Initiation Protocol
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
The study and demonstration on SIP security vulnerabilities
Voice over Internet Protocol for Small & Medium Sized Companies
Don Troshynski Technical Director
Welcome.
Helping to Achieve ROI Targets with SIP Trunking
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Voice over Internet Protocol Market worth $55bn by 2025.
Presentation transcript:

VoIP Privacy April 2007

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 2 About BroadSoft Market Leader Market Leader VoIP Application Software Partner of Choice Partner of Choice Founded in 1998 Commercially Deployed 5+ years Profitable 250+ Fixed & Mobile Service Providers 7 of top 10 (and 13 of the top 25) global carriers Leading IMS Vendors E.g., Ericsson, Lucent 5 of top 6 TEMs OEM BroadWorks Hosted PBX / IP Centrex Bus. Trunking Residential Broadband Mobile PBX Voice and Multimedia Most Deployments Most Deployments

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 3 7 of top 10 and 13 of top 25 global carriers Leading Global Customer Base

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 4 What is VoIP? Consumer –Voice Over the Internet Vonage, Skype etc Business –IP based PBX systems –IP Centrex Systems Switching occurs in the service provider network Internet IP Network

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 5 Significant Global VoIP Subscriber Growth Source: Ovum & Infonetics, 2006

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 6 Current VoIP Privacy Issues Normal Data Attacks –DoS Attacks on data networks brings down all applications including data –Open source PBX’s have known buffer vulnerabilities SIP Vulnerabilities –Registration hijacking –Message tampering –Session tear-down –VoIP targeted DoS attack

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 7 Current VoIP Privacy Issues SPIT (Span over Internet Telephony) –Imagine your voice mail being filled up with Viagra adverts? –Huge potential for issues –Not many real world instances Vishing – Phishing using telephony –VoIP lowers the cost of Vishing –Small scale today –Already attacks on Paypal

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 8 Current VoIP Privacy Issues VoIP Hacking –One instance of brute force hacking in 2006 –$1M fraud: Offender behind bars Eavesdropping –Man in the middle attacks –Similar techniques already in place by security services for Lawful Intercept

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 9 And Lastly……Stealing Minutes Phreakers –Phreakers break into gateways to steal minutes –200M mins/month stolen worth an estimated $26M/month* –Transport networks now moving to private connectivity to avoid Phreakers * Source Stealth Communications

©2007 BroadSoft®, Inc. Proprietary and Confidential; Do Not Copy, Duplicate, or Distribute 10 Current State of Play All the afore mentioned problems have either been solved or are close to being solved by session boarder controllers –Also addressed in IMS Service providers are implementing or have implemented security systems Businesses building their own VoIP networks will have to be extremely careful about implementation