Security Challenges in the Enterprise. January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 2 Panelists Franchesca Walker,

Slides:



Advertisements
Similar presentations
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Advertisements

The leader in session border control for trusted, first class interactive communications.
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
CANTO – 2006 Information Security and Voice over IP (VoIP) Robert Potvin, CISSP VP - Strategic Consulting June 21st, 2006.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
1 © 2004, Cisco Systems, Inc. All rights reserved IP Telephony Security Cisco Systems.
Securing Unified Communications Mor Hezi VP Unified Communications AudioCodes.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
September 19, 2006speermint interim1 VoIP Threats and Attacks Alan Johnston.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Firewalls and Intrusion Detection Systems
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World
SECURE CLOUD-READY DATA CENTERS AppSecure development IDC IT Security conference – 2011 Budapest.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
VoIP Security Sanjay Kalra Juniper Networks September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 VoIP Issues.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Common Misconceptions Alan D. Percy Director of Market Development The Truth of Enterprise SIP Security.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
October 10-13, 2006 San Diego Convention Center, San Diego California Taking IP Security to the Next Level Real-time threat mitigation.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
FIREWALL Mạng máy tính nâng cao-V1.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
VoIP Security Best Practices Bogdan Materna CTO & VP Engineering VoIPshield Systems Session: U /02/2009.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Securing Wired Local Area Networks(LANs)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Finding the Right Tool For The Job Network Management: Peter Charland Senior Manager, Product Marketing
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Chapter 6: Securing the Local Area Network
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
Intelligent Interconnects in the VoIP Peering Environment John Longo VP Product Marketing & Management, NextPoint.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Track A: Network Security 9AM-10AM May 6, 2004 Security And Next Generation VoIP George G. McBride Senior Manager, Security Practice Lucent Technologies.
IS3220 Information Technology Infrastructure Security
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
March 2009 Sipera Overview. 2 © 2009 Sipera Systems, Inc. All Rights Reserved. About Sipera  Leader in real-time Unified Communications (UC) security.
Fortinet VoIP Security June 2007 Carl Windsor.
Security in Networking
Ingate & Dialogic Technical Presentation
Presentation transcript:

Security Challenges in the Enterprise

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 2 Panelists Franchesca Walker, Director Enterprise Solutions Foundry Networks Eric Winsborrow, CMO Sipera Systems Shrikant Latkar, Sr. Mgr. Solutions Marketing Juniper Networks Mark Ricca, Sr. Analyst and Founding Partner IntelliCom Analytics

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 3 Security: Continued Strong Growth Integrated Security Solutions Forecast (Global, All Size Businesses) $0 $1.0 $2.0 $3.0 $4.0 $5.0 $ $B 9.2% CAGR Overall 10.7% CAGR Remote / SoHo

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 4 Security Challenges in the Enterprise Franchesca Walker, Marketing Director of Enterprise Solutions Foundry Networks, Inc

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA Many Malicious Attack Vectors & Vulnerabilities at each Layer ARP Poisoning MAC Flood AttackPort DoS AttackRogue Wireless AP ICMP Flood Attack TCP Syn Flood Attack SQL Slammer Worm SoBig Worm Malissa VirusSasser Worm Deep Throat MyDoom Worm CodeRed WormNimba Virus & Worm ICMP Smurf Attack False Route Injection BGP TTL Security Hole TCP TTL Attack TCP Timestamp Attack Rogue DHCP & DNS VLAN Flood Attack SPAM SIP DoS Attack Port Scan IP Port Scan TCP Ack Flood Attack Malicious TCP Packets CPU Rate Attack Datalink Layer Attacks Network Layer Attacks p2p Traffic Transport Layer Attacks Application Attacks CAM Table Overflow Attack VLAN Hopping Private VLAN Attack DHCP Starvation VIRUSESWORMS TROJANS UDP/TCP PROTOCOL ATTACKS ROGUE SERVICESUDP/TCP DOS ATTACKS ROUTING PROTOCOL ATTACKS NETWORK SERVICE ATTACKS L2 DOS ATTACKS L2 SERVICE ATTACKSL2 ROGUE SERVICES L3 DOS ATTACKS

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA Converged Voice & Data Security Network Switches, Routers, & Access Points Call Manager App & Web Servers NMS Zero-Day Anomaly IDSSignature IDS Traffic Samples (sFlow) Threat Control Radius, DNS, DHCP Multiple endpoints IEEE 802.1x + MAC Authentication Traffic Samples (sFlow) Access Policy Integrated Switch and AP Security Features DoS attack protection CPU protection Rate limiting Hardware-based ACLs DHCP, ARP, IP spoof protection Rogue AP detection & suppression Access policy enforcement Threat control enforcement Embedded sFlow traffic monitoring sFlow-based Anomaly + Signature Defense Closed Loop Security Open Source Applications

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA Convergence Network Security Allow only authorized users on the network –Authentication based on IEEE 802.1x, MAC address Control who has access to specific resources –802.1q VLANs Stop unauthorized traffic without impacting network performance –ASIC based, wire-speed ACLs Protect against security threats and DoS attacks –Network-wide monitoring (e.g. sFlow) –Threat detection and mitigation Rate limiting of known packet types Closed-loop mitigation using centralized IDS equipment and applications

Enterprise VoIP Security Challenges Eric Winsborrow, CMO Sipera Systems

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 9 Risk Management approach to Security Lower Risk Profile and Prioritization Optimum Prioritization Point of Diminishing Returns Security Priority and Spending Threat Potential VoIP 1.0 (closed) Risk Profile VoIP 2.0 (open) Risk Profile

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 10 IP PBX Voice/Data Center(s) The Need to Extend VoIP WAN/VISP Internet PSTN VISP Mobile worker Headquarters Remote worker Branch(es) Soft phones SIP Trunk

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 11 IP PBX Voice/Data Center(s) Extending VoIP - Challenges WAN/VISP Internet PSTN VISP Mobile worker Headquarters Remote worker Branch(es) Soft phones SIP Trunk Opening wide range of IP/UDP ports violates security policy Confidentiality/Privacy of signaling & media Strong authentication of device & user Policy enforcement & access control Phone configuration & management Spammer Hacker Rogue Device Rogue Employee Infected PC Protect IP PBX & phones Refresh UDP pinhole in remote/home firewall

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 12 Risk Management approach to VoIP/UC Establish POLICY Establish POLICY Assess RISK Assess RISK Implement PROTECTION Implement PROTECTION Manage COMPLIANCE Manage COMPLIANCE ACCESS Secure Access Strong User authentication Call Admission Control Firewall/NAT traversal Privacy and Encryption Secure firewall channel Sipera VIPER Labs Vulnerability Research Threat signature development LAVA Tools Sipera VIPER Consulting VoIP/UC vulnerability assessment Best practices consultation Security workshops Comprehensive Protection for real-time communications DoS/Floods prevention Fuzzing prevention Anomaly detection/Zero-Day attacks Stealth attacks Spoofing prevention Reconnaissance prevention VoIP Spam Policy Compliance Call routing policies Whitelists/Blacklists Fine-Grained Policies by User, Device, Network, ToD Application controls IM logging and content filtering Compliance reporting

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 13 Conclusion Benefits of Unified Communications increase if VoIP network is extended But an enterprise needs to solve many issues –Privacy and authentication; firewall/NAT traversal; policy enforcement; VoIP application layer threats A Security Risk Management approach is needed –Elevate VoIP/UC in priority if using SIP or extending VoIP –Engage experts for best practices and risk evaluation –Create policies and protection specific to VoIP/UC

VoIP Security IT Expo East 2008 Shrikant Latkar

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 15 Concerns when Deploying VoIP Concerns about security Systems for managing and troubleshooting VoIP quality Concerns about interoperability between vendor’s equipment Not enough people to plan, design, implement, and manage VoIP Lack of budget Source: 2005/2006 VoIP State of the Market Report, Produced by Webtorials Percentage

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 16 Securing Voice is Critical

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 17 Evolving SIP Security Exploits will become more “creative” - Newer exploits are at Layer 7 Current security doesn’t address all attacks –SBCs cannot defend against many SIP vulnerabilities as the attack levels scale/grow Smartest Attacks Most Attacks Smarter Attacks Router Filters IP Spoof Detection DOS Filters Stateful Firewall Protocol ALG Application Aware Intrusion Prevention Need to evolve security to be scalable and more attack aware Customized attack defenses – specific foryour environment Rapid time between exploit found anddefense deployed Able to handle high volumes of attackingpackets

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 18 Protocols: SIP, H323 (RAS, Q931, H245), MGCP, Skinny Protocols: SIP, H323 (RAS, Q931, H245), MGCP, Skinny Identification: done by L4 port number (static) Identification: done by L4 port number (static) Functions: NAT, State checks, pinhole, anomalies, drop malformed packets Functions: NAT, State checks, pinhole, anomalies, drop malformed packets VoIP session correlation (beyond L3/L4) VoIP session correlation (beyond L3/L4) Application Screening: Flood attacks Application Screening: Flood attacks Coarser control: enable/disable all checks Coarser control: enable/disable all checks Protocols: SIP, H225RAS, H225SGN, MGCP Protocols: SIP, H225RAS, H225SGN, MGCP Identification: based on application data (PIAI) Identification: based on application data (PIAI) Functions: Protocol State, anomalies (more than FW checks); SIP sigs > 50 Functions: Protocol State, anomalies (more than FW checks); SIP sigs > 50 Custom signatures can be done Custom signatures can be done Logging (provides visibility) Logging (provides visibility) Flexibility in enabling signatures driven by policy Flexibility in enabling signatures driven by policy IPS/IDP Firewall

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 19 Defense Against VoIP Security Threats VoIP Security ThreatRamificationsDefense Technology Unauthorized access to PBX or voice mail system All voice communications fail FW with SIP attack protection IPS with SIP sigs/protocol anom DoS attack on PBX, IP Phone or gateway Hacker listens to voice mails, accesses call logs, company directories, etc. Zones, ALGs, policy-based access control Toll fraud Hacker utilizes PBX for long-distance calling, increasing costs VPNs, encryption (IPSec or other) Eavesdropping or man-in-the-middle attack Voice conversations unknowingly intercepted and altered Worms/trojans/viruses on IP phones, PBX Infected PBX and/or phones rendered useless, spread problems throughout network Policy based access control IPS with SIP protocol anomaly and stateful signatures IP phone spam Lost productivity and annoyance FW/ALGs, SIP attack prevention, SIP source IP limitations, UDP Flood Protection

January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA 20 Additional VoIP resources available at Q & A