Download presentation
Presentation is loading. Please wait.
Published byTerence O’Neal’ Modified over 9 years ago
1
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Product & Services Overview Analyze, control, and secure your telephone applications September 2006
2
Page 2 CHECKPHONE_PPT_131205_FR.ppt Agenda CheckPhone’s Solution CheckPhone’s Approach ETSS® System ETSS® GUI ETSS® Security Management System Probes ETSS® Expert ETSS® Tools ETSS® V3 ETSS® System Evolution Use Cases CheckPhone’s Services Customer Service & Support Services Strategy Benefits Summary
3
Page 3 CHECKPHONE_PPT_131205_FR.ppt Prevent & Detect: Centralized security policy definition and management Real-time application of the security policy (disconnection of unauthorized communication) Measure & Report: Automatic imports of PBX configuration Assessments of risks and severity Determination of countermeasures Centralized view of risk reports Detection alerts on vulnerabilities Track & Analyze: Logs and Configuration tracking. Analysis enabled by the robust data visualization tool Prevent & Detect: Centralized security policy definition and management Real-time application of the security policy (disconnection of unauthorized communication) Measure & Report: Automatic imports of PBX configuration Assessments of risks and severity Determination of countermeasures Centralized view of risk reports Detection alerts on vulnerabilities Track & Analyze: Logs and Configuration tracking. Analysis enabled by the robust data visualization tool Management of security rules Definition of the security policy ETSS® IP/TDM Probe Drop unauthorized communication PREVENT & DETECTMEASURE & REPORT Configuration imports Centralization of configuration data Vulnerability reports Threats, Severity & Countermeasures ETSS® System CheckPhone’s Approach Architecture: Distributed (redundant and autonomous probes) Multi-technology (TDM, Hybrid, Full IP) Multi-protocol (SIP,ISDN, vendor specific) Multi-platform (major equipment manufacturers) Architecture: Distributed (redundant and autonomous probes) Multi-technology (TDM, Hybrid, Full IP) Multi-protocol (SIP,ISDN, vendor specific) Multi-platform (major equipment manufacturers) TRACK & ANALYZE Configuration and Logs History Configuration, Call flows & Probe status Analysis Variance assessments, Custom Views
4
Page 4 CHECKPHONE_PPT_131205_FR.ppt CheckPhone’s Solution Expert Telecom Security System® (ETSS®) ETSS® Security ETSS® Security Manager enables the creation of rules, management of profiles and display of warnings. Together with the ETSS® probes they enable the implementation of security policy in the enterprise. Access to historical archives of call logs allows access to vital call detail information. IP and TDM Probes that monitor and analyze traffic in real time and apply rules as defined using the ETSS® Security application ETSS® Expert imports configuration from PBXs provides on demand vulnerability assessments and alerts. A historical archive of imports and the ability to identify variances on PBX configuration is available. Expert Telecom Security System® (ETSS®) ETSS® Security ETSS® Security Manager enables the creation of rules, management of profiles and display of warnings. Together with the ETSS® probes they enable the implementation of security policy in the enterprise. Access to historical archives of call logs allows access to vital call detail information. IP and TDM Probes that monitor and analyze traffic in real time and apply rules as defined using the ETSS® Security application ETSS® Expert imports configuration from PBXs provides on demand vulnerability assessments and alerts. A historical archive of imports and the ability to identify variances on PBX configuration is available. CheckPhone’s Security Professional Services Security Services VoIP Security Consulting Service Strategy/Policy/Architecture Assessments & Audits Customer defined Implementation & Support Vulnerability Assessments Penetration Assessments War Dialing Compliance Service Regulatory Legal Standards Managed Service 24x5, 24X7 Demand Based (Daily, Weekly, Monthly, etc.) Certifications CISSP DCSSI- France’s National Defense Certification (in progress) CheckPhone’s Security Professional Services Security Services VoIP Security Consulting Service Strategy/Policy/Architecture Assessments & Audits Customer defined Implementation & Support Vulnerability Assessments Penetration Assessments War Dialing Compliance Service Regulatory Legal Standards Managed Service 24x5, 24X7 Demand Based (Daily, Weekly, Monthly, etc.) Certifications CISSP DCSSI- France’s National Defense Certification (in progress)
5
Page 5 CHECKPHONE_PPT_131205_FR.ppt ISDN Full IP Telephony TDM Telephony Telecom Cabinet Call Server Proxy IP Phones ETSS® IP Probe Legacy Phones Fax ISDN IP Hybrid telephony ETSS® Suite IPABX administration desk Printer ETSS® IP Probe ETSS®TDM Probe ETSS® IP Probe ETSS® TDM Probe IP Phones CheckPhone’s Voice Security in Enterprise Networks PBX Legacy Phones PABX administration desk Telecom Cabinet Fax Switch / Router
6
Page 6 CHECKPHONE_PPT_131205_FR.ppt Data vs Multimedia – Fundamental Differences Data Client Server Architecture Non-Real Time Communication Not Synchronized Voice Features Not applicable Service Level Agreements Market Expected Availability Best efforts Network points of vulnerability Traditional Multimedia Peer to Peer Architecture Real Time Communication Synchronized Voice Features – new vulnerabilities Call ID, call forward, voice-mail, three-way calling Stringent QoS Market Expected Availability 99.999 % Network points of vulnerability New technologies: IP, advanced wireless New elements: telephone handsets, conferencing units, call processors/controllers, media gateways
7
Page 7 CHECKPHONE_PPT_131205_FR.ppt ETSS® System – Leading Edge Technology OpenBSD Operating System Free, Open source & open documentation Security: built-in cryptography and PF Firewall suite SQL Database Open Source, Easy to Use Adopted standard by ANSI & ISO “.Net” Real-time Client Best class GUI Real time view IDS/IPS Security Principles Real-time localized detection Low false alarms Enterprise wide prevention IDS/IPS Security Principles Real-time localized detection Low false alarms Enterprise wide prevention
8
Page 8 CHECKPHONE_PPT_131205_FR.ppt ETSS® System Graphical User Interface (GUI)
9
Page 9 CHECKPHONE_PPT_131205_FR.ppt User Interface Benefits Description Utilities Window, Point and Click, Intuitive Icons Pull Down menus, predefined lists Enhanced Administrator rights management Password based Login, Auto disconnect Graphical view of call traffic data Telescoping views Multi-domain Benefits Easy to use Real-time security related call traffic graphs Multiple sites in a single screen Easy access to data and tools Secure access to ETSS® System: Customized administrator rights profile Login Password Auto-disconnect
10
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot ETSS® Security Analyze, control, and secure your telephone applications
11
Page 11 CHECKPHONE_PPT_131205_FR.ppt ETSS® Security Key Administrator capabilities: Add/Delete Rules Manage Settings View Warnings, call history, real time calls Antifuzz profiles Automate email alerts Overview Security Policy Rule definition Rule filters Implement button Settings Lists Automation Schedules Actions Antifuzz protection Real-time Calls 24 hours rolling, by call type view Last 5 calls History Calls Statistics
12
Page 12 CHECKPHONE_PPT_131205_FR.ppt Security Policy
13
Page 13 CHECKPHONE_PPT_131205_FR.ppt ACTIONS Each rule entails an action, either directly or after a settable timeout Ban: disconnection of the communication or temporary banishment Authorization Special tagging that flags these calls within the logs for external analysis Analysis: tracking of calls to qualify them with regard to occurrence over time Rule Application
14
Page 14 CHECKPHONE_PPT_131205_FR.ppt Stateful rules Management of counters to determine the number of calls in progress with the same internal no. (transfers and conference calls) Determination of an initial threshold with action Determination of a second threshold with action Management of counters to determine the number of calls in progress with the same external no. Determination of an initial threshold with action Determination of a second threshold with action Management of a counter to determine the number of calls received during a specific period of time. (e.g.: war dialing, etc.) Determination of an initial threshold with action Determination of a second threshold with action Automatic update of a list of external numbers based on a set of criteria (e.g.: SPAM) The number of calls received from a given source Frequency of calls received from a given source The administrator may transfer this list to a green list or a black list Stateful Management
15
Page 15 CHECKPHONE_PPT_131205_FR.ppt Call History
16
Page 16 CHECKPHONE_PPT_131205_FR.ppt Real-time Calls
17
Page 17 CHECKPHONE_PPT_131205_FR.ppt Statistics Include V3 Screen
18
Page 18 CHECKPHONE_PPT_131205_FR.ppt ETSS® TDM Probe
19
Page 19 CHECKPHONE_PPT_131205_FR.ppt ETSS® Probes – Key Functions Probes operate on the IDS/IPS principle Inspection of all communications flows Communication management IP Probe: Tagging, Disconnection TDM Probe: Tagging, Disconnection, High Impedance, By-Pass in stand-by mode Time/dating stamping of communication Media type identification: IP Probe: Voice, Fax, Video, Data, Application TDM Probe: Voice, Fax, Modem Identification of users: IP Probe: @ IP and No. of source and destination ports, source and destination URIs TDM Probe: Caller/Called No. Transmit real-time call events to the ETSS® Security module via a secured SSL link and allows for an optimum management solution.
20
Page 20 CHECKPHONE_PPT_131205_FR.ppt ETSS® System – TDM & IP Probe Specifications Technical Specifications ETSS® IP Probe Spans: 3 ethernet 10/100 Server Specifications for IP Probe: Operating System: OpenBSD 3.9 Processor: Pentium 4, 3GHz Memory: HD - SATA 80 Gb, RAM - 2Gb Power: 120/230Vac – 50/60 Hz Protocols: SIP, vendor specific Local Maintenance ports: USB, RS232 ETSS® TDM Probe 1U rack mountable Spans: 2 PRI (E1/T1) 2 BRI Power: 120/230Vac – 50/60 Hz Redundant power supplies Protocols: Euro ISDN Maintenance: 2 ethernet 10/100 Local Maintenance: USB, RS232, VGA Intrusion and power alarms Technical Specifications ETSS® IP Probe Spans: 3 ethernet 10/100 Server Specifications for IP Probe: Operating System: OpenBSD 3.9 Processor: Pentium 4, 3GHz Memory: HD - SATA 80 Gb, RAM - 2Gb Power: 120/230Vac – 50/60 Hz Protocols: SIP, vendor specific Local Maintenance ports: USB, RS232 ETSS® TDM Probe 1U rack mountable Spans: 2 PRI (E1/T1) 2 BRI Power: 120/230Vac – 50/60 Hz Redundant power supplies Protocols: Euro ISDN Maintenance: 2 ethernet 10/100 Local Maintenance: USB, RS232, VGA Intrusion and power alarms ETSS® TDM & IP Probes Compliant with environment, safety and security standards Centralized SW upgrades, downloadable from ETSS® Server. ETSS® TDM & IP Probes Compliant with environment, safety and security standards Centralized SW upgrades, downloadable from ETSS® Server.
21
Page 21 CHECKPHONE_PPT_131205_FR.ppt ETSS® Security Key Benefits Centralized management of security in the enterprise: Centralized enterprise perimeter-wide views of security warnings Centralized definition of enterprise perimeter-wide security policy rules Centralized download of rules to probes, upload of logs from the probes Easy to use graphical user interface Pull-down menus for defined profiles, Scroll bars, action buttons Call Type Icons Select/Deselect boxes Choice of operating modes Block Mode: all calls not authorized by a specific rule are blocked Authorization Mode: all calls not blocked by a specific rule are allowed Minimizes risk of disruptive security implementation with flexibility to monitor, tag and block calls. Enhanced SIP security management – Antifuzz profiler Automation of key security tool functions
22
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot ETSS® Expert Analyze, control, and secure your telephone applications
23
Page 23 CHECKPHONE_PPT_131205_FR.ppt ETSS® Expert The Administrator can: Upload PBX Configuration Generate/Delete Report: vulnerabilities, severity and countermeasures provided Automate imports and variance reports Define and Manage Application Parameters Overview Expert PBX PBX “n” (per PBX Expert view) Configuration Variances Reports Threats Severity Countermeasures Automation Manage Connectors Expert IP Reports Settings Automation
24
Page 24 CHECKPHONE_PPT_131205_FR.ppt Expert PBX - Configuration
25
Page 25 CHECKPHONE_PPT_131205_FR.ppt Expert PBX – Configuration Difference
26
Page 26 CHECKPHONE_PPT_131205_FR.ppt Expert PBX - Reports
27
Page 27 CHECKPHONE_PPT_131205_FR.ppt Expert PBX - Automation
28
Page 28 CHECKPHONE_PPT_131205_FR.ppt Expert IP - Report
29
Page 29 CHECKPHONE_PPT_131205_FR.ppt Expert IP - Automation
30
Page 30 CHECKPHONE_PPT_131205_FR.ppt ETSS® Expert Key Benefits Centralized : Centralized import of PBX configurations. Key industry PBX types supported. Centralized view of Reports: threats, severity and countermeasures Centralized history of PBX configurations & variances Easy to use graphical user interface Scroll bars to explore lists Tree based hierarchical views of the file system Point and Click to select tree elements Automation Uploads of configurations Creation of threat reports Knowledge base of more than 3,000 vulnerabilities and more than 300 scenarios IP Security Scanner
31
Page 31 CHECKPHONE_PPT_131205_FR.ppt Probe Administration
32
Page 32 CHECKPHONE_PPT_131205_FR.ppt Real-time Monitoring
33
Page 33 CHECKPHONE_PPT_131205_FR.ppt System Events The administrator can: View logs of administrator actions View internal events (probe disconnects, etc.) The administrator can: View logs of administrator actions View internal events (probe disconnects, etc.)
34
Page 34 CHECKPHONE_PPT_131205_FR.ppt Users Administration
35
Page 35 CHECKPHONE_PPT_131205_FR.ppt ETSS® System – Specifications ETSS® Server Operating System: OpenBSD 3.9 Processor: Pentium 4, 3.0 GHz Memory: 80 GB HD, 2 Gb RAM Power: 120/230Vac – 50/60 Hz Ports: 1 ethernet 100 Mbps ETSS® Server Operating System: OpenBSD 3.9 Processor: Pentium 4, 3.0 GHz Memory: 80 GB HD, 2 Gb RAM Power: 120/230Vac – 50/60 Hz Ports: 1 ethernet 100 Mbps ETSS® Administration Station Operating System: Windows XP SP2 Processor: 3 GHz Memory: 1 Gb HD, 1 Gb RAM Power: 120/230Vac – 50/60 Hz ETSS® Administration Station Operating System: Windows XP SP2 Processor: 3 GHz Memory: 1 Gb HD, 1 Gb RAM Power: 120/230Vac – 50/60 Hz
36
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Version 3.0 Update
37
Page 37 CHECKPHONE_PPT_131205_FR.ppt What is new? FeaturesV2.1V3 Enhanced Architecture – Capacity, Enhanced SW Upgrade● Centralized Security Management – Multi-site●E IP and TDM Probes●E User Friendly GUI – Tree based data views, Point and Click, Pull down Menus, Lists ●E Enhanced GUI● Real-time Reports in data graphs: Configurations, Call Traffic, Probe Status ● System Activity Journal● Automation – Warnings, Reports●E PBX Virtual Management (PBX & IP PBX)● ETSS® Security●E ETSS® Expert●E Enhanced SIP security● Enhanced Reporting● E = Enhancements
38
Page 38 CHECKPHONE_PPT_131205_FR.ppt Architecture – Reliable Description Still based on a secure OS : OpenBSD SQL Database system Multi job architecture Enhanced Distributed architecture delivering automatic firmware upgrades Benefits Improved capacity for large systems (up to 5 times faster) Easier maintenance & upgrades Reliability Improvement of the application security GUI independent architecture
39
Page 39 CHECKPHONE_PPT_131205_FR.ppt Centralized View & Element Status Description Multi- domain, single system Centralized Real-time data access Centralized tools: Security & Expert Centralized: Probes status, Call logs, SW Updates Centralized: Configurations, Variances System Event Journals Benefits Optimal use of resources: people, tools Seamless migration to VoIP Ease of Security management in an evolving/growing network Reduced response time
40
Page 40 CHECKPHONE_PPT_131205_FR.ppt IPBX Virtual Management (read/write privileges) Description : Multi domain administration : split telephony infrastructure in different sub domains Multiple administrators, with different administration rights for each sub domain Benefits: Ability to handle complex infrastructures Flexibility and adaptation with the existing organization of large customers Splitting each task : Access Control List, Rules management, User management, Log review, Probe monitoring … Ability to outsource specific tasks on a defined sub-domain. Site 1 RulesCorrespondents Site 2 RulesCorrespondents Admin A Admin B Admin C
41
Page 41 CHECKPHONE_PPT_131205_FR.ppt IPBX Virtual Management (read/write privileges)
42
Page 42 CHECKPHONE_PPT_131205_FR.ppt New SIP functionality Description : Software probe acting as a network IPS Compliancy project with OEM partnership Advanced filtering on SIP protocol Benefits Seamless migration from PSTN to VOIP system Centralize telephony security management of multi-vendors & multi- technology systems during the migration phase. Secure the new threats specific to the SIP protocol : (Flooding, Fuzzing, Spoofed messages, Network Denial of Service).
43
Page 43 CHECKPHONE_PPT_131205_FR.ppt Enhanced Reporting Benefits Description Text and graphical reports 24 hour rolling view Call traffic Call spread Last 5 calls, Last 5 system events IP Security Scanner Benefits Configurations/Variances at a glance Easy access to trends with graphical views Easy Access to recent call traffic and system events Improved IP security management reports detail Anti-fuzz IP Security Scans
44
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot ETSS® System Evolution Analyze, control, and secure your telephone applications
45
Page 45 CHECKPHONE_PPT_131205_FR.ppt ETSS® (Expert Telecom Security Solution®) Evolution 1.Short Term Deliver ETSS® V3 with: Mature GUI Enhanced Features Fully Commercialized Define New Market Requirements – North America and Western Europe V4/V5 Customer, Market and Technology Requirements and Implementation 2.Strategic Create “Best in Class” UI – Simplification Performance and Protection Improvements Complete the Tool Suite Product Integration – UTM/Call Managers Extend the Security Suite IM & Multimedia Small Business and Consumer Wireless
46
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Use Cases Analyze, control, and secure your telephone applications
47
Page 47 CHECKPHONE_PPT_131205_FR.ppt Finance Industry Retail banking business continuity not covered while migrating Isolate and be protected against DoS attacks Call centers are crucial and are not secured Investment Banking business integrity not covered while migrating Against worms and intrusions Against spy and fraudulent attacks Enforce Basel II compliance (traceability, due diligence, …) Track changes and assess the security rules Audit and Report against policies in place Return on Investment is critical Centralized management Automated processes Alerting and forensics Risk Management Security is an integral part of service continuity and media integrity. Need to address vulnerabilities in IP and «unique attributes » of voice.
48
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Checkphone Services Analyze, control, and secure your telephone applications
49
Page 49 CHECKPHONE_PPT_131205_FR.ppt Customer Migration Support Technical Support Service Delivery Voice, hybrid, IP networks Network migration support PBX upgrade support PBX migration support 7X24X365 customer support via channels and CheckPhone Global trouble call resolution system Security architecture and installation Audit service delivery Software upgrades Documentation & training Customer Service & Support
50
Page 50 CHECKPHONE_PPT_131205_FR.ppt Services is a key early Revenue & Technology enabler Services Strategy Consultin g Assessme nt & Audit Specialized VoIP tools Open Source Tools & Commercial Tools Compliance Plus VoIP Security Deployment VoIP Managed Security VoIP Security KB +
51
Page 51 CHECKPHONE_PPT_131205_FR.ppt Key Benefits CheckPhone meets voice security needs in the enterprise: Real-time monitoring and localized protection against security breaches in the voice network Seamless integration into the existing network infrastructure and migration to VoIP Optimal use of security resources with centralization of security management Advanced vulnerability audit and reporting on PBX configuration Ease of use Effective voice security technology CheckPhone addresses major security threats in the voice network Integrity Eavesdropping Interception and modification Service abuse Denial of service CheckPhone a trust worthy Security Solution supplier 300+ years of Security, IP and telephony experience Proven track record for products and services – a note worthy customer base A future proof approach – Open Source OS and SQL Database, video and voice security, “.Net” connectivity
52
CHECKPHONE_PPT_061205_FR CHECPHONE_POT_061205_FR.pot Thank You Analyze, control, and secure your telephone applications
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.