With the migration to all VoIP networks both service providers and enterprises are now being challenged to manage their new networks against the constant stream of threats posed by malicious hackers to the constant stream of challenges posed by the migration of users to working from home to the integration of new services and cloud architectures. Eastwind is pleased to offer solutions from two vendors.
RedShift's Unified Communication Threat Management (UCTM) platform applies real-time intelligence throughout VoIP system handshakes while video and audio calls are initiated from registered or remote video/phone systems. RedShift UCTM constantly inspects and monitors video edge device dial plans and security settings where hackers target call control edge devices and their internal connectivity to the switching infrastructure . RedShift’s UCTM applies modern cybersecurity with VoIP underlying protocols including SIP, RTP, MS-SIP, TLS, SRTP and others. When service providers and/or enterprises deploy Redshift's UCTM real-time intelligent detection methods, hackers are unable to fraudulently disguise their presence over audio and video call traffic.
Ribbon's Analytics platform leverages big data to empower service providers and enterprises to more rapidly, more intelligently, and more efficiently respond to real-time communications (RTC) cyberattacks, fraud attempts and network quality incidents. Ribbon Protect quickly and easily integrates with existing RTC network investments without requiring network probes.
High-speed data ingestion, data enrichment, and a highly scalable and reliable data storage are the foundation for the Analytics platform. Leveraging well-established concepts of network behavioral analytics from the data world, it is possible to establish a well-defined baseline of what is categorized as “normal” RTC traffic as well as IP port activity. Deviations from this baseline can be quickly identified and used to mitigate a variety of RTC attacks by disseminating security policies across the network topology.
RedShift's Unified Communication Threat Management (UCTM) platform applies real-time intelligence throughout VoIP system handshakes while video and audio calls are initiated from registered or remote video/phone systems. RedShift UCTM constantly inspects and monitors video edge device dial plans and security settings where hackers target call control edge devices and their internal connectivity to the switching infrastructure . RedShift’s UCTM applies modern cybersecurity with VoIP underlying protocols including SIP, RTP, MS-SIP, TLS, SRTP and others. When service providers and/or enterprises deploy Redshift's UCTM real-time intelligent detection methods, hackers are unable to fraudulently disguise their presence over audio and video call traffic.
Ribbon's Analytics platform leverages big data to empower service providers and enterprises to more rapidly, more intelligently, and more efficiently respond to real-time communications (RTC) cyberattacks, fraud attempts and network quality incidents. Ribbon Protect quickly and easily integrates with existing RTC network investments without requiring network probes.
High-speed data ingestion, data enrichment, and a highly scalable and reliable data storage are the foundation for the Analytics platform. Leveraging well-established concepts of network behavioral analytics from the data world, it is possible to establish a well-defined baseline of what is categorized as “normal” RTC traffic as well as IP port activity. Deviations from this baseline can be quickly identified and used to mitigate a variety of RTC attacks by disseminating security policies across the network topology.