netas nova cyber security product family
TRANSCRIPT
![Page 1: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/1.jpg)
![Page 2: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/2.jpg)
Agenda
Why Cyber Security?
Products, Projects and Services
![Page 3: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/3.jpg)
Why Cyber Security? Telecom?
COMMUNICATION OVER IP CONTINUES TO GROWWITH NEW TECHNOLOGIES AND SERVICES...- IPv4 addresses run out and IPv6 being used- 4G days going on and 5G is planned to be a live in 2020 – no circuit switch
support any more- VoIP (packet switched network) usage being increased- The secure VoIP is the main point due to the nature of the IP network
topology and VoIP systems
![Page 4: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/4.jpg)
• Cost Savings – setup, operation and support• Rich Media Services• Phone portability – no location based• Service Mobility• Integration and collaboration with other
applications• User control interface• No geographical boundary• Rich features
* Due to vulnerability of IP networks and VoIP systems, more fraud attempts on VoIP
PSTN + GSM VoIP
Why Cyber Security? VoIP? Global VoIP Traffic
*Stattistica 2014,http://www.statista.com/statistics/267183/forecast-for-the-worldwide-voip-traffic
Secure VoIP Important
![Page 5: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/5.jpg)
Why Cyber Security? 2013 Estimated Fraud Losses
Total Loss
$46.3 Billion
VoIP Hacking
$3.62 Billion
VoIP Traffic Theft
Communications Fraud Control Association (CFCA Report) 2013, http://cfca.org/pdf/survey/Global%20Fraud_Loss_Survey2013.pdf
Fuzzing
Password Cracking
Denial of Service
Voice Quality Disruption
Information Theft
Malware Attacks
Eavesdropping
Toll Fraud
![Page 6: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/6.jpg)
Why Cyber Security? VoIP Frauds Occurred…
Hacker attacks - %25 on Voice Systems
According to Control Phreak 2012 report;
AT&T PABX customers hacked and - traffic ended to Somali, Cost Fraud: 1 milyon $ (minutes 22$, 4 days) – 9 June 2012- international premium-rate services calls - Cost Fraud: 2 milyon $ - 28 November 2011
In Russia, during elections, advertisement announcements in the calls - 9 December 2011
Toll Fraud More than 2,200 company in ABD, Cost Fraud: 55 milyon $
Attacks to VoIP and UC systems, more than 20,000 in a year
![Page 7: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/7.jpg)
Agenda
Why Cyber Security?
Products, Projects and Services
![Page 8: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/8.jpg)
Products, Projects and Services Products
VoIP Security Scanner
1. The first multifunctional national VoIP Vulnerability Assessment Tool2. Expert system report presents detailed reports of security measures against vulnerabilities3. Protocol compatibility and stress tests4. VoIP traffic generation and automatic service tests5. Fuzzing tests using Genetic Algorithm and ABNF6. Flexible and modular structure
VoIP Application Firewall
1. The first national application level firewall solution2. Attack detection and prevention with deep instantaneous statistical data analysis,3. Dynamic filtering, automatic rules update, and policy rule editor4. Detecting critical system parameters and anomaly detection with traffic monitoring method5. Detection and prevention against attacks such as toll fraud, DDoS, fuzzing, call forwarding fraud6. Anomaly detection in big-data using learning algorithms architecture
Medya Security Platform
1. Secure communication (voice, video, message and file tansfer, signature)2. Encrypted communication3. Windows, Android and iOS support4. Two scenarios support - Lawful intercept scenario - Not intercept scenario5. Device independent6. Smart card use7. 13 Patent
![Page 9: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/9.jpg)
VoIP Application Firewall
![Page 10: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/10.jpg)
Products, Projects and Services VoIP Application Firewall
InternetService Providers IP Firewall
VoIP Application Firewall
Internal and External VoIP Network Securitywith NOVA V-GATE ile
SBC / SIP Server
![Page 11: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/11.jpg)
Products, Projects and Services VoIP Security in Unified Communication
VoIP Server Web & EmailServer
DNS Server DatabaseServer
ApplicationServer
< Router >
< Firewall >
< Switch >
< Firewall >
< Switch >
![Page 12: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/12.jpg)
Call Forwarding Fraud
Traffic Call GeneratorThe fraudsters gain access to an enterprise PBX or the IVR of a voice mail system. They can then configure call forwarding to an expensive long distance destination to profit from a revenue sharing deal.
The frauder has a revenue sharing deal with the high cost destination and recevies payment.
Products, Projects and Services
![Page 13: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/13.jpg)
Products, Projects and Services One Ring and Cut (Wangiri) Fraud
The fraudster sets up calls to voice subscribers, but hangs up after one ring.
Curious subscribers see a missed call on their phones, and return the call, not realizing that the number is actually a high cost destination. (This fraud can be realized with SMS message.)
Service provider routed call to high cost destination.
![Page 14: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/14.jpg)
Products, Projects and Services Vishing, “Voice-Phishing, ANI Spoofing
The fraudster pretends as a legitimate business to attempt to gather customer data such as credit balance from someone.
![Page 15: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/15.jpg)
Products, Projects and Services Security Threats Prevented by V-Gate
Your Services (Call, Forwarding eg.) Denial of Service Delay Used by others
Your Data (User profiles, service info
eg.) Theft Replace
Your Quality of Services (Traffic
management, delays, pricing eg.)
Slowdown in voice and video services Capacity Problems Misinformation and
billing problems
%100 inhouse
![Page 16: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/16.jpg)
VoIP Security ScannerAnd Security Report
![Page 17: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/17.jpg)
Products, Projects and Services VoIP & Web Pentest Services
Security threat simulation tools and modules
Reconnaissance Distributed Denial of ServiceFuzzing Man In the MiddleBulk Call Generation (from spoofed IDs), Stress and Capacity Tests
We give pentest services with our own products.
Attack and Penetration Testing
Analyze The Results
Generate System Report
Define the Aim
Determine the Scope
Collect Information
Detect Vulnerabilities
RECONNAISSANCE MAPPING DISCOVERY EXPLOID REPORTING
![Page 18: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/18.jpg)
Products, Projects and Services Why NOVA V-SPY?VoIP Device Reconnaissance Determining whether
they workSoftware Version
Control Sytem Info
System Capturing Attacks Pentest Changing the configuration of system equipment
Resistance test against traffic routing frauds
Denial of ServiceCall ((IP, port and user) generator
from single point or the distribution points
System resistance test with fuzzing messages
Security test with protocol message chain
System Capacity and Stress Tests
Security controls of systems
System durability tests with stress tests
Decision support for operational management
%100 inhouse
![Page 19: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/19.jpg)
Media Security Platform
![Page 20: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/20.jpg)
Products, Projects and Services Secure Communication
Android applicationWebRTCSecure voice and video communicationSecure messagingSecure screen sharingAlgorithm skipping (Blowfish, AES256…)Key skippingDiffie-HellmanSmartcard13 PatentsLawful intercept (For Public Users)SPiDR compatible
![Page 21: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/21.jpg)
Products, Projects and Services Why NOVA MSP?Device
Independent Android MSP Web client
IOS (near time)
Secure Communicati
onEncryption Algorithms Smart Card Session based
Communication
%100 inhouse The source code sharing where necessary
Custom Based Development
![Page 22: Netas Nova Cyber Security Product Family](https://reader035.vdocuments.net/reader035/viewer/2022062905/5871242e1a28abe4448b5c7b/html5/thumbnails/22.jpg)
THANK YOU
www.novacybersecurity.com