securelogix® managed security service for voice...telephony denial of service (tdos) attacks, which...

4
. SecureLogix® Managed Security Service for Voice INCREASING ATTACKS ON VOICE/UC RESOURCES The rapid growth of attacks on enterprise voice/Unified Communications (UC) services and infrastructure has become a business critical issue for the enterprise. SIP Trunking and UC applications are introducing a host of new and sophisticated threats, such as devastating Telephony Denial of Service (TDoS) attacks, which have dramatically increased over the past year. These types of voice attacks cannot be adequately addressed with traditional IP firewalls or SIP trunking Session Border Controllers (SBCs/eSBCs). Failure to manage these growing threats will threaten enterprise productivity, information security and regulatory compliance. The absence of an effective and automated Voice/UC Security and Policy Enforcement Solution can have serious implications, including: Highprofile service loss via TDoS and other threats Loss of contact center uptime, revenues, and customer response/satisfaction from TDoS and negative value calls Financial fraud against the enterprise and/or its customers through social engineering and other fraud schemes Information theft and compliance costs Widespread theft and misuse of toll services Loss of business productivity and safety from malicious calls SECURELOGIX CAN PROTECT YOUR ENTERPRISE In response to this growing tide of threats, the SecureLogix® Managed Security Service for Voice (MSSV) offers a managed security service for voice that can protect your business security, compliance, and productivity. MSSV is based upon our highly patented voice security, policy enforcement, and fraud detection solutions and will detect and block voice/UC application attacks and fraud not seen by your IP firewall or SIP trunking SBCs. With a newlyhardened voice/UC network, your legitimate business calls flow in and out as always, but fraudulent and malicious attack calls are identified and blocked before they interrupt your business productivity or compromise your security. This service will help identify and prevent: Telephony Denial of Service (TDoS) attacks Robocalls, spam, and voice phishing schemes Contact center financial fraud, ID theft, and social engineering Negative value (nonbusiness) calls into contact centers Information theft over voice/UC Toll service theft, fraud, and abuse Harassing, malicious, or, restricted calls The solution also collects enterprisewide call metadata, and provides a powerful call analytics engine to generate actionable reports, drive more reliable service uptime, improve security policies, and lower infrastructure and service costs. VOICE SECURITY IS NOW BUSINESSCRITICAL Strong security against the growing tide of attacks targeting enterprise voice and UC resources has never been more critical. One example includes the surging number of TDoS attacks now occurring on a regular basis against businesses large and small. The growth of TDoS attacks targeting U.S. corporations has prompted the U.S. Department of Homeland Security and the FBI, along with several other federal and state agencies, to issue public warnings urging U.S. businesses to prepare for attacks. SecureLogix can help protect your enterprise communications and critical contact center resources from fraud, information theft and disruption. Our realtime network security monitoring service will ensure your organization’s productivity, security, safety, and regulatory compliance. STOP FRAUD AND TDoS TODAY Contact: Torrey Viger, Director of Inside Sales phone: 6036324652 email: [email protected]

Upload: others

Post on 06-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SecureLogix® Managed Security Service for Voice...Telephony Denial of Service (TDoS) attacks, which have dramatically increased over the past year. These types of voice attacks cannot

   

 

 

 

SecureLogix® Managed Security Service for Voice 

INCREASING ATTACKS ON VOICE/UC RESOURCES 

The rapid growth of attacks on enterprise voice/Unified Communications (UC) services and infrastructure has become a business critical issue for the enterprise. SIP Trunking and UC applications are introducing a host of new and sophisticated threats, such as devastating Telephony Denial of Service (TDoS) attacks, which have dramatically increased over the past year. These types of voice attacks cannot be adequately addressed with traditional IP firewalls or SIP trunking Session Border Controllers (SBCs/eSBCs). Failure to manage these growing threats will threaten enterprise productivity, information security and regulatory compliance. The absence of an effective and automated Voice/UC Security and Policy Enforcement Solution can have serious implications, including: 

• High‐profile service loss via TDoS and other threats 

• Loss of contact center uptime, revenues, and customer response/satisfaction from TDoS and negative value calls 

• Financial fraud against the enterprise and/or its customers through social engineering and other fraud schemes 

• Information theft and compliance costs 

• Wide‐spread theft and misuse of toll services 

• Loss of business productivity and safety from malicious calls 

SECURELOGIX CAN PROTECT YOUR ENTERPRISE 

In response to this growing tide of threats, the SecureLogix® Managed Security Service for Voice (MSSV) offers a managed security service for voice that can protect your business security, compliance, and productivity. MSSV is based upon our highly patented voice security, policy enforcement, and fraud detection solutions and will detect and block voice/UC application attacks and fraud not seen by your IP firewall or SIP trunking SBCs. With a newly‐hardened voice/UC network, your legitimate business calls flow in and out as always, but fraudulent and malicious attack calls are identified and blocked before they interrupt your business productivity 

or compromise your security. This service will help identify and prevent: 

• Telephony Denial of Service (TDoS) attacks 

• Robocalls, spam, and voice phishing schemes 

• Contact center financial fraud, ID theft, and social engineering 

• Negative value (non‐business) calls into contact centers 

• Information theft over voice/UC 

• Toll service theft, fraud, and abuse 

• Harassing, malicious, or, restricted calls 

 The solution also collects enterprise‐wide call meta‐data, and provides a powerful call analytics engine to generate actionable reports, drive more reliable service uptime, improve security policies, and lower infrastructure and service costs. 

VOICE SECURITY IS NOW BUSINESS‐CRITICAL 

Strong security against the growing tide of attacks targeting enterprise voice and UC resources has never been more critical. One example includes the surging number of TDoS attacks now occurring on a regular basis against businesses large and small. The growth of TDoS attacks targeting U.S. corporations has prompted the U.S. Department of Homeland Security and the FBI, along with several other federal and state agencies, to issue public warnings urging U.S. businesses to prepare for attacks. SecureLogix can help protect your enterprise communications and critical contact center resources from fraud, information theft and disruption. Our real‐time network security monitoring service will ensure your organization’s productivity, security, safety, and regulatory compliance. 

 

  

STOP FRAUD AND TDoS TODAY Contact:  

Torrey Viger, Director of Inside Sales phone:  603‐632‐4652 email:    [email protected] 

Page 2: SecureLogix® Managed Security Service for Voice...Telephony Denial of Service (TDoS) attacks, which have dramatically increased over the past year. These types of voice attacks cannot

   

 

 

 

MSSV Service Based on the PolicyGuru® Solution 

The SecureLogix MSSV service based on the PolicyGuru® Solution provides a managed, consultative capability to visualize, detect, and mitigate threats to your voice network. Our consultants provide expert guidance and SecureLogix’s Best Practices recommendations to profile new and emerging threats and build, deploy, and manage enterprise‐wide Unified Communications (UC) security policies.  

The MSSV service includes the deliverables, components, tasks, and functions described below. In consultation with the Customer, the SecureLogix point‐of‐contact (POC) will identify which of the following MSSV components provide maximum value to the Customer and the order in which those components will be delivered. Following is a list of the available tasks and components. 

PolicyGuru® Mediation Server Administration. SecureLogix will administer the Customer’s PolicyGuru Mediation Server for the duration of the period of performance. Tasks may include the following: 

Application Management and Administration—Routine operation, administration, and management tasks for the PolicyGuru Mediation Server and associated SecureLogix products, necessary to ensure reliable delivery of the service. 

Fault Detection—Monitoring, isolation, and corrective actions for system faults.  

Maintenance of Key Data Sources—Installation, configuration, updating, and maintenance of data sources such as dialing plans, and call blocking lists (blacklists, white lists, harassing callers, etc.).  

Remote System Upgrades—Remote installation of major and minor upgrades to the PolicyGuru production System. 

Service Monitoring. SecureLogix will monitor the systems and services required to deliver the managed service. Monitored elements may include the following: 

PolicyGuru® Mediation Server—Critical applications and services are monitored to ensure availability of the service.  

PolicyGuru® ENUM Servers and Other Ancillary Components—Critical applications and services are monitored to ensure availability of the service. 

Voice Intrusion Prevention System Policy Management. Voice Intrusion Prevention System (IPS) Policy provides the capability to generate notifications and enforce voice security policy on patterns of telephone calls across the Customer’s enterprise. Certain calling patterns can indicate attacks, toll fraud, misuse/abuse, and other threats. IPS Policy allows thresholds to be set for count and/or cumulative duration of suspect calling patterns. When a threshold is exceeded, alerts can be automatically generated and SecureLogix analysts will investigate and mitigate the threat.  

SecureLogix will analyze telephone calling patterns and provide SecureLogix’s Best Practices recommendations. In consultation with the Customer, SecureLogix will develop, implement and manage an effective IPS Policy to address aspects of voice network security and fraud management. IPS Policy thresholds and alerts will be configured during the Initiation Phase and tuned periodically as required.  

The monitored elements that may be included in IPS Policy include: 

Total Inbound Calls (Enterprise‐wide or IVR specific)—Provides the first indication of unusual call volumes. 

Outbound Long Distance (LD) or International (INTL)—Provides an indication of toll fraud. 

Total Terminated—A sudden change in the normal number or rate of calls terminated by Firewall Policy is a major indicator of anomalous activity. 

Page 3: SecureLogix® Managed Security Service for Voice...Telephony Denial of Service (TDoS) attacks, which have dramatically increased over the past year. These types of voice attacks cannot

   

 

 

 

Countries of Interest—Alerts on inbound or outbound calls to or from countries that may be of interest to the Customer. 

Voice Firewall Policy Management. Voice Firewall Policy provides the capability to enforce voice security policy against individual telephone calls across the Customer’s enterprise. SecureLogix will analyze telephone calling patterns and provide SecureLogix’s Best Practices recommendations. In consultation with the Customer, SecureLogix will develop, implement, and manage effective Voice Firewall Policy to address aspects of voice network security and fraud management. Firewall Policy management includes the management of white lists (allow) and blacklists (log, alert, block, redirect). Managed lists can include proprietary data gathered and provided by SecureLogix along with Customer‐provided lists of telephone numbers of interest. Firewall Policy rules will be configured during the Initiation Phase and tuned periodically as required.  

Customer‐Initiated Service Change Requests.  

The MSSV Service includes up to fifteen (15) Customer‐initiated Service Change Requests per month after the Initiation Phase. The types of requests that may be included in Customer‐initiated service changes include the following: 

Customized Reports—Request for customized reports including optional scheduling for automated generation and delivery to a managed list of Customer recipients. 

Targeted Analytics—Request to perform detailed analysis of call records for specified internal or external telephone numbers. 

Redirection Policy—Request for change to redirection policy rules for incoming or outgoing calls. 

Customer‐Specific Telephone Number Lists—Request for updates to Customer‐specific blacklists (harassing callers) or white lists. 

Recurring Deliverables 

MSSV service deliverables include an Automated Monthly Scorecard report with concise analytics and a focused view of the Customer's current voice security posture. During the Initiation Phase, SecureLogix will provide an online meeting to familiarize Customer personnel with the MSSV service and provide a detailed description of the content provided in the Automated Monthly Scorecard.  

Elements that may be included in the Automated Monthly Scorecard include the following: 

Current Security Posture—Describes the degree to which each security policy element has been deployed on the Customer's system to date. It may take up to 90 days to complete analytics, recommend thresholds, and obtain authorization to deploy policy.  

Operations Posture—Describes status of processes and procedures needed to support the MSSV service, such as remote connectivity, rules of engagement and authorization processes.  

General Statistics—Includes an inventory of the deployed solution, operational Voice Firewall and Voice IPS Policy statistics, overall call volumes, and number of support cases opened/closed on the Customer’s behalf in the preceding month and year‐to‐date. 

Call Analytics—Includes call pattern trends for several key toll fraud and security elements, along with a percentage change from last month, top callers, and top call detail records.

Additional Services Available Additional services are available from SecureLogix upon request to further augment the MSSV services described above.  Summary The SecureLogix MSSV services and additional services are designed to ensure the customer gains the full benefits of the capabilities of the SecureLogix PolicyGuru Solution.

Page 4: SecureLogix® Managed Security Service for Voice...Telephony Denial of Service (TDoS) attacks, which have dramatically increased over the past year. These types of voice attacks cannot

   

 

 

 

ETM, We See Your Voice, SecureLogix, SecureLogix Corporation, the SecureLogix Emblem, and the SecureLogix Diamond Emblem are registered trademarks or registered trademarks and registered service marks of SecureLogix Corporation in the U.S.A. and other countries. PolicyGuru is a registered trademark of 

SecureLogix Corporation in the U.S.A. All other trademarks mentioned herein are believed to be trademarks of their respective owners. 

© Copyright 2016 SecureLogix Corporation. All Rights Reserved. SecureLogix technologies are protected by one or more of the following patents: US 6,226,372 B1, US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,718,024 B1, US 6,760,420 B2, US 6,760,421 B2, US 7,133,511 B2, US 7,231,027 B2, 

US 7,440,558 B2, US 8,150,013 B2, CA 2,354,149, DE 1,415,459 B1, FR 1,415,459 B1, and GB 1,415,459 B1. U.S. Patent Pending.