20
Sigal Russin Pini Cohen STKI Summit 2013 Cloud based Contact Center

Cloud cc security

Embed Size (px)

DESCRIPTION

security on call center in cloud

Citation preview

Page 1: Cloud cc security

Sigal Russin Pini Cohen

STKI

Summit

2013

Cloud based Contact Center

Page 2: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Cloud Problems

Source: information week

2

Page 3: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Cloud Status

Source: information week

3

Page 4: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Cloud Status

Source: information week

4

Page 5: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Cloud Adoption Accelerates in 2012

5

Page 6: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Business Benefits

Improved business

agility

Lower total cost

of ownership

Decreased capital

expense

flexible scaling

6

Page 7: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

* In percent

7

Page 8: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

8

Page 9: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Cloud Contact Center Concerns

• Security – authentication, back-up, e encryption and secure user/password processes, regulation.

• Performance- quality, availability, inconsistency, bandwidth available and latency, Send critical signals such as SIP, XML, CTI .

• Resilience and Business Continuity- back–up or mirrored location, recovery and resilience.

9

Page 10: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Performance & Security

• Time out intervals • Distributed denial of service • Data theft • Trial and error break in • Bank cards fraud • caller ID attack against system (CLI spoofing) • Voice biometric attack • Telephone Switch attack • Phishing Attack – man in the middle • OS compromise

Source: https://www.brighttalk.com/webcast/288/31879

10

Page 11: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Session Border Controller (SBC) A device or application that governs the manner in which called sessions, are initiated, conducted and terminated in a VoIP (Voice over Internet Protocol) network.

Location: a connection point, called a border, between a private local area network (LAN) and the Internet.

It can exist as a single, independent hardware unit containing all of the resources necessary for call signaling and call control.

It can include call filtering, bandwidth use management, firewalls and anti-malware programs to minimize abuse and enhance security.

11

Page 12: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

SBC Topology

External Cloud

Your Business

12

Page 13: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Security measures in SBC

Many contact center managers who operate at a single site see limited value in the migration to voice over IP (VoIP) and will only do so when a vendor declares the existing application's end of life. source: Forrester Research, Inc., Is It Time To Move Your Contact Center to the Cloud? June, 2012

Safeguarding enterprise customer confidentiality and privacy

Improving interoperability by mitigating multi-vendor/multi-protocol interoperability issues

Ensuring better reliability by enforcing service quality and enabling high levels of service availability

13

Page 14: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

SBC Benefits

• SBCs are able to manage complex call flows between different telecom platforms and multiple carriers’ SIP trunks, using slightly incompatible interfaces, to be interconnected and used on a single enterprise network.

Network Bandwidth Usage Savings

• An SBC can facilitate end-to end encryption if the privacy of sessions is compulsory due to regulatory.

• It is necessary to provide scalable network address translation (NAT) capabilities.

Home Agent Deployment Benefits

• Recording sessions within the SBC at the contact center network edge provides economic and reliability to the enterprise over traditional IP recording methods.

Call Recording Enhancements

Source: http://www.currentanalysis.com/f/2011/ContactCenter-SBC/files/CurrentAnalysis-ContactCenter-SBC.pdf 14

Page 15: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

SBC Benefits

• SBCs are being employed to protect enterprise networks and to maintain appropriate levels of reliability and security when connected to a hosted contact center application by SIP trunking.

• Without security it can be a targets of hackers and can be crippled by denial of service (DoS) attacks.

Hosted/Cloud Contact Center Advantages

• In north America emergency calls be handled with priority and routed appropriately in emergencies.

• An SBC is able to identify emergency priority calls from anywhere within a multi-location, geographically-distributed.

Regulation -E911 Benefits

15

Source: http://www.currentanalysis.com/f/2011/ContactCenter-SBC/files/CurrentAnalysis-ContactCenter-SBC.pdf

Page 16: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

SBC-based Solutions

Forrester :“Risk and compliance teams need to audit and approve the cloud contact center service provider’s security procedures and technology to best manage the enterprise’s exposure.” source: Forrester Research, Inc., Is It Time To Move Your Contact Center to the Cloud? June, 2012

Acme Packet Audiocodes Cisco Edgewater Siemens Enterprise Sipera Avaya Others

16

Page 17: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Don’t Forget!

Vendor selection

• Performance

• Resilience

• Capability

• Freedom

• Hosting center

Voice quality of VoIP

• VoIP quality and performance

• Dedicated connections

• Prioritise your voice over data traffic

Security

• Policies and procedures

• Hosting environment

• Network design and access

17

Page 18: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Questions to Ask

• Is the hosting infrastructure shared or dedicated; how is it partitioned; are data security authentication/passwords applied?

• Who is hosting the servers; do they have good physical and network security?

• Are other authentication mechanisms like Secure ID used?

• Is constant monitoring provided and are proactive tools employed?

18

Page 19: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Recommendations

• Match the scalability of the SBCs to your scalability requirements in the contact center.

• Ensure the survivability characteristics of the SBCs that will sufficient with redundancy to maintain operations at the local level and the broader geographic coverage level where network problems arise.

• Ensure required security and regulatory compliance issues will be satisfied by the selected SBC product prior to purchase.

• Before decide, check the potential operational efficiencies gained, economic payback, architecture and compliance issues.

19

Page 20: Cloud cc security

Sigal Russin’s work Copyright@2013

Do not remove source or attribution from any slide, graph or portion of

graph

Thank You!

20