12

How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

Page 2: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix
Page 3: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

How do you proactively enforce appropriate voice network access and service use?

How do you track and report usage across your entire voice network?

How do you manage and secure your migration to VoIP?

How do you secure your corporate data network from back door phone line vulnerabilities?

How do you plan for your VoIP deployment, and track ROI?

How do you know that you are delivering quality of service before the phones start ringing?

How do you isolate the source of telecom errors or call quality issues and quickly resolve them?

For enterprise telecom managers, these are truly the best of times, and the worst of times.

Convergence is introducing more voice technology options, but adding more network complexity,

management, and security concerns than ever before.

Today’s enterprise telecom managers clearly need integrated tools specifically designed to meet their

unique voice network management and security requirements.

And they need a unified solution that works with their entire network throughout migration…

across any mix of legacy or VoIP systems and protocols in their hybrid voice environments.

Welcome to the future of enterprise telephony management.

The ETM® System from SecureLogix is the one investment you make to secure and manage

voice across your enterprise. It’s an integrated voice security, performance management, and usage

reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice

network.

Let SecureLogix show you how the ETM System can secure your voice systems from abuse and

attack, and simplify the management of your enterprise voice network… throughout and beyond all

stages of migration.

Page 4: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

THE CENTRALLY MANAGED ETM® SYSTEM is a low-cost, scalable, appliance-

based solution providing real-time visibility

and control over VoIP and TDM networks

and enterprise call traffic. The ETM System

hosts a suite of applications that provide

voice managers a tightly integrated tool set

to secure, optimize, audit, and efficiently

manage their VoIP and TDM networks.

The ETM System is comprised of:

A family of intelligent platform

appliances

Centralized management software

A suite of voice security and

management applications

ETM® PLATFORM APPLIANCES are switch/media-independent,

solid-state devices installed on your TDM or VoIP trunking between

the PBX / IP-PBX and Central Office to continuously monitor, secure,

log, and control all inbound and outbound enterprise communications

in real-time.

• In-line appliances monitor and control voice network access and

usage

• Real-time call-type/CODEC detection at the network edge (voice,

fax, modem, video and STU-III)

• Continuous call monitoring with stateful inspection

• Policy-based operation with real-time alerts (console, email, pager,

and SNMP trap)

• Support for a variety of circuit types (T1, ISDN PRI, European PRI,

analog and VoIP)

ETM® MANAGEMENT SOFTWARE consists of client and server

software used to manage and monitor distributed appliance

operations. The ETM System and Performance Manager consoles

provide real-time visibility and control over the entire system.

• Centralized platform administration & monitoring

• “Off the wire” telecom health & status alerts

• Distributed policy, software & firmware updates

• Easy management of 100s of remote appliances

• Relational database for call detail records (CDR), diagnostics and

policy logs

• 3DES encryption for client, server and appliance communications

ENTERPRISE TELEPHONY MANAGEMENT SYSTEM

ETM® PLATFORM APPLIANCE FAMILY

ETM 3200 Series 2U high cPCI chassis

Hot-swap components

48v DC operation available

Supports up to 16 spans – 480 trunks

ETM 2100 Series 1U high cPCI chassis

MTBF 50,000 hours

Supports up to 4 spans – 120 trunks

ETM 1000 Series Hybrid 1U high single span chassis

MTBF 50,000 Hours

Supports one digital span and one VoIP span

12 and 24 line analog models with VoIP

support available

1

2

3

1

2

Page 5: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

ENTERPRISE TELEPHONY MANAGEMENT SYSTEM

APPLICATION SUITE The highly

expandable, remotely managed ETM®

Platform Appliances host a growing

suite of real-time applications, containing

patented and patent-pending technologies.

These applications provide first-of-kind

security and management intelligence to

hybrid voice networks.

The ETM System Application Suite

includes:

VOICE FIREWALL Firewall for real-time media protects enterprise infrastructure by detecting and blocking TDM & VoIP attacks over phone lines, while controlling enterprise voice network access and usage.

USAGE MANAGER Enterprise-wide, IP-PBX / PBX-independent CDR collection (including call/CODEC type), call accounting, and resource utilization reporting for granular and proactive network management and full ROI.

PERFORMANCE MANAGER Real-time monitoring of trunk health & status, VoIP QoS alerts, and secure remote management of distributed telecom resources and network usage policies.

VOICE IPS Call pattern anomaly detection and prevention for real-time detection of toll fraud, war dialing, service abuse/misuse for hybrid voice networks.

CALL RECORDER Policy-based call recording of targeted calls of interest.

THE ETM PLATFORM APPLIANCES operate transparently on your voice circuits between the IP-PBX and the Central Office, including a fail-safe mode that leaves the circuits fully operational should the appliance loose power for any reason. In a fashion similar to data network perimeter security and management devices, ETM Platform Appliances sit at the edge of the enterprise voice network, the optimal position to provide visibility and control over all inbound and outbound voice network access and usage. The edge-network intelligence of the platform appliance also allows it to host a large array of voice security and management applications, all of which can be uploaded from a remote location.

THE ETM SERVER is the hub for the entire system, remotely monitoring hundreds of distributed appliances in-line on TDM and VoIP trunks. The revolutionary ETM System unifies the security and management of your distributed voice network, regardless of your network mix of proprietary vendor systems or TDM & VoIP media. A single ETM Client, such as the one shown in Florida, can manage the entire system, or distributed clients can support a regional model. This includes not only real-time monitoring of appliance operations, but full remote upgrades of both the appliance firmware and applications. Enterprise-wide remote management has never been easier.

����������������������

�������������

�����������������

��������������

������������

������������

�������������

��������������������������

���������������������� �������������

������������

�������

������

������������

���

��������

���������

���

3

Page 6: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

Real-time Security & Control of Hybrid Voice Networks

The ETM® Voice Firewall provides enterprise-wide visibility and control over all voice trunking infrastructure and call activity (TDM & VoIP). It enforces voice network access and usage policies that detect and block internal and external attacks over phone lines, voice service disruption and abuse, toll fraud, unauthorized network access and usage, and other restricted call traffic.

The Voice Firewall inspects, logs and controls all inbound and outbound network activity based on user-defined, call admission control (CAC) policies and real-time call type/CODEC detection on each call (voice, modem, fax, video, STU-III). As an application-layer firewall, it performs Deep Packet Inspection (DPI) of all call signaling and media, protecting enterprise data networks, phone systems and other critical infrastructure from unauthorized modem access,

VoIP signaling and media DoS (Denial of Service), and other external attacks through the Public Switched Telephone Network (PSTN) or the WAN/Internet. Its granular usage policies can alert or prevent abusive or malicious use of your enterprise telecom resources by internal or external callers, regardless of IP-PBX type, trunk protocol or media type. The ETM Voice Firewall unifies the security of telephony traffic and infrastructure across hybrid TDM and VoIP networks. It provides application-layer security to real-time media, and works side-by-side with your data firewall to help complete the security of your corporate electronic perimeter.

The firewall policy tool is similar to industry-standard IP firewall GUIs. This policy set terminates threatening and abusive call activity such as employee calls to ISPs over unauthorized modems (Rule 1), non-fax calls on dedicated fax lines during non-business hours (Rule 2), VoIP spam coming from “spamers.com” (Rule 3), and toll calls such as 411 and 1-900, etc. (Rule 4), while alerting specific telecom personnel via email when these calls occur.

The policy also logs and alerts incoming voice calls where caller ID is masked (Rule 5), and authorizes PIN-authenticated access for the PBX vendor into a PBX maintenance port (Rule 6).

VOICE FIREWALL

Page 7: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

ETM® Usage Manager is a powerful reporting, analysis and usage management tool for the enterprise voice network. The application’s analysis engine collects and compiles Call Detail Records (CDR) and call-type/CODEC information on all inbound and outbound communications along with health-and-status conditions on all voice trunks across your distributed enterprise, regardless of PBX or media type, and sends this information to a central relational database.

The application’s granular report writing tool provides enterprise-wide visibility into telecom resource utilization, phone network usage, abusive and costly calling patterns, toll fraud incidence, and telecom/data network security issues. All of the classic call accounting report

functions are provided, city/state details on called parties and cost allocation reports with fully customizable billing plans.

The ETM System’s fully integrated directory supports detailed usage and cost allocation reporting for up to one million extensions for enterprise-class scalability and performance. User-defined directory fields allow complete customization of organizational reporting, with up to five levels for cost allocation and bill-back.

Usage Manager provides more than 50 pre-defined reports and full report generation flexibility, enabling an almost unlimited array of customized reports.

USAGE MANAGER

Consolidated Auditing & Analysis of TDM & VoIP Usage, Costs, Performance, and Security

Flexible flat rate plans can be configured for any number of carriers or service contracts and used to create usage-based cost allocation, call accounting, departmental bill-back, and billing verification reports.

Page 8: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

The ETM® Performance Manager provides unified, real-time, enterprise-wide visibility into the performance of all VoIP and TDM enterprise voice services and trunking resources. PBX- and media-independent monitoring provides a consolidated, comprehensive view of voice service performance across any enterprise hybrid network mix of multi-vendors systems, trunking protocols, and TDM/VoIP media types found in today’s converging networks.

Performance Manager supports real-time, enterprise-wide health-and-status and QoS monitoring of trunking resources and call activity, with automated alerting and trouble shooting tools to identify and resolve a host of telecom signaling errors and availability conditions. Because the ETM Appliances sit on the demark between the enterprise and the

CO, Performance Manager can segment and characterize performance issues on either side of the network, eliminating finger-pointing and leading to faster error resolution.

In addition to TDM circuit health-and-status monitoring and error diagnosis, each VoIP call is monitored for expected packet rates, packet delay, jitter, packet loss, and actual bandwidth usage. VoIP call quality thresholds and alerts can be established for packet loss and jitter for any CODEC type used on the network. When call quality or performance issues arise, telecom managers can launch an integrated VoIP troubleshooting toolkit with data network call tracing, routing, and packet capture features that provide visibility into the behavior and performance of their VoIP traffic across the network.

The console provides at-a-glance, real-time health-and-status monitoring of all span/trunk groups and individual channels, with remote management over distributed ETM® Appliances and voice network usage and access policies. Real-time health-and-status alerts and icons reduce troubleshooting time for a variety of telecom issues. In this example, a Houston VoIP span shows a telecom error condition.

The application’s call monitor shows real-time CDR on all inbound and outbound TDM or VoIP calls. You can view an individual call, or any group of spans. Suspect calls can also be manually terminated with the tool.

Real-time QoS / Performance Monitoring Across TDM & VoIP Networks

PERFORMANCE MANAGER

Page 9: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

The ETM® Voice IPS (Intrusion Prevention System) application provides real-time detection and prevention of threatening or abusive call patterns across your TDM and VoIP infrastructure, including toll fraud, VoIP spam, modem war-dialing attacks, hacker access, bandwidth or service abuse, and other pattern-based attacks in the call signaling and media streams.

Voice IPS policies are focused on multiple calling patterns or attack/abuse signatures that proactively detect and prevent toll fraud, telecom attacks, service abuse, and other anomalous activity on the trunking infrastructure. Real-time thresholds can be established for various service types, such as long distance or international calls, and be triggered by call count, duration or actual toll charges. The application can terminate malicious or abusive call

activity in real time via the Voice IPS policy, limiting an organization’s financial exposure to toll fraud after hours or on weekends, for example. The application also includes a real-time viewer, which displays current call counts, duration or total toll charges based upon configured policy rules. An integrated call/toll usage analysis toolkit baselines historical and expected call activity and expenses, so you can set appropriate call pattern thresholds.

Voice IPS policy rules determine what actions the IPS engine will take. The above policy set automatically terminates after-hours international calls above the threshold (Rule 1), generates a real-time alert on a series of short duration calls made to unused extensions, which is often an indicator of war dialing (Rule 2), alerts a drop in outbound call center activity during business hours (Rule 3), and terminates an excessive number of inbound modem calls to maintenance ports, which may indicate an attack (Rule 4).

VOICE IPS

Real-time Anomaly Detection & Intrusion Prevention

Thresholds are used to monitor various voice services by raw call count, call duration or actual toll charges. ETM System’s billing plans are leveraged to cost calls in real time and total up charges to ensure that abuse or potential toll fraud is not taking place. Intervals are configured to define the timeframe over which a threshold is to be monitored, such as a weekend.

Page 10: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

The ETM® Call Recorder application enables automated, policy-based recording of targeted calls of interest through the remotely managed ETM System.

The ability to selectively record various calls of interest has become a priority requirement for many organizations seeking to audit organizational security policy adherence, assure proper due diligence in responding to potential legal exposure, and document the integrity of certain business operations.

As a trunk-side solution running on ETM digital and analog appliances, the application can be used to record any inbound or outbound call, including 911 calls, harassing callers, customer service calls, outbound voice calls on fax lines, etc. Call Recorder features a policy-based interface to

record calls based on various call characteristics, including direction, source, destination, time of day, and call type. The application stores the calls in WAV file format for easy review on any number of third party media players.

Policy-Based Recording of Voice/Fax & Modem Calls

The recording policy is similar to the firewall policy and reuses many of the standard columns and settings. The above policy set records calls from a harassing caller “Hancock” (Rule 1), and inbound fax calls from a specific group of source numbers, to monitor for proper handling of patient data coming in from providers (Rule 2).

CALL RECORDER

Page 11: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix
Page 12: How do you manage and secure your migration to VoIP?€¦ · reporting platform that works with any mix of legacy or VoIP vendors and systems in your voice network. Let SecureLogix

ETM, SecureLogix, SecureLogix Corporation, the ETM Emblem, as well as the ETM Application Suite Emblem, the Voice Firewall, Usage Manager, Performance Manager, Voice IPS, and Call Recorder Emblems, and the SecureLogix Diamond Emblem are trademarks or registered trademarks of SecureLogix Corporation in the U.S.A. and other countries. All other trademarks mentioned herein are believed to be trademarks of their respective owners.

© Copyright 2005 SecureLogix Corporation. All Rights Reserved. U.S. Patents No. US 6,249,575 B1 and US 6,320,948 B1, US 6,542,421 B2, US 6,687,353 B1, US 6,718,024 B1, and US 6,760,420 B2. U.S. and Foreign Patents Pending. U.S. and Foreign Patents Pending.

This product includes: Data Encryption Standard software developed by Eric Young ([email protected]), © Copyright 1995 Eric Young. All Rights Reserved.

SecureLogix Corporation13750 San Pedro Ave. Suite 230San Antonio, TX 78232

For more information contact:1-800-817-4837www.securelogix.com