“In today’s world where rapidly evolving technology is a critical part of modern battlefield combat, it is crucial for the Armed Forces to be able to test and deploy new technology as quickly as possible to maintain the edge over their opponents. Faster, smaller, more intelligent equipment must go through a rigorous testing and integration process to be proven before it is ready for the rigors of combat.
Digital disruption is changing the way Waha Capital is investing – from the full digitization of their critical capital markets platform to the utilization of business analytics and intelligence like never before. Similarly, digital disruption is driving innovation across Waha Capital’s IT infrastructure, with a focus on operational efficiency, accelerating service delivery, and improving total cost of ownership.
Waha Capital desired an agile, simple and scalable security solution to match its cutting-edge IT infrastructure…”
data center to monitor VoIP traffic passing through Juniper switches on 1Gbps fiber Ethernet links. Each data center is configured with fully redundant mirror networks – a production network and hot standby network.
This paper describes how the telecommunications company used APCON IntellaFlex technology to achieve 100% visibility of its VoIP traffic on both the production and hot standby networks…”
New Announcement: Voice over IP Intrusion Protection (VoIP IPS)
CNI and Clone Systems have released a new leading edge Voice over IP (VoIP) Intrusion Protection System (IPS) to help you and your clients to avert major threats and intrusions to their VoIP PBX’s and Data Networks. Clone has developed this new offering based upon its eighteen years of experience in developing security service solutions for client networks on a worldwide basis. The VoIP / IPS is available as a managed service or a standalone appliance for large client voice networks or carriers. The VoIP IPS appliance is completely scalable and is available from 500M to 100G. Monitor your voice infrastructure in real-time to protect against attacks aimed at causing service disruptions and to detect and prevent threats that exploit VoIP specific vulnerabilities
Preserve the quality of service and protect your VoIP network in real-time against global emerging threats and vulnerabilities
VoIP specific Threat intelligence and signature updates consistently updated from multiple security sources that details how to detect and protect against emerging threats and vulnerabilities targeting your voice network
Preemptive protection against common categories of VoIP attack techniques that include denial of service (DoS), unauthorized call monitoring, loss of control, service theft and call routing manipulation
24/7 Monitoring and alerting to block threats and vulnerabilities automatically in order to maintain the security and availability of your VoIP network
Security Operation Center monitoring your VoIP infrastructure, tuning the VoIP IPS to distinguish critical threats from false positives, and escalating as needed 24/7/365
Addresses your business and compliance needs with executive level and detailed reports and dashboards enabling you to visually investigate the VoIP threats and vulnerabilities targeting your business the Addresses your business and compliance needs with executive level and detailed reports and dashboards enabling you to visually investigate the VoIP threats and vulnerabilities targeting your business the
Actionable reporting tailored to your business needs, compliance standards, and investigative requirements
Customizable dashboards providing a visual representation of VoIP threats and vulnerabilities allowing you to filter detailed security event information
HOW VoIP INTRUSION PREVENTION SERVICES (VoIP IPS) WORKS
The VoIP IPS appliance is configured according to your network throughput and interface requirements
The appliance is typically installed in-line (also known as in-band) in front of your VoIP gateway, network and phone infrastructure
The IPS runs in protection/prevention mode and inspects all network traffic routed to your voice network in real time against consistently updated threat intelligence and signature updates.
Upon discovering malicious traffic that attempts to disrupt or manipulate the voice network via attack techniques such as a denial of service (DoS), eavesdropping, call hijacking, toll fraud, worms, viruses, buffer overflows, software and network exploits targeting VoIP devices, the appliance immediately drops the packets preventing the attack from reaching its intended target.
If there are Session Border Controllers (SBC) in the Voice network, our VoIP IPS has the ability to react to send pre-defined scripts to the SBC to further defend offending SIP stream activity attacking the Voice environment.
If the VoIP IPS is delivered by Clone as a Managed Service offering, the Clone Systems Security Operations Center (SOC) consistently monitors this activity and the appliance 24/7 to tune the VoIP IPS to distinguish critical threats from false positives and to escalate threats as needed.
If VoIP IPS is purchased as a standalone product, regular and timely updates are delivered to the appliance via automatic updates for the customer to implement immediately or on your own defined schedule.
Detailed Enterprise / SP diagram with options
Diagram for SMB
The staggering rate of adoption of IoT devices is enabling uncountable innovations in the way businesses and individuals can achieve our goals. The pace of adoption also eliminates the traditional, well thought out and paced, roll outs within the Enterprise. If you stop to do traditional vetting, testing and documentation, either the opportunity to gain a competitive advantage is missed, or the need and/or technology solution moves in a leap frog fashion onto the next solution set. This dynamic forces the hand of Enterprise management to accept the security risks inherent in fast tracking the implementation of the next hot technology. The shortage of highly skilled Security Engineers to deal with the security gaps, as they become apparent after or during implantation, compounds the security issues. It is critical that organizations engage with one or more trusted security provider organizations, that can be relied on to assist during project rollouts and provide ongoing 7x24x365 SOC monitoring.
Kevin Lynch, CNI
80% of IoT apps not tested for vulnerabilities, report says
A new report from the Ponemon Institute, IBM, and Arxan claims that just 20% of IoT apps and 29% of mobile apps are actually tested for vulnerabilities, raising security concerns.
By Conner Forrest | January 18, 2017, 6:28 AM PST
A staggering 80% of Internet of Things (IoT) applications and 71% of mobile applications are not tested for vulnerabilities, according to a new report released Wednesday. The report, issued by the Ponemon Institute, surveyed 16,450 IT and IT security professionals who worked in mobile and IoT app security at their organization.
One element that could contribute to the poor testing numbers is the lack of QA and testing methods for IoT, which 55% of respondents said was the case. Overall, 84% said that IoT apps, in general, were more difficult to secure than mobile apps, while 69% said mobile apps were more difficult.
Organizations surveyed said they were concerned about attacks occurring through each of these channels. Of the respondents, 58% were more concerned about a breach occurring through an IoT app, while 53% were more concerned about it happening through a mobile app.
Despite the worry, these organizations aren’t doing much to mitigate the risk. According to the report, 44% said they aren’t taking any steps to prevent an attack, and 11% said they aren’t sure if their organization is taking any preventative measures.
Many of these respondents had actually experienced a breach through one of these vectors in the past. About 60% of those surveyed were certain that their organization dealt with a security issue as a result of a mobile app, and 46% were sure of the same occurrence with an IoT app. And, despite the past problems and acknowledged risks, only 32% said they urgently want to secure mobile apps, and 42% said they want to urgently secure apps for IoT, according to the report.
“Factors revealed in this study may help to explain the lack of urgency,” said Larry Ponemon, founder of the Ponemon Institute, in a press release. “Respondents voiced minimal budget allocation, and those responsible for stopping attacks are not in the security function, but rather other lines of business. Without proper budget or oversight, these threats aren’t being taken seriously and it should come as no surprise for mobile and IoT applications to be the culprit of major data breaches to come.”
Additionally, roughly 30% of respondents said that there is sufficient budget allocated to protect these kinds of apps. But, if they were to be the victim of a serious attack, that may cause them to consider increasing the budget.
“Mobile and IoT applications continue to be released at a rapid pace to meet user demand. If security isn’t designed into these apps there could be significant negative impacts,” Diana Kelley, global executive security advisor at IBM Security, said in a press release.
It should be noted that, while this report was issued by Ponemon, it was sponsored by IBM Security and Arxan, a company that provides mobile and IoT security solutions.
The 3 big takeaways for readers
- Only 20% of IoT apps and 29% of mobile apps are tested for vulnerabilities, according to a new report from the Ponemon Institute.
- Even though many organizations acknowledge the risk of an attack, or have been victims of a breach, many aren’t taking any steps to further secure these attack vectors.
- There isn’t proper budget or oversight given to these threats, which could explain the lack of urgency, the report found.
Did Hackers in Anthem’s 2014 attack worked for a foreign government? This is a different take on the source of the attack against Anthem Insurance in 2014. Theories abound from targeting large numbers of records in an effort to distract from a few key health issues for our Military or Business leaders, to the typical privacy data for large numbers of individuals. In either case this breach resulted in Anthem having to commit $260 million dollars in information security systems upgrades. This could have been completed in a more controlled plan by Anthem without having to deal with the fallout of this breach if controls were in place ahead of the attack.
By Shelby Livingston | January 6, 2017
The hackers behind national insurer Anthem’s massive 2014 cybersecurity breach that exposed 78.8 million patient records were likely working on behalf of a foreign government, an investigation by several state insurance commissioners concluded.
The California Department of Insurance, which launched the investigation into Anthem’s cyberattack along with six other state insurance departments, also said that Anthem agreed to invest $260 million in improving its information security systems. A report released Friday detailing the investigation’s findings did not identify the hackers or the foreign government for which they worked. A spokeswoman for the California Insurance Department said federal officials requested the department not provide any information regarding what government was behind the breach because of an ongoing federal probe.
Other cybersecurity firms have previously said that they were able to peg the breach to China because the malware was so unique . “In this case, our examination team concluded with a significant degree of confidence that the cyberattacker was acting on behalf of a foreign government,” California Insurance Commissioner Dave Jones said in a statement announcing the findings. “Insurers and regulators alone cannot stop foreign government-assisted cyberattacks.”
The IoT will consist of billions of smart elements in and on networks that intersect with Enterprise networks. Other business partners, the Internet, intra-networks within the corporations’ domain(s), even the manufacturers we build our networks from. The key will be our ability to build smart, agile and secure enough networks to allow us to participate without getting consumed by the pervasive risks those networks pose, Read how Juniper Networks is working to solve those challenges to prepare your IoT Architecture:
By Jesse Bird
VoIP Networks have been mainstream for a number of years now. Most recently Cloud based solutions with content deliver not limited to simple UC voice and video, is beginning to be delivered with other application content to smart mobile and desktop endpoint. As reported in TCN’s article on 2/25/2016, the full set of TCP/IP protocols and risks are now fair game on links formerly dedicated to SIP only activities. Now these smart endpoints are being used to participate in multimedia applications in parallel with their business meeting call. The task to secure these endpoints it taken up a level and not just worrying about SBC rulesets for traditional service level issues for jitter, delay, quality, bedrock of acceptable UUC quality for real-time VoIP. This is the age where VoIP and traditional IP traffic merge in both the same security and the ubiquitous Internet landscape. It’s time to protect your Telephony Grid as your Enterprise Ecommerce over the Internet. The Internet of Things will grow exponentially and this is just the first, most obvious place for threat actors to launch.