New Announcement: Voice over IP Intrusion Protection (VoIP IPS)
CNI and Clone Systems have released a new leading edge Voice over IP (VoIP) Intrusion Protection System (IPS) to help you and your clients to avert major threats and intrusions to their VoIP PBX’s and Data Networks. Clone has developed this new offering based upon its eighteen years of experience in developing security service solutions for client networks on a worldwide basis. The VoIP / IPS is available as a managed service or a standalone appliance for large client voice networks or carriers. The VoIP IPS appliance is completely scalable and is available from 500M to 100G. Monitor your voice infrastructure in real-time to protect against attacks aimed at causing service disruptions and to detect and prevent threats that exploit VoIP specific vulnerabilities
Preserve the quality of service and protect your VoIP network in real-time against global emerging threats and vulnerabilities
VoIP specific Threat intelligence and signature updates consistently updated from multiple security sources that details how to detect and protect against emerging threats and vulnerabilities targeting your voice network
Preemptive protection against common categories of VoIP attack techniques that include denial of service (DoS), unauthorized call monitoring, loss of control, service theft and call routing manipulation
24/7 Monitoring and alerting to block threats and vulnerabilities automatically in order to maintain the security and availability of your VoIP network
Security Operation Center monitoring your VoIP infrastructure, tuning the VoIP IPS to distinguish critical threats from false positives, and escalating as needed 24/7/365
Addresses your business and compliance needs with executive level and detailed reports and dashboards enabling you to visually investigate the VoIP threats and vulnerabilities targeting your business the Addresses your business and compliance needs with executive level and detailed reports and dashboards enabling you to visually investigate the VoIP threats and vulnerabilities targeting your business the
Actionable reporting tailored to your business needs, compliance standards, and investigative requirements
Customizable dashboards providing a visual representation of VoIP threats and vulnerabilities allowing you to filter detailed security event information
HOW VoIP INTRUSION PREVENTION SERVICES (VoIP IPS) WORKS
The VoIP IPS appliance is configured according to your network throughput and interface requirements
The appliance is typically installed in-line (also known as in-band) in front of your VoIP gateway, network and phone infrastructure
The IPS runs in protection/prevention mode and inspects all network traffic routed to your voice network in real time against consistently updated threat intelligence and signature updates.
Upon discovering malicious traffic that attempts to disrupt or manipulate the voice network via attack techniques such as a denial of service (DoS), eavesdropping, call hijacking, toll fraud, worms, viruses, buffer overflows, software and network exploits targeting VoIP devices, the appliance immediately drops the packets preventing the attack from reaching its intended target.
If there are Session Border Controllers (SBC) in the Voice network, our VoIP IPS has the ability to react to send pre-defined scripts to the SBC to further defend offending SIP stream activity attacking the Voice environment.
If the VoIP IPS is delivered by Clone as a Managed Service offering, the Clone Systems Security Operations Center (SOC) consistently monitors this activity and the appliance 24/7 to tune the VoIP IPS to distinguish critical threats from false positives and to escalate threats as needed.
If VoIP IPS is purchased as a standalone product, regular and timely updates are delivered to the appliance via automatic updates for the customer to implement immediately or on your own defined schedule.
Detailed Enterprise / SP diagram with options
Diagram for SMB