Large-scale UC Providers & Facilities-based Telecom, Mobile and Cable Operators

Complete carrier-class protection

With RedShift Networks UCTM solutions, complete carrier-class protection, including high performance calls-per-second, active registrations, and SIP session support, are a reality  for large-scale UC providers and facilities-based telecom, mobile and cable operators.  The revenue and service opportunities realized because of the transition of telecom operators into IP service providers, whether fixed, mobile, cable (MSO) or wholesale providers, are compelling. RedShift’s comprehensive detection, management and control solution seamlessly address the core components of the telecom carrier network, as well as upstream and downstream behaviors, traffic, signaling, call states, and endpoint security.

The migration for minutes of usage models to application-based services allows providers to increase their value, while leveraging the benefits of rapid new service deployment. VoIP services, video collaboration, and mobility are now the primary revenue drivers for carriers.

img-large-scale-uc-providers-solutions

With these new services, providers need to increase their level of real-time security through UCTM by delivering:

  • Proactive analysis and policy implementation enable operators to identify and mitigate threats as quickly as possible while reducing false positives and negatives
  • Automatic updates sourced from RedShift Networks global network of threat detection devices as attack models continue to evolve both at the global and regional level
  • A full product line that scales from enterprise to the largest carrier network, operators can deploy a comprehensive, integrated UC security solution, all from a single vendor
  • Visibility, control and protection of core infrastructure including softswitch, application servers and directories
  • VoIP and UC state monitoring including traffic analytics
  • Security across signaling, media and application layers – layer 3 through layer 7
  • Advanced behavioral learning algorithms
  • UC and Collaboration application-aware security
  • Attack detection, prevention, remediation and reporting

Distributions of Attack Types

distribution-of-attack-types

Newer data-centric architectures like IMS and LTE are designed to enable carriers to deliver flexibility and operational improvements necessary to provide these services. At the same time carriers are now faced with evolutionary challenges. In the past, telecom carriers regarded security as critical for five-nines reliability. The architecture of the PSTNs (public switched telephone networks) were closed and for the most part proprietary, unlike those of present day IP systems where security for real time services like VoIP is not inherent.

Customers expect all UC services to be secure, relying on service providers to insure the security of the network and its components from end to end. The specialized requirements of VoIP security are often an afterthought. VoIP system implementation is seemingly ad hoc and based on customer demand / revenue requirements. At the same time, operators are increasingly faced with an expanding set of vulnerability to attack in terms of number and severity, as Unified Communications concentrated within the service provider networks become high value targets for cybercrime.

Organized cybercrime driven by malicious hackers traditionally targeted data services and applications. However, a growing number of threats now specifically target VoIP service components such as user endpoints, Softswitches, IP-PBX, SIP services, network directories, and user databases. The volume and frequency of VoIP and Unified Communication threats is rapidly increasing. CSP and enterprise losses through a successful attack are extensive ranging from millions in revenue to loss of privileged access information. The potential erosion of customer confidence and loyalty is often catastrophic.

Toll Fraud and Denial of Service (DoS/DDoS) attacks are omnipresent threats to all operators. These attack models are accurately detected through UCTM visibility into endpoint actions, signaling and media protocols, and through applications awareness. By correlating event analytics, with an in-depth understanding of service behaviors, loss due to compromised software elements and unauthorized RedShift ensures operator alerts and automation are in place. This approach also reduces false positives and negatives that occur when security devices have only a limited view of the network and its operation.

Sign up for SHOUT OUT

A Monthly Newsletter from RedShift Networks

Start typing and press Enter to search