VoIP Security Assessment Service Mark D. Collier Chief Technology Officer

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
Network Systems Sales LLC
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
Sonus SBC1000, SBC 2000 Competitive Positioning
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
TeleWall, TeleSweep Secure, TeleAudit, TeleVPN, ETM, TeleView, TeleBridge, TeleIDS, TeleWall NET, SecureLogix, SecureLogix Corporation and the SecureLogix.
SIP Trunking and the SMB Jason Walker Cbeyond. Cbeyond Solution Productivity Enhancing Applications for Entrepreneurial Business –Voice & Broadband –Mobile.
System Security Scanning and Discovery Chapter 14.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Computer Security and Penetration Testing
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Enterprise Network Security Accessing the WAN Lecture week 4.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Joel Maloff Phone.com February, 2012.
© 2009 Avaya Inc. All rights reserved. Introduction to SIP Trunking Alan Klein Consulting Systems Engineer February 2009.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
HackerHalted VoIP Security Uncovered Mark D. Collier Chief Technology Officer SecureLogix Corporation
1 CCM Deployment Models Wael K. Valencia Community College.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Additional SugarCRM details for complete, functional, and portable deployment.
The Voice Security Company Kirk Vaughan Product Director –VoIP SIP Application Security.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Samsung Proprietary & Confidential 2/29.
Barracuda Load Balancer Server Availability and Scalability.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
VoIP Security Best Practices Bogdan Materna CTO & VP Engineering VoIPshield Systems Session: U /02/2009.
An Introduction to IBM Systems Director
Copyright Security-Assessment.com 2004 Security-Assessment.com Hacking VoIP Is your Conversation confidential? by Nick von Dadelszen and Darren Bilby.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
The Role of High Availability Software in Quality of Service Joe McFadden Vice President, Marketing, Nuasis.
VoIP Technology Briefing
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Real Time Monitors, Inc. Switch Expert™. 2 Switch Expert™ Overview Switch Expert ™ (SE) currently deployed at 80% percent of the INSIGHT-100.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Configuring Network Devices Working at a Small-to-Medium Business or.
Copyright  StarVox, Inc, - All Rights Reserved- Services Platform Requirements for for Next Generation Networks Next Generation.
Voice over IP Are we there yet ? Presented by: Mark Caswell, Empire Technologies, LLC. Voice over IP.
Appendix A UM in Microsoft® Exchange Server 2010.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
Building the Right IP Call Center Strategy Joe McFadden Vice President, Marketing, Nuasis.
Enterprise VoIP Security Threats  Agenda:  Introduction  Why worry?  What do we need to look at?  What have I seen in the past?  What can I do to.
Jan 24, 06William Rich, Pingtel Corp. IT Expo. Pingtel Corp., William Rich, IT Expo, Jan 24, 06 VoIP is Here… Source: IDC IP PBX vs. TDM PBX.
Lucent Technologies – Chris Miller
Softswitch SIP Proxy Server Call Manager IP Telephony Router Tablet PC IP PBX Class 5 Switch Class 4 Switch PBX Access Gateway Broadband Router Voice Gateway.
5/18/2006 Department of Technology Services Security Architecture.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Modern Challenges for IT Governance, Risk, and Compliance in the Enterprise Brian Robison Product Manager McAfee Eric Fredericksen, PhD Solutions Architect.
ROI for VoIP in the Enterprise A business case for Zultys VoIP Solutions.
Living With Your New IP PBX David M. Laurenson, VP Information Technology and CIO A. Finkl & Sons A.Finkl & Sons founded in 1879 HQ in Chicago World’s.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
March 2009 Sipera Overview. 2 © 2009 Sipera Systems, Inc. All Rights Reserved. About Sipera  Leader in real-time Unified Communications (UC) security.
Secure Software Confidentiality Integrity Data Security Authentication
Network Security and Monitoring
Sizing …today. T: Here’s how. .
Configuring Network Devices
AT&T Firewall Battlecard
Introduction to Networking Security
Presentation transcript:

VoIP Security Assessment Service Mark D. Collier Chief Technology Officer

VoIP systems are vulnerable:  Platforms, network, and application are vulnerable  VoIP-specific attacks are becoming more common  Security isn ’ t always a consideration during deployment The threat is increasing:  VoIP deployment is growing  Deployments are critical to business operations  Greater integration with the data network  More attack tools being published  The hacking community is taking notice VoIP Security Status

Internet Connection Internet Voice VLAN Public Voice Network Campus VoIP TDM Trunks TDM Phones IP Phones Data VLAN PCs IP PBX CM GatewayDNS Admin DB TFTP DHCP The threat is primarily internal

Internet Connection Internet Voice VLAN Public Voice Network Public VoIP SIP Trunks TDM Phones IP Phones Data VLAN PCs IP PBX CM GatewayDNS Admin DB TFTP DHCP And may also be external when SIP trunks are used

IP PBX:  Server platforms  Various gateway cards  Supporting infrastructure Network:  Switches, routers, firewalls  VLAN configurations Endpoints:  IP phones and softphones Vulnerabilities Across Components

General Purpose Operating System Network Stack (IP, UDP, TCP) VoIP Protocols Services TFTP, SNMP, DHCP, DB, Web Server Voice Application Worms/Viruses Targeting The Operating System Trivial DoS Attacks MITM Attacks TFTP Brute Force Attack SNMP Enumeration DHCP Starvation SQL Slammer Worm Vulnerabilities at Multiple Layers Flood DoS Fuzzing Application Attacks Poor Configuration Weak Passwords Insecure Management Insecure Architecture

There is no “ one ” security product that is needed for campus VoIP environments What is needed is to secure the various vendor VoIP offerings Securing deployments is possible, but requires proper configuration, features, and products SecureLogix is offering a VoIP security assessment service VoIP Security Assessment Service

Based on real-world enterprise assessment experience Ongoing custom test tool development Completed Hacking Exposed: VoIP Includes on-site assessments as well as remote-assisted VoIP Security Assessment Service

Vulnerability assessment process consisting of:  Discovery tests (Footprinting, scanning, and enumeration)  Network tests (DoS, eavesdropping, MITM)  Vendor platform tests  Application and configuration tests Tools are freeware, commercial, and proprietary Optional external visibility and access tests Optional penetration tests Security policy and checklist review Provide tailored recommendations Basic Process

Assessments are based on-site testing An “ appliance ” based, recurring assessment capability will be available in Q2. Engagements vary from 1-8 weeks, depending on scope Include testing of all model sites Staffed internally with SecureLogix personnel Delivered stand-alone or as part of a broader security assessment Cleared personnel for government engagementsDelivery

A subscription based service available in late Q2 A hardened Linux appliance is delivered and installed with the necessary network interfaces The appliance establishes an SSH connection with SecureLogix The appliance runs the same set of tests and reports. Some are automated and some are scheduled by SecureLogix The results are used to build the same set of reports Appliance-Based Delivery

Assessment report including:  Executive summary  Key findings  Summarized results  Tailored recommendations Executive and technical level presentation Security policy/checklist recommendations All raw dataDeliverables