Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unified Communications Threat Management (UCTM) The Dark Side of SOA Solutions Roger Toennis Redshift Networks Inc. Sr. Director of Product Management.

Similar presentations


Presentation on theme: "Unified Communications Threat Management (UCTM) The Dark Side of SOA Solutions Roger Toennis Redshift Networks Inc. Sr. Director of Product Management."— Presentation transcript:

1 Unified Communications Threat Management (UCTM) The Dark Side of SOA Solutions Roger Toennis Redshift Networks Inc. Sr. Director of Product Management

2 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 2 SOA & Unified Communications Deployments Deployment of 45K UC Cisco IP Phones Deployment of 10K UC Cisco IP Phones 180K IP Phones 200k to 300K IP Phones SOA $18.2 billion in 2012 IP PBX $12 billion in 2011 UNIFIED COMMUNICATIONS $18 billion in 2011 CustomerContact Conference IP PBX Mobility 4% = Security TAM $1.2B 2011 Total Market UC $30 billion 2011 Source: Synergy, Datamonitor, Wainhouse, Ovum, Cisco, Avaya

3 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 3 The Hype Cycle Defined (Gartner) Trigger SOCIALIZATIONDELIVERY

4 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 4 Hype Cycle for Enterprise Communications Apps

5 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 5 The “Network Complexity” Threat Internal and External Complexity is the Biggest Threat

6 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 6 The Expanding Exposure/Threat Landscape WiFi Web Server Farm Email Server Farm Database Server Farm IP PBX Server Farm Enterprise B Enterprise Service Provider Dual-Mode DB Firewall Enterprise C IPS-DPI UMA/GSM WiFi/WiMax Dual-Mode Mainframes Anti-SPAM Presence/UC Server Farm VoiceEverywhere!!! SOHO/Remote BYOB “Broadband”

7 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 7 Evolution to Converged Communications Separate voice, video & Data networks Isolated networks Low Exposure Integrated voice, video & Data applications Distributed apps Hybrid networks (TDM, VOIP) Unified Communications (UC) Medium Exposure Rich multimodal user experience Dynamic applications Communications Enabled Business Process (CEBP) Built on converged networks High Exposure Modular SystemsDistributed Software and Systems Converged Communications Converged Networks Traditional Integrated Strong Security Medium Security Weak Security High Asset Exposures Medium Asset Exposures Low Asset Exposures

8 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 8 Communications Enabled Business Process (CEBP) Server/Solution Integration = New/Unknown Threat Potential

9 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 9 Evolving New Pain Points Emerge - VOIP Threats VDOS IP PBX SPIT Unified Messaging / PBX “Advertisement” Network VPhishing Banks IP PBX Network Number Harvesting IP PBX Network “123” “456” “100” “200” “300” IP PBX Network Toll Fraud London Tokyo Delhi IP PBX Network Eavesdropping 123 456 100 200 300 Uncle Mom Dad “Buy $10,000,000” “Buy $100,000,000” Fake IP PBX Customers Account Number & PIN $40 billion loss East/West banks NASA / NTT High-Tech company FBI Major hospital

10 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 10 VOIP and UC Threats Security threats to networks in general are increasing over year (CERT Vulnerability Stats) VOIP, UC and CEBP Applications present several hundreds of threat vectors (additional) Security awareness within IP telephony is lagging “traditional data” in general

11 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 11 VOIP/UC Attacks Timeline 2005 2000 1995 2010 Virus Layer 1-4 Layer 5-7 Infrastructure Application Worms SPAM Trojans Spyware Code Red $2.6B Loss Loveletter $8B Loss Slammer $2B Loss 2005 $22B loss - SPAM VOIP Toll Fraud VOIPPhishing VOIPSPIT VOIP Vmail Spoof VOIP Data toVoice Pena - $1M Stealth - $26M Panama - $100K Bank of America St. Barbara Bank East Coast Bank NASAUtility UCattacks BotNet GARTNER (2007) Enterprises that don’t spend on IP Telephony Security today will end up spending 20% of their Security Operations Budget on it in 2011. Enterprises that are proactive in nature will only spend 5% of IP Telephony Security BlackhatAnnouncesVulnerability MicrosoftAnnouncesVulnerability Cisco,Blackhat announce VOIP vulnerabilities 5% 42% 7%

12 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 12 Current Solutions are Lacking!! Unprotected Unprotected Unprotected Unprotected Unprotected Unprotected Unprotected SMTP IP/UDP/TCP Anomalies ICMP/IP Anomaly TCP Protocol Anomalies SIP/RTP SIP, SCCP, H323, RTP Exposed Weak Ports Permissions EMAILSPAM VOICESPAM (SPIT) ICMP FloodsTCP / SYNC FLOOD HTTP Brute Force Attacks SIP RTP TLS Floods Viruses Worms Malware Buffer Overflows RegistrationHijacking Toll Fraud Call ForwardingImpersonation Spoofing Collaboration Session Tear Down Illegal MediaInjection Redirection Mixing 1000s OfOther Attacks

13 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 13 Emerging Awareness of VoIP/UC Vulnerabilities Yankee Group GARTNER (2007) “Enterprises that don’t spend on IP Telephony Security today will end up spending 20% of their Security Operations Budget on it in 2011. “Enterprises that are proactive in nature will only spend 5% of IP Telephony Security” GARTNER (2007) “Enterprises that don’t spend on IP Telephony Security today will end up spending 20% of their Security Operations Budget on it in 2011. “Enterprises that are proactive in nature will only spend 5% of IP Telephony Security”

14 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 14 IP PBX, Visibility & Control of Multiple Enterprise Domains WiFi Desktop VLAN VoIP VLAN Web Server Farm Email Server Farm Anti-SPAM Database Server Farm IP PBX/Presence/UM Server Farm Enterprise B Enterprise A Service Provider UMA/GSM WiFi/WiMax Dual-Mode DB Firewall Enterprise C VoIP Wireless Security 2 Data & Voice VLAN Security 4 A. Remote User VoIP B. SIP Trunking 1 IP PBX, 3 IPS-DPI Presence Microsoft OCS CEBP Solutions 5

15 January 23-25, 2008 Miami Beach Convention Center Miami, Florida USA www.ITEXPO.com 15 IT Needs Better "Visibility" & "Control" at the… 1.Corporate Network Edge WAN Mobility/Home Office/Branch Office/SIP trunking 2.Corporate “Wireless Network” Edge Campus/Inbuilding WiFi-DECT 3.VoIP Server DMZ Critical Reliability Voice Assets PBX/Conference Bridges/IP Phones 4.UC "Desktop/Server" Integrations Next generation Desktop UC solutions (OCS/IBM Lotus/Etc) 5.CEBP "Server to Server" and “Server to Hosted Service” Integrations. Voice Enabled Oracle/SAP, Voice Enabled Salesforce.com Voice Alerts for Supply Chain, Converged B2B Federations, etc.


Download ppt "Unified Communications Threat Management (UCTM) The Dark Side of SOA Solutions Roger Toennis Redshift Networks Inc. Sr. Director of Product Management."

Similar presentations


Ads by Google