Sei sulla pagina 1di 9

W HI T E PA P E R

Hackers Are Poised to Compromise Your


Business Communications Networks

Masergy Protects
Your Business With Secure
Cloud Communications
TA B L E O F C O N T E N T S

3
INTRODUCTION
4
THE NEW THREATS
5
Unauthorized Callers
Attacks and Fraud

6
Spoofing
Unauthorized Users

7
Eavesdropping
Degrading Voice Services

8
Hardware Failures
Anomalous Behaviors

9
Attacks from Other Networks
IN T R O D U C T IO N

Illegal access. Stolen information. Toll fraud. These


are just some of the very real attacks that threaten your
business continuity. Fortunately, there’s a better way to
protect your communications networks.
Masergy’s Unified Communications as Masergy’s enterprise-grade UCaaS elements. Masergy also employs
a Service (UCaaS) solution has been helps protect your communications fault-management and network
designed to protect voice networks networks with several key features. performance-monitoring systems that
against today’s most serious security Masergy’s fully managed network detect and flag impairments — so you
threats. It detects and mitigates infrastructure uses virtually can take action quickly.
against attacks designed to steal your segmented voice and data networks,
information and services, and disrupt user authentication and access Masergy owns and operates its own
your most important business activities. control. voice and network infrastructure. That
means it can regularly enact proactive
Masergy protects its UCaaS Our specialized equipment includes measures to manage the quality and
solution using a managed network intelligent-edge devices, and security of voice and data traffic on
architecture, specialized equipment equipment configuration includes the network — helping to keep your
and secure equipment configurations. redundancy and hardened network networks even safer.
The resulting architecture helps
keep service availability high. Also,
Masergy’s fault-management and
performance-monitoring systems track Masergy UCaaS Security Overview
your network’s health; if an attack is
• Highly secure and protected service implementation
detected, Masergy’s features enable
both proactive and reactive remedies. • Secure connectivity options via Layer 3 or Layer 2 MPLS/VPLS
• Enterprise session border controllers with traffic history audits
• Stateful device registration
• SSAE-16 SOC 2 Type II Certified
T HE NE W T HR E AT S

The voice-over-internet protocol (VoIP) has achieved


mainstream acceptance among businesses. These systems
transmit voice over packet-switched IP networks, delivering far
greater flexibility and tighter integration with other business
systems than traditional phone services can.

But VoIP technology also introduces new security concerns.


Because VoIP phones inhabit the same world as other network
devices, they’re also exposed to many of the same threats.
This makes VoIP phones now nearly as big a security risk as
networked computer systems. Clearly, an equally robust method
of securing these devices is required.

Masergy’s UCaaS offers 9 security measures


aimed at preventing and counteracting today’s
most serious security concerns:

• End point provisioning


• User authentication
• Stateful device registration
• Integrated security policies
• Anti-spoofing
• Password protection
• Security verification
• Data encryption
• Session border controllers
T HE NE W T HR E AT S

1
Unauthorized Callers
Masergy’s UCaaS solution munications networks with sev-
has been designed to protect eral key features. Masergy’s fully
voice networks against today’s managed network infrastructure
most serious security threats. uses virtually segmented voice

2
It detects and prevents attacks and data networks, user authenti-
designed to steal your informa- cation and access control.
tion and services, and disrupt
your most important business Our specialized equipment in-
activities. cludes intelligent-edge devices,

Masergy protects its UCaaS solu-


and equipment configuration in-
cludes redundancy and hardened
Attacks
tion using a managed network network elements. Masergy also and Fraud
architecture, specialized equip- employs fault-management and
ment and secure equipment network performance-monitor- On a VoIP network, unauthorized
configurations. The resulting ing systems that detect and flag users who gain access can del-
architecture helps keep service impairments — so you can take uge the voice infrastructure with
availability high. Also, Masergy’s action quickly. unauthorized traffic. They can also
fault-management and perfor- conduct costly toll fraud.
mance-monitoring systems track Masergy owns and operates its
your network’s health; if an attack own voice and network infrastruc- Masergy blocks both. To prevent
is detected, Masergy’s features ture. That means it can regularly unauthorized users, Masergy re-
enable both proactive and reac- enact proactive measures to quires logon credentials to authen-
tive remedies. manage the quality and security ticate all VoIP calls. If an unautho-
of voice and data traffic on the rized VoIP endpoint tries to register
Masergy’s enterprise-grade network — helping to keep your with the voice service to place and
UCaaS helps protect your com- networks even safer. receive calls, it is blocked.

To prevent toll fraud, Masergy


tracks international call patterns. If
Masergy provides feature-rich a customer’s international calling
pattern falls outside the norm,
global Cloud Communications Masergy follows up with the cus-

solutions that are inherently tomer to determine whether the


calls are valid.
resilient and infinitely scalable.
T HE NE W T HR E AT S

3 4
Eavesdropping Degrading
A VoIP network can be vulnerable to Voice
eavesdroppers who intercept the packet
flow that carries calls. Services
To block them, Masergy offers several VoIP performance is subject to call
approaches. One is the establishment degradation. Masergy improves VoIP
of a virtual local area network (VLAN) on performance by creating virtual bound-
the user’s network. A VLAN can be used aries between its voice and data traffic
to logically separate VoIP phones from within the integrated network.
the user’s PC network, putting them be-
yond the reach of would-be interceptors. This also improves security. Masergy
provides logical segmentation of the
Outside the customer’s LAN, Masergy’s core network; this enables prioriti-
VoIP traffic flows are carried through a zation of voice traffic and the imple-
combination of trusted Tier 1 carrier net- mentation of voice-specific security
works and Masergy’s core network. All policies. As an extra bonus, virtualized
elements outside the LAN are located boundaries between the voice and
within secure central offices and collo- data networks can prevent the very
cation facilities, making them extremely types of data-service attacks that typi-
resistant to compromise. cally degrade voice services.

Masergy employs an extensible IP communications


system that offers enterprises a unified
communications platform for voice (VoIP), data,
video and mobile communications across all of their
global locations.
T HE NE W T HR E AT S

Application
• Data Encryption (SSL/TLS/IPSec)
• Role-based access control (enterprise
admins, group admins, and users all
have different access rights)
• Accounting (complete user activity and
change history

5
• Real-time analytics with CDR details
and MOS for every call
• Authentication (Digest based,
minimum complexity
Spoofing
Attackers can spoof IP addresses must match those of a valid user; if
by tricking a network element they do not, the Masergy network
into believing that their intrud- refuses the registration.
ing IP packets originated from a
trusted host. • Origination Spoofing: In this
type of attack, a SIP endpoint
To stop them, Masergy offer built- pretends to be a user making an
in features that help prevent two outgoing call. This can be done

6
common types of spoofing fraud: by simply sending an invitation
with the “From” header set to the
• Termination Hijacking: This spoofed user.
occurs when a Session Internet
Protocol (SIP) endpoint pretends to
be a user’s current endpoint. When
Masergy prevents this with auto-
matic access-control lists. When
Unauthorized
successful, all incoming calls for
that user are routed to the offend-
an invitation is sent, the Masergy
system checks whether its IP ad-
Users
ing SIP device. dress is contained in the automatic Intruders, thieves and other
access-control list. If it is not, the unauthorized users can try to log
Masergy prevents this type of fraud packet is dropped. Masergy’s onto network servers and routers.
with what’s known as registration network is also configured to To block them, Masergy main-
authentication. In this process, challenge SIP invitations for user ID tains full control of its customers
the user’s ID and password are and password. If the provided cre- on-premises networking hardware.
requested whenever a SIP register dentials do not match, then again For example, when Masergy in-
is received. This ID and password the packet is dropped. stalls routers, it also assigns each
device a randomly generated —
and therefore difficult-to-guess —
password. Masergy also maintains
its customers’ usernames and
passwords in a controlled data-
base available only to Masergy’s
authorized support staff.
T HE NE W T HR E AT S

7 8
Hardware Anomalous Behavior
Failures Cybercriminals don’t behave like
other network users. To catch
report and acts to diagnose and
deal with any problems.
Attacks can bring down network hard- them before they do harm, Maser-
ware, preventing your staff from com- gy constantly monitors its VoIP Also, Masergy constantly monitors
municating and working. To prevent service to verify that all systems the performance of its voice and
this from happening, Masergy deploys are running properly. Masergy also data networks, comparing the
redundant infrastructure equipment sets traps for network criminals; performance against a baseline.
and hardened network elements. when the traps catch anomalous Any significant deviation from
These help protect your network behavior, Masergy’s fault-manage- this baseline is reported to the
against attacks launched on the VoIP ment system automatically detects fault-management system for ac-
infrastructure. and reports on it. Then, Masergy’s tion by the NOC staff. In the event
Network Operations Center (NOC) that an attack does slow down
In the unlikely case that a hardware determines the severity of each service, it is dealt with promptly.
failure or attack does disable a network
element, Masergy’s redundant de-
ployment triggers a backup system to
take over automatically. With the sole
exception of the access line, Maser-
gy deploys every network element
Systems
involved in VoIP with redundancy.
• Intrusion detetion system
to prevent TDoS attacks
• Fraud detection system to
monitor call patterns and detect
abnormalities
• Automated software upgrades
and configuration management
• Server hardening and
interoperability testing
T HE NE W T HR E AT S

Networks
• UCaaS infrastructure is embedded in the fabric of
Masergy’s highly reliable network architecture (no NNIs)
• Internal segmentation and network isolation
• Data encryption using SSL, TLS, IPSec
• MPL, VPLS and point-to-point secure private
connectivity options
• 100% in-sequence packet delivery with <1ms jitter - ideal
for real-time application delivery

9 About Masergy
Masergy provides feature-rich
global unified communications
Attacks from Other Networks solutions that are inherently
resilient and infinitely scalable.
Among the many prime locations for are the only entities visible from the Through its extensible, highly
attackers are the borders between other networks. Also, all “unman- scalable IP communications
networks. Typically, partners work aged” endpoints — that is, endpoints system, Masergy offers a uni-
together to originate and terminate not on Masergy’s managed-access fied digital platform for voice,
calls on the public switched telecom network — must pass through a ses- data, video and mobility com-
network (PSTN). Between them are sion border controller for additional munications around the world.
IP interfaces. Left unprotected, these protection.
Masergy’s solution suite tightly
borders can be highly vulnerable.
integrates dispersed communi-
While access-control lists can ad-
cations endpoints for office, mo-
Masergy protects its network bor- equately protect a voice service,
bile and call-center employees.
ders, in part, with access-control Masergy goes one step further: It
Our customers increase their
lists on its gateway routers. This places VoIP session border con-
productivity, accelerate their
guards Masergy’s voice infrastructure trollers between its network and
business processes and improve
and its customers’ VoIP networks those of other carriers. This makes
the levels of care they provide
against attacks originating on carri- it possible to reduce the complexity
their own customers.
er networks. All internetwork VoIP of the access-control lists, while also
traffic must register with — and pass enhancing both security controls and To learn more and
through — these gateways, which quality-of-service verifications. contact a Masergy
representative, visit
us today

+1 (866) 588-5885 44 (0) 207 173 6900

Potrebbero piacerti anche