Security :
- SBC DoS/DDoS protection
- Protect SBC from DoS/DDoS attack and other malicious attacks
- Protect SBC from non-malicious overloads
- Allow trusted/authenticated users access while under DoS attack
- Dynamically accept or reject traffic based on device behavior
- Access control
- Filter specific devices or whole networks on a per application basis
- Permit access to known devices or networks
- Permit access to from authorized/registered users; permit or deny access to mask users
- Dynamically accept or reject traffic based on device behavior
- Accept media only for authorized sessions
- Topology hiding & privacy
- Hide core topology to prevent directed attacks and preserve confidentiality
- Mask user information for privacy and confidentality
- Protect users and service provider infrastracture from eavesdroppers, identity thieves and fraud
- Secure L2 and L3 VPN customers by maintaining security isolation between VPNs ; support inter-VPN sessions
- Support for inter-VPN sessions; monitor media for intra-VPN sessions for lawful intercept or fraud prevention
- Virus, worm & SPIT protection
- Protect network from malicious attachments, prevent malformed messages from overloading resources
- Restrict usage to prevent automated dialing/unwanted sessions
- Service infrastructure DoS prevention
- Prevent DoS attacks from reaching core service infrastructure
- Prevent core from signalling overload attacks by enforcing call rate limiting, message rate limiting and code gapping policies
- Fraud prevention
- Perform signalling and media validation by authenticating and authorizing users
- Enforce service contract per-user / device and prevent piggy-back usage
- Monitoring and reporting
- Monitor and report on alarms for attacks and overloads
- Audit trails for attack response & fraud investigation
- Provide secure monitoring & management access to protect from unauthorized personnel