Security :

  • SBC DoS/DDoS protection
    • Protect SBC from DoS/DDoS attack and other malicious attacks
    • Protect SBC from non-malicious overloads
    • Allow trusted/authenticated users access while under DoS attack
    • Dynamically accept or reject traffic based on device behavior
  • Access control
    • Filter specific devices or whole networks on a per application basis
    • Permit access to known devices or networks
    • Permit access to from authorized/registered users; permit or deny access to mask users
    • Dynamically accept or reject traffic based on device behavior
    • Accept media only for authorized sessions
  • Topology hiding & privacy
    • Hide core topology to prevent directed attacks and preserve confidentiality
    • Mask user information for privacy and confidentality
    • Protect users and service provider infrastracture from eavesdroppers, identity thieves and fraud
    • Secure L2 and L3 VPN customers by maintaining security isolation between VPNs ; support inter-VPN sessions
    • Support for inter-VPN sessions; monitor media for intra-VPN sessions for lawful intercept or fraud prevention
  • Virus, worm & SPIT protection
    • Protect network from malicious attachments, prevent malformed messages from overloading resources
    • Restrict usage to prevent automated dialing/unwanted sessions
  • Service infrastructure DoS prevention
    • Prevent DoS attacks from reaching core service infrastructure
    • Prevent core from signalling overload attacks by enforcing call rate limiting, message rate limiting and code gapping policies
  • Fraud prevention
    • Perform signalling and media validation by authenticating and authorizing users
    • Enforce service contract per-user / device and prevent piggy-back usage
  • Monitoring and reporting
    • Monitor and report on alarms for attacks and overloads
    • Audit trails for attack response & fraud investigation
    • Provide secure monitoring & management access to protect from unauthorized personnel