Reducing Telecoms Fraud Losses

Size: px
Start display at page:

Download "Reducing Telecoms Fraud Losses"

Transcription

1 Reducing Telecoms Fraud Losses A Telsis White Paper Intelligence for Your Network

2 Introduction According to the Communication Fraud Control Association (CFCA), fraud costs the telecoms industry 1.69% of all revenues that s over $38bn annually. The techniques that criminals are using are becoming increasingly sophisticated and telecoms interconnect agreements and international trading agreements make it difficult to prevent the criminals from receiving the proceeds of their fraud. This white paper looks at some of the common ways in which these criminals are committing telecommunications fraud and what steps Network Operators may take in order to prevent it happening. Introduction to Telecoms Fraud Since the origination of the first telephony services, criminals have sought ways to use them for fraudulent purposes. Early types of fraud were basic (such as using the phone to impersonate someone), however fraudsters have become more sophisticated and the types of fraud being perpetrated have become far more difficult to detect and prevent. The Communication Fraud Control Association (CFCA) estimates that fraud is costing the telecoms industry 1.69% of all revenues. The biggest single type of fraud is International Revenue Share Fraud (IRSF) which alone accounts for over 28% of all fraud. Traditional switched telephone networks have suffered from a range of different types of attack by fraudsters. However, the liberalisation of the telecoms market and the move to IP based telephony has opened up telephony networks and increased the opportunities that criminals have to commit telephony fraud. SS7 based telephony networks were inherently secure due to difficulties in gaining physical access and technical obscurity. Modern IP networks do not provide the same level of physical security. Packet based networks are more accessible than TDM networks and SIP is more widely understood than SS7. This means that in general, SIP based networks are less secure than SS7 networks. As we enter the world of SIP interconnects, operators will need to implement robust fraud control measures to detect and manage fraud. Otherwise their losses are set to increase. The ease of configuration of SIP based systems will also lead to an increase in fraud. Whereas it was difficult to configure TDM equipment (often requiring proprietary management tools), configuring VoIP equipment is trivial by comparison. This opens the window for disgruntled employees to make malicious configuration changes to network systems.

3 International Revenue Share Fraud International Revenue Share Fraud (IRSF) relates to fraudulent calls to international numbers where the criminal receives revenue from those calls. Revenue comes either directly from the terminating Network Operator as part of a revenue share agreement or by other means, such as hijacking of the interconnect. Calls may be made by a number of different means, such as hacking, tricking people into making calls, or by illegally obtaining SIM cards. In each case, the result is the same calls are made to these IRSF numbers. In most circumstances, Network Operators try to pass the liability for the cost of these calls onto the person or company whose account has made the fraudulent calls. While this approach can damage the Network Operator s brand, recent cases in some jurisdictions mean that it is actually the Network Operator that is responsible for these losses. Many jurisdictions now take the approach that a Network Operator cannot enforce charges for fraudulent calls as they cannot benefit from the proceeds of a crime. Differences between International and Domestic Revenue Share Fraud International Revenue Share Fraud (IRSF) and Domestic Revenue Share Fraud (DRSF) (also known as Premium Rate Service Fraud), may be committed using similar methods. However, it is IRSF that is used by the majority of organised criminals. Interconnect Hijacking In order to maximise profits, organised fraudsters may look to hijack interconnects. To hijack interconnects, fraudsters obtain a number range in an island state, such as a small Caribbean island that has a relatively high international call termination rate and set up an international interconnect service. They then advertise a low interconnect rate for calls to that island and have calls routed via their interconnect. Legitimate calls to the island are routed correctly (often at a loss) such that the interconnect passes any call tests but calls to their number ranges are terminated before they reach the island, ensuring that the fraudsters maximise their revenue. For example, if we assume that the island s regulators impose a $0.10/minute termination charge for international calls, then legitimate interconnect carriers would charge at least $0.11/ minute for calls to that island, allowing them to make a margin for handling the call. If a fraudster offers an interconnect at $0.10/minute for calls to the island, then least cost routing rules would ensure that their route is chosen, providing the route passes call quality tests. In reality, the fraudster would simply use another interconnect company to route legitimate calls to the island at a loss, however for calls to their numbers, they would not route calls to the island and would take the full $0.10/minute for their calls. If there are 10,000 legitimate call minutes per day to the island but the fraudster manages to artificially inflate traffic to their numbers by 100,000 per day, then the legitimate calls would cost them $100 per day (10,000 minutes at $0.01/minute) but their income from fraudulent traffic would be $10,000, resulting in a net profit of $9,900. The main advantage of IRSF over DRSF for criminals is that due to the international nature of the fraud, it is very difficult for payments to be stopped and for police agencies to co-ordinate efforts to disrupt the fraud. International interconnect agreements typically state that payments must be made even if fraud is suspected. Given that a typical case of IRSF may involve three or more different countries, it is difficult for national police agencies to track the fraud. On the other hand, many domestic telecoms regulators allow network operators to delay or stop payments for suspected fraudulent calls. If the criminal is not going to be paid for calls, or faces arrest from a national policing agency, then they will not commit that type of fraud.

4 How to Commit Fraud IRSF may be committed using a number of different methods. Some of the common methods are outlined below. PBX Hacking In this case, Network Operators provide SIP and ISDN trunking to their enterprise customers. These enterprise customers typically connect their trunks to premises based PBX systems. (Some enterprise customers are moving towards Network Operator hosted PBX solutions.) Once a hacker has gained access to a PBX, they may use it to commit international or domestic revenue share fraud. IP Device Hacking Although SIP telephony has been mainly restricted to business use, residential use of SIP telephony is on the increase. A number of broadband routers now support SIP Gateway functionality, providing an interface that allows analogue telephones to be connected. Vulnerabilities in early devices have allowed hackers to take over these devices and use them to make calls. Calls made by the enterprises are made through the PBX to the Network Operator. The calls may then traverse one or more transit carriers before reaching their destination. Many PBXs, particularly new IP PBXs that offer remote management, are not secure and may be vulnerable to attack by hackers. Common weaknesses include default passwords, poor password security, software bugs, weak dial-in PIN codes and poorly configured controls. An increasing number of devices support this functionality and have the potential to suffer the same vulnerability. Due to the nature of consumer behaviour, such devices are likely to remain unpatched, even where fixes are available. Once a hacker has gained access to an IP device, they may use it to commit international or domestic revenue share fraud.

5 Subscription Fraud Post-paid (often called contract) SIM cards allow users to make calls on account, and settle their bills on a monthly payment schedule. As with Subscription Fraud, the proceeds may be enhanced by using the SIM with Multiparty Conferencing or Explicit Call Transfer to establish multiple simultaneous calls. In order to obtain a post-paid SIM card, customers must go through a series of checks in order to confirm who they are and that they are credit worthy. Criminals may use fake or stolen identity in order to obtain a post-paid SIM card. Dealers may also work with criminals to make it easier for them to obtain post-paid SIMs. Once the fraudster has got hold of the SIM card, they may use it to commit international or domestic revenue share fraud. The proceeds from this type of fraud may be enhanced by using the card whilst roaming (in an effort to maximise the time taken to detect the fraud) and by using GSM techniques such as Multiparty Conferencing or Explicit Call Transfer to establish multiple simultaneous calls from a single SIM. Stolen Devices Mobile phones are an attractive target for criminals such as pickpockets. In addition to being able to resell the actual phone, they are able to exploit the SIM card to commit fraud before the owner reports the phone as being stolen. Criminals often target foreign tourists, as they are generally unfamiliar with where they are and may take time to understand how they can report their phone as being stolen whilst they are abroad. Once the fraudster has the SIM card, they may use it to commit international or domestic revenue share fraud by placing the SIM in an auto-dialler device. Where CAMEL based roaming is not available, operators rely on CDR based reconciliation. This makes it more difficult for operators to detect this type of fraud. Account Takeover Most VoIP services rely on the use of private credentials that are used to identify user accounts and allow devices to register with the network. There are a number of ways in which a fraudster may steal user account credentials such as: Snooping insecure data networks for login details Phishing/social engineering to trick the user into providing their details Tricking the service provider to provide account details. For example, calling customer support to say that they have a new device, but can t remember their account details. Once they have obtained the user s credentials, they may change those credentials to lock the user out of the account. Once a fraudster has taken over an account, they may use it to make calls and commit international or domestic revenue share fraud. Wangiri Wangiri (literally, One [ring] and cut ) is a type of fraud that originated in Japan. The aim of Wangiri is to get users to call a premium rate number (national or international).

6 To commit Wangiri, short calls are made to a number of users. These calls appear to originate from the fraudster s international number, however they may actually be made from another location using CLI spoofing. The calls are short enough that they are not answered, but long enough to leave a missed call on their phone. Usually mobile phones are attacked by this fraud but other phones could also be targeted. When the user sees the missed call on their phone, they think that it is a genuine missed call and call the number back. They are then charged for this call. The fraudster may simply play ring tone for a period of time leading to increased call durations. Victims of this fraud may not realise that they have been subject to fraud until they receive their monthly bill. Detecting Fraud For many Network Operators, the easiest way to detect call fraud is to perform statistical analysis of Call Detail Records (CDRs). By analysing CDRs, network operators are able to: Detect when the call volumes to certain destinations increase Detect unusual call patterns such as a sudden increase in overnight calls from a customer Detect unusual patterns of overlapping calls (for example multiparty calls) From this analysis of CDRs, Network Operators are able to identify compromised accounts and high risk destinations that terminate fraudulent traffic. Once the fraud has been detected, they may configure their network to block subsequent calls. Although this CDR analysis approach is useful for blocking future fraud, it s only effective once fraud has occurred and the Network Operator has already incurred costs. In other words, it s a reactive approach. Reducing Fraud Windows Most early CDR processing analysis tools processed CDRs a few times each day. This resulted in quite large fraud windows, as it may take several hours for the fraud to be detected. One of the strategies for reducing fraud is to process CDRs more frequently with a lower latency. Some newer CDR analysis tools are able to cut the time required to detect fraud down to 30 minutes or even less. Automation Even when CDR analysis tools flag up an incident to action, the manual nature of the processes required to reconfigure the network to block fraud, mean that it may still take time to stop the fraud occuring. This is especially true out of hours, in the evenings and at weekends. This has led to a change in the behaviour of fraudsters, with most starting to commit fraud overnight or at the weekend to maximise their income before the fraud is blocked. In order to overcome these limitations, fraud management tools are starting to integrate with network systems in order to automate the process of blocking fraudulent calls. When fraud is detected, the fraud management system automatically provisions call blocking rules to the core network, reducing the latency between detection and blocking. Honeypots and Hot Numbers The above strategies are all based around detecting fraud after it has occurred. An alternative approach that is used to detect the numbers used to commit IRSF is the use of honeypots to generate lists of hot numbers. A honeypot is an PBX that is left unsecured with its default password. This may typically be an Asterisk PBX that is exposed to the Internet in its default configuration. Such open devices are quickly detected by hackers, who then create their own access accounts and take over the device. Once a hacker has taken over a device, at some point (typically on an evening or weekend), they will start to attempt to make calls to the IRSF numbers which they own. By monitoring these calls, Network Operators are able to use these numbers to block subsequent calls to those numbers. In order to increase the effectiveness of hot number databases, telecoms trade associations may collate and share lists of hot numbers generated by its members with other members.

7 Case Study - German Tier-2 Operator VSE NET, a regional telecommunications provider based in the Saarland region of south-west Germany, recently installed Telsis fraud prevention solution Voice SafeGuard. Having discovering a fraud attack on one of their customer s PBX, VSE NET started using CDRs to detect fraudulent usage. While this analysis led them estimate that the impact of fraud was costing them between 100k and 200k per annum, they could only detect the fraud once it had occurred, and they decided that they needed a proactive real time solution. Since installing Telsis Voice SafeGuard, VSE NET have seen a significant reduction in fraud losses. Michael Leidinger, Managing Director at VSE NET has said Comparing the before and after data, we observed the incidence of fraud reduced by a factor of 100:1. A typical fraud attack previously cost us an average of 1000 and we have now been able to reduce this to only 13. Voice SafeGuard Business Case Voice SafeGuard typically offers rapid payback and generous ROI. The tables below show payback and 3-year ROI for two of Telsis recent customers. Real-Time Fraud Prevention Telsis Voice SafeGuard takes an alternative approach to blocking IRSF. Rather than taking a reactive approach to blocking fraudulent calls once the fraud has taken place, the approach taken by Voice SafeGuard is to block calls in real time and works equally well at the weekend and holidays as it does during working hours. Rather than analysing CDRs, Voice SafeGuard sits within the telephone network and makes its decisions in real time, deciding whether a call should be allowed, before the call is actually connected. Voice SafeGuard uses the same call meta information as CDR based solutions, but does it at the network level, allowing it to analyse call patterns in real time as calls are being made, removing CDR generation and processing latencies. When a new call is made to a high value destination, such as an international or premium rate call, Voice SafeGuard is able to analyse the source and destination addresses and decide if it should allow or reject the call. Rather than rejecting calls, Voice SafeGuard is also able to operate in monitor mode, where it still detects fraudulent calls, but simply generates alerts rather than actually rejecting traffic. Challenges Facing MVNOs Thin Mobile Virtual Network Operators (MVNOs) face a particular challenge when looking to combat telephony fraud. Thin MVNOs do not have access to the network. They simply issue SIMs, invoice customers and pay charges to the MNOs that host their services. If they are the target of subscription fraud, then users could run up significant charges before the MVNO detects the fraud. Losses may be further compounded by the use of multiparty calling, which allows each SIM to have 6 simultaneous calls in progress at a given time. In order to detect fraud, MVNOs should ensure they receive Near Real Time Roaming Data Exchange (NRTRDE) records from their hosting provider. They should then pass these NRTRDE records through fraud detection algorithms, instructing their MNO to block any SIM cards that fail fraud checks. While this approach does not eliminate all fraud, it does reduce fraud windows and their associated losses.

8 In addition to simply blocking new calls, Voice SafeGuard also has the ability to tear down calls in progress once fraud has been detected. For example, should Voice SafeGuard detect a new IRSF number, it is able to clear any calls in progress to that IRSF number. This is particularly useful where the fraud involves multiple long calls to a fraudulent number further reducing operator losses. For more information on Voice SafeGuard, please visit or contact a Telsis representative. ABOUT TELSIS Telsis is a leading innovator in telecoms network service intelligence and has a wealth of experience in this area. Founded in 1987, Telsis has been promoting service innovation to both incumbent network operators and other licensed operators for more than a quarter of a century. The Ocean range of Voice and Next Generation Products are in service with some of the world s leading operator groups including BT, EE, Telefonica and Vodafone as well as regional operators including EWE Tel, KCom, M-Net and TalkTalk. Telsis can help operators make the most of their investment by providing service development and migration consultancy, helping operators to move from TDM to NGN at their own pace in small, reversible steps whilst offering the same services across both technologies. Glossary Acronym Term Definition CAMEL Customised Applications for Mobile network Enhanced Logic An application to easily extend the services offered within a GSM network CDR Call Detail Record A record of a call that is used for billing purposes and may also be used for analytical purposes CLI Calling Line Identity A telephone number that indicates the origin of a call. IP Internet Protocol A protocol for transferring data between two end points on a network IRSF ISDN NFV PBX PRS SDN SIGTRAN SIP SS7 TDM International Revenue Share Fraud Integrated Services Digital Network Network Function Virtualisation Private Branch Exchange Premium Rate Service Software Defined Network Signalling Transport Session Initiation Protocol Signalling System No. 7 Time Division Multiplexing A type of fraud involving premium rate numbers in different countries A standard for sending voice, video and data over digital phone lines A network architecture using IT virtualisation technology to create telephony networks A small telephone exchange device that serves a particular business or office A telephone service where the call charges are higher than normal call charges A network architecture where the control and management of the network is split from the actual network devices A technology for transporting SS7 signalling messages over an IP network A next generation telephony signalling protocol A telephony signalling protocol that is used within and between TDM telephony networks A method of transmitting multiple telephone calls over a single physical data link. VoIP Voice over IP A technology for carrying calls over an IP network Contact: contactus@telsis.com UK t: +44 (0) Germany t: +49 (0) Copyright Telsis Communication Services Limited Telsis products are subject to continual development and specifications may change. Prospective buyers should exercise their own independent judgement to confirm the suitability of our products for their particular application. All trademarks are the property of their respective holders.

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are: Introduction to Telecom Fraud This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud

More information

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G W U G M a l a y s i a 2 0 1 7 CONTACTS NUNO PESTANA FRAUD PROFESSIONAL SERVICES MANAGER +351 939 651 481 nuno.pestana@wedotechnol

More information

David Morrow. Preventing PBX Fraud. -basic steps to help secure your PBX. prevention will always be cheaper than cure

David Morrow. Preventing PBX Fraud. -basic steps to help secure your PBX. prevention will always be cheaper than cure David Morrow Preventing PBX Fraud -basic steps to help secure your PBX prevention will always be cheaper than cure Contents 1 About the Guide 3 2 What you need to know 3 3 What you need to Do 6 4 If you

More information

PBX Fraud Information

PBX Fraud Information PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks

More information

Fraud Detection in International Calls Using Fuzzy Logic

Fraud Detection in International Calls Using Fuzzy Logic Fraud Detection in International Calls Using Fuzzy Logic Osama Mohamed Elrajubi, Hussein Marah, Abdulla A. Abouda Abstract Telecommunications fraud is a problem that affects operators and telecommunication

More information

Paper on Handling Menace of International Grey Traffic

Paper on Handling Menace of International Grey Traffic Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in

More information

Telephony Fraud and Abuse. Merve Sahin

Telephony Fraud and Abuse. Merve Sahin Telephony Fraud and Abuse Merve Sahin sahin@eurecom.fr Background 2 Telephony Networks Quick history 1870s: Plain Old Telephone System (POTS) Enabled by transmission of voice over copper lines Used in-band

More information

Nuno Pestana, WeDo Technologies

Nuno Pestana, WeDo Technologies Nuno Pestana, WeDo Technologies SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud FRAUD THE IMPACT

More information

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE

More information

IP Interconnection. Calvin S. Monson Vice President. Antigua September 2007

IP Interconnection. Calvin S. Monson Vice President. Antigua September 2007 IP Interconnection Calvin S. Monson Vice President Antigua 10-13 September 2007 ICT Regulation Toolkit Sponsored by ITU and World Bank s infodev Link to ICT Regulation Toolkit: http://www.ictregulationtoolkit.org

More information

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales The New Mavenir: Combining Market Leaders Combing three industry-leading companies to

More information

VoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power

VoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power VoIP Theft of Service Protecting Your Network Introduction to VoIP Theft of Service The truth is you just aren t a phone company until you ve had a run-in with telecom fraud. VoIP fraud is a significant

More information

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE The following terms and conditions are additional to those in the prevailing Viatel General Terms and

More information

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page

More information

Technical Bulletin. Toll Fraud Reminder & Update

Technical Bulletin. Toll Fraud Reminder & Update 1 Technical Bulletin Bulletin Authorisation Detail Author Andrew Kenyon Authorisation Wilf Wood Date 24/01/2011 TB Number TB - 11001 Description Toll Fraud Reminder Toll Fraud Reminder & Update Toll fraud

More information

Office Net Unlimited with VDSL Available until 31 October 2017 Service Description

Office Net Unlimited with VDSL Available until 31 October 2017 Service Description Office Net Unlimited with VDSL Available until 31 October 2017 Service Vodafone s Office Net Unlimited with VDSL is a fixed calling and broadband product. This Service sets out the terms and conditions

More information

An Introduction to the Max PVN

An Introduction to the Max PVN An Introduction to the Max PVN Net2Phone Overview 2 VoIP Leader Net2Phone is a leading provider of VoIP products and services throughout the world #1 worldwide for retail VoIP services Proven, scalable

More information

Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days

Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days Title: Comprehensive Training on Bypass/SIM Box Fraud: Detection and Termination Duration: 3 day

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

ITSPA RECOMMENDATIONS FOR SECURE DEPLOYMENT OF AN IP-PBX PUBLIC NODE4 LIMITED 17/07/2017

ITSPA RECOMMENDATIONS FOR SECURE DEPLOYMENT OF AN IP-PBX PUBLIC NODE4 LIMITED 17/07/2017 ITSPA RECOMMENDATIONS FOR SECURE DEPLOYMENT OF AN IP-PBX PUBLIC NODE4 LIMITED 17/07/2017 DOCUMENT SOURCE Internet Telephony Services Providers Association Recommendations for secure deployment of an IP-PBX

More information

David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited.

David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited. David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited www.i3forum.org GSM Association Fraud Forum Presentation to i3 Forum David Morrow, Vodafone Document Number Meeting Date

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points WHITE PAPER Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS Starting Points...1 The Four Essentials...2 The Business Case for SIP Trunks...3 To benefit from the latest

More information

MASTER SERVICES AGREEMENT SERVICE DESCRIPTION

MASTER SERVICES AGREEMENT SERVICE DESCRIPTION : SMART SIP PART A PRODUCT OVERVIEW The Smart SIP service employs Session Initiation Protocol (SIP) for voice and multimedia communication sessions and connects to a range of end user phone systems such

More information

5 common concerns about moving to SIP...

5 common concerns about moving to SIP... 5 common concerns about moving to SIP... 5 common concerns about moving to SIP... When first considering a new technology for your business, there are any number of variables you need to consider. SIP

More information

Fraude dans la Telephonie

Fraude dans la Telephonie Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem

More information

The poor state of SIP endpoint security

The poor state of SIP endpoint security The poor state of SIP endpoint security Kamailio World, 03.04.2014 Henning Westerholt Head of IT Operations Access 1 Agenda Introduction Reasons for security issues, motivation for attackers Past security

More information

Notice to our customers regarding Toll Fraud

Notice to our customers regarding Toll Fraud Notice to our customers regarding Toll Fraud - Beware of Toll Fraud. - Toll Fraud is a crime against you. Bizfon isn't responsible for your Toll Fraud. - You need to take steps to protect yourself from

More information

Hosted vs on-site IP-PBX A Guide for SMEs

Hosted vs on-site IP-PBX A Guide for SMEs Hosted vs on-site IP-PBX A Guide for SMEs This white paper analyses the distinct advantages and disadvantages of hosted and on-site IP-PBX systems, and compares the differing costs. It also includes a

More information

SMS. What is grey routing? Why should buyers of business SMS care?

SMS. What is grey routing? Why should buyers of business SMS care? SMS Why should buyers of business SMS care? Contents page: Who knows?... pg.03 What is it?... pg.04 Is it illegal?... pg.04 About aggregators and MVNOs... pg.05 Why do the networks care?... pg.07 Why should

More information

HOSTED VOIP Your guide to next-generation telephony

HOSTED VOIP Your guide to next-generation telephony HOSTED VOIP Your guide to next-generation telephony Introduction Voice over Internet Protocol (VoIP) is the technology that allows us to make telephone calls using the internet. Also known as IP Telephony,

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

MVNO Solution for Highly Profitable Global Roaming Services

MVNO Solution for Highly Profitable Global Roaming Services TeliSIM: MVNO Solution for Highly Profitable Global Roaming Services MVNO Solution for Highly Profitable Global Roaming Services A Guide to Help You Provide Highly Profitable Mobile Voice, Data and SMS

More information

JT CLOUD PBX. Product Description. JT Cloud PBX Product Description

JT CLOUD PBX. Product Description. JT Cloud PBX Product Description JT CLOUD PBX Product Description JT Cloud PBX is a carrier class PBX hosted in our award winning secure cloud environment. It offers businesses of all sizes a scalable cloud telephony solution that is

More information

Securing Access to Network Devices

Securing Access to Network Devices Securing Access to Network s Data Track Technology October, 2003 A corporate information security strategy will not be effective unless IT administrative services are protected through processes that safeguard

More information

Security for SIP-based VoIP Communications Solutions

Security for SIP-based VoIP Communications Solutions Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation

More information

Interconnection and Roaming

Interconnection and Roaming Interconnection and Roaming Operator Business Slide 1 Importance of Interconnection Operator s perspective Connectivity =>Network effect => Customer satisfaction =>Revenue Slide 2 Types of interconnections

More information

Telecommunications Market Report January June 2009

Telecommunications Market Report January June 2009 Office of Utility Regulation Telecommunications Market Report January June 2009 Information Note Document No: OUR 10/03 March 2010 Office of Utility Regulation Suites B1 & B2, Hirzel Court, St Peter Port,

More information

Sprint Security Support Services for Schedule No. 11*

Sprint Security Support Services for Schedule No. 11* Sprint Security Support Services are designed to minimize the vulnerability of Sprint's voice services customers to certain outbound international and inbound domestic toll free communications fraud originating

More information

BlueWater Software Constant Innovation by Orca Wave

BlueWater Software Constant Innovation by Orca Wave BlueWater Software Constant Innovation by Orca Wave Overview: Revenue assurance, cost management and delivering key and timely information to BlueWater Users; are operational pillars of our BlueWater software

More information

BT One Cloud Cisco UK Schedule to the General Terms

BT One Cloud Cisco UK Schedule to the General Terms BT One Cloud Cisco UK Schedule to the General Terms Contents A note on you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 2 4 Service Management Boundary... 3 5 Associated

More information

WE SEE YOUR VOICE. SecureLogix We See Your Voice

WE SEE YOUR VOICE. SecureLogix We See Your Voice ETM SYSTEM WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and

More information

Changing the Voice of

Changing the Voice of Changing the Voice of Telecommunications Level 3 Solutions for Voice Service Providers Competitive: It is a word you know well. As a voice services provider, you face a unique set of challenges that originate

More information

ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms

ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5

More information

Mobile Telephony Threats in Asia

Mobile Telephony Threats in Asia Mobile Telephony Threats in Asia Black Hat Asia 2017, Singapore Dr. Marco Balduzzi Dr. Payas Gupta Lion Gu Sr. Threat Researcher Data Scientist Sr. Threat Researcher Trend Micro Pindrop Trend Micro Joint

More information

Modern IP Communication bears risks

Modern IP Communication bears risks Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure

More information

Telecommunications Glossary

Telecommunications Glossary Telecommunications Glossary API - Application Programming Interface. An API allows two applications to communicate. It's what enables data to be seamlessly distributed to different applications on different

More information

Transition to IP & IPX Working Group IP/IPX a key pre-requisite to further transformation

Transition to IP & IPX Working Group IP/IPX a key pre-requisite to further transformation Transition to IP & IPX Working Group IP/IPX a key pre-requisite to further transformation Survey in 2016 : migration to IP & IPX is slow IPX is still perceived as a gray area Major obstacles impacting

More information

Traditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business

Traditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business Traditional PBX & Hosted VOIP Technology: The Key Differences & What They Mean For Your Business CONTENTS Summary... 3 What s The Buzz About?... 3 What It Means For Businesses... 3 What It Means For Employees...

More information

Evolution of Spear Phishing. White Paper

Evolution of Spear Phishing. White Paper Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest

More information

Over 20 years of experience in the international telecom market.

Over 20 years of experience in the international telecom market. The Ultimate Choice OUR COMPANY With more than two decades of proven track record in the telecom business, PROTEL S.A.L. OFFSHORE is a key global voice carrier headquartered in Beirut, Lebanon. As a leading

More information

3050 Integrated Communications Platform

3050 Integrated Communications Platform 3050 Integrated Communications Platform Network Configuration Guide Release 1 October 2002 Copyright 2002 Mitel Networks Corporation. This document is unpublished and the foregoing notice is affixed to

More information

TeleWare Re:Call FAQ for Resellers

TeleWare Re:Call FAQ for Resellers TeleWare Re:Call FAQ for Resellers A - About the Re:Call Service and Application 1. Why have TeleWare developed a mobile application, isn t the SIM based recording solution sufficient? For organisations

More information

VOXOX. A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX. a VOXOX ebook VOXOX, Inc A Comprehensive Guide

VOXOX. A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX. a VOXOX ebook VOXOX, Inc A Comprehensive Guide VOXOX A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX a VOXOX ebook 2017 VOXOX, Inc A Comprehensive Guide CONTENTS 3 INTRODUCTION 4 WHAT IS HOSTED PBX 6 ANATOMY OF A HOSTED PBX CALL 8 GETTING

More information

TOLL FRAUD POLICY. Toll Fraud. Liability

TOLL FRAUD POLICY. Toll Fraud. Liability TOLL FRAUD POLICY This Toll Fraud policy defines toll fraud and specifies actions the Customer and Farmers Mutual Telephone Company (FMTC) will take to address such fraud. Toll Fraud Toll Fraud is the

More information

It pays to stop and think

It pays to stop and think It pays to stop and think Protect yourself from financial fraud Together we thrive 2 In the first six months of 2018, over 34,000 people were scammed out of 145.4m At HSBC, we work hard to keep our customers

More information

HSBC Expat Mobile Banking

HSBC Expat Mobile Banking HSBC Expat Mobile Banking Summary, App Licence Terms and Conditions and Important Information Effective from 13 June 2016 Summary of the Terms and Conditions This Summary sets out key details about the

More information

SPECIFIC SERVICE TERMS FOR GLOBAL CROSSING ENTERPRISE VoIP TOLL-FREE SERVICES

SPECIFIC SERVICE TERMS FOR GLOBAL CROSSING ENTERPRISE VoIP TOLL-FREE SERVICES SPECIFIC SERVICE TERMS FOR GLOBAL CROSSING ENTERPRISE VoIP TOLL-FREE SERVICES Global Crossing Enterprise VoIP Toll-Free Service These are the specific service terms for Global Crossing s Enterprise VoIP

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs Research firm IDC 1 has estimated that a VoIP system can reduce telephony-related expenses by 30%. Voice over Internet Protocol (VoIP) has become a viable solution

More information

Building a Global VoIP Network. Michael Burrell, Senior Manager Orange Business Services. August 22, 2006

Building a Global VoIP Network. Michael Burrell, Senior Manager Orange Business Services. August 22, 2006 Building a Global VoIP Network Michael Burrell, Senior Manager Orange Business Services August 22, 2006 Service Provider relationships > what service provider relationships and types of carrier services

More information

Why Active Communications and Office 365?

Why Active Communications and Office 365? Why Active Communications and Office 365? Deploying Microsoft Lync Enterprise Voice with Office 365 has never been easier! The world of IT, telephony and communications is changing rapidly. The internet

More information

REAL Mobile, Inc. Wired Telecommunication Services (Business Lines) Wireless Telecommunication Services

REAL Mobile, Inc. Wired Telecommunication Services (Business Lines) Wireless Telecommunication Services REAL Mobile, Inc. Wired Telecommunication Services (Business Lines) Wireless Telecommunication Services 2017 Table of Contents Brief summary of company capabilities... 3 Hosted PBX office... 4 Virtual

More information

Portugal - Telecoms, Mobile, Broadband and Digital Media - Statistics and Analyses

Portugal - Telecoms, Mobile, Broadband and Digital Media - Statistics and Analyses Published on Market Research Reports Inc. (https://www.marketresearchreports.com) Home > Portugal - Telecoms, Mobile, Broadband and Digital Media - Statistics and Analyses Portugal - Telecoms, Mobile,

More information

Glossary of Unified Communications Terms. Provided by: Cloudtelephone.net

Glossary of Unified Communications Terms. Provided by: Cloudtelephone.net Glossary of Unified Communications Terms Provided by: Cloudtelephone.net As the pace of unified communication adoption increases, Interconnects and other IT based Service Providers may find themselves

More information

Quad BRI GSM Gateway with 8 GSM Ports

Quad BRI GSM Gateway with 8 GSM Ports Quad BRI GSM Gateway with 8 GSM Ports HG-2000/3U Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description November 2009 Contents Next Page Hypermedia HG-2000/3U 3 Contents

More information

Cisco Webex Cloud Connected Audio

Cisco Webex Cloud Connected Audio White Paper Cisco Webex Cloud Connected Audio Take full advantage of your existing IP telephony infrastructure to help enable a Webex integrated conferencing experience Introduction Cisco Webex Cloud Connected

More information

Ingate SIParator /Firewall SIP Security for the Enterprise

Ingate SIParator /Firewall SIP Security for the Enterprise Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3

More information

The Spoofing/Authentication Threat

The Spoofing/Authentication Threat The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15

More information

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database Making the UK more resilient against Cybercrime Date: August 2017 Reference: 0449-CYB This Red Alert is issued by the United Kingdom

More information

Automated Call Quality, CLI and Performance Testing

Automated Call Quality, CLI and Performance Testing . Automated Call Quality, CLI and Performance Testing 2 itest The most comprehensive test platform available. itest is a testing and performance monitoring platform designed specifically for the 21st Century

More information

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom

More information

Germany - Telecoms, Mobile, Broadband and Digital Media - Statistics and Analyses. German telecom sector ambitious for gigabit society by 2025

Germany - Telecoms, Mobile, Broadband and Digital Media - Statistics and Analyses. German telecom sector ambitious for gigabit society by 2025 Report Information More information from: https://www.wiseguyreports.com/reports/1095917-germany-telecoms-mobile-broadband-and-digitalmedia-statistics-and-analyses-one Germany - Telecoms, Mobile, Broadband

More information

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017 Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

The strategies for preventing telecom fraud in EACO countries

The strategies for preventing telecom fraud in EACO countries The strategies for preventing telecom fraud in EACO countries 25 th May 2011 Protais KANYANKORE RWANDA UTILITIES REGULATORY AGENCY Table of contents 1. Overview on Grey traffic Affected areas Who is involved

More information

Digital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data

Digital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data Digital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data Financial indicators, fixed and mobile telephony, broadcasting and

More information

Credit Card Frauds Sept.08, 2016

Credit Card Frauds Sept.08, 2016 Credit Card Frauds Sept.08, 2016 Definitions Credit Card A card allowing the holder to purchasing goods or services on credit Debit Card A card allowing transfer of money from a bank a/c electronically

More information

Mavenir Spam and Fraud Control

Mavenir Spam and Fraud Control SOLUTION BRIEF Assuring Operator Revenue and A2P Grey Route Monetization Operators are realizing the scale and potential of A2P (Application to Person) messaging revenues, and how advances in messaging

More information

Machine to Machine (m2m) Wholesale 3G Mobile Connectivity

Machine to Machine (m2m) Wholesale 3G Mobile Connectivity Machine to Machine (m2m) Wholesale 3G Mobile Connectivity For a Smarter Connected Society 1. Introduction, Background and Market Size The need for machines to be able to communicate with each other-m2m,

More information

The Telephony Denial of Service (TDoS) Threat

The Telephony Denial of Service (TDoS) Threat The Telephony Denial of Service (TDoS) Threat An Analysis of the TDoS Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Telephony Denial-of-Service (TDoS) and The Public Voice

More information

Phishing in the Age of SaaS

Phishing in the Age of SaaS Phishing in the Age of SaaS AN ESSENTIAL GUIDE FOR BUSINESSES AND USERS The Cloud Security Platform Q3 2017 intro Phishing attacks have become the primary hacking method used against organizations. In

More information

STAYCONNECTED PLUS YOUR DEVICE BACK-UP PLAN. StayConnected Plus Service Customer Terms

STAYCONNECTED PLUS YOUR DEVICE BACK-UP PLAN. StayConnected Plus Service Customer Terms STAYCONNECTED PLUS YOUR DEVICE BACK-UP PLAN StayConnected Plus Service Customer Terms STAYCONNECTED PLUS SERVICE CUSTOMER TERMS 1 The StayConnected Service a) The StayConnected Service provides after sales

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunications costs Research firm IDC 1 has estimated that a VoIP system can reduce telephony-related expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol

More information

White Paper. SIP Trunking: Deployment Considerations at the Network Edge

White Paper. SIP Trunking: Deployment Considerations at the Network Edge SIP Trunking: Deployment Considerations at the Network Edge at the Network Edge Executive Summary The move to Voice over IP (VoIP) and Fax over IP (FoIP) in the enterprise has, until relatively recently,

More information

Fraud classification and recommendations on dispute handling within the wholesale telecom industry Release May 2014

Fraud classification and recommendations on dispute handling within the wholesale telecom industry Release May 2014 INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP i3 FORUM (www.i3forum.org) Fraud classification and recommendations on dispute handling within the wholesale telecom industry Release 3.0 - May

More information

Foxtel Home Phone Service Description

Foxtel Home Phone Service Description Foxtel Broadband & Home Phone Agreement Foxtel Home Phone Service Description Effective from 23 February, 2016 CONTENTS 1. ABOUT THIS SERVICE DESCRIPTION 1 2. FOXTEL HOME PHONE 1 3. PLANS 1 4. MINIMUM

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room

More information

Network Services Enterprise Broadband

Network Services Enterprise Broadband Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

Machine to Machine (m2m) Wholesale 3G Mobile Connectivity For a Smarter Connected Society

Machine to Machine (m2m) Wholesale 3G Mobile Connectivity For a Smarter Connected Society Machine to Machine (m2m) Wholesale 3G Mobile Connectivity For a Smarter Connected Society 1. Introduction, Background and Market Size The need for machines to be able to communicate with each other-m2m,

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Pay as you go Terms and Charges

Pay as you go Terms and Charges Pay as you go Terms and Charges Would you prefer this information in large print, on disk, or in Braille? Call our specialist accessibility team on 03333 043 222 or email disability.access@vodafone.co.uk

More information

TalkTalk Business MOBILE

TalkTalk Business MOBILE TalkTalk Business MOBILE CUSTOMER GUIDELINES ANY COPIES OF THIS DOCUMENT ARE UNCONTROLLED PUBLIC CONTENT PAGE 1.1. Charges... 3 1.2. Call Bundling... 3 1.3. Inadvertent Roaming... 3 1.4. Termination of

More information

Antelope Consulting FINAL, JULY Appendix K: Glossary

Antelope Consulting FINAL, JULY Appendix K: Glossary Antelope Consulting FINAL, JULY 2001 DFID Internet Costs Study Appendix K: Glossary TESSA N GROVES, 16 SEPTEMBER 2001 Admin Lease rate APEC APEC TEL Call Detail Record Circuit-switched, Circuit switching

More information

@First Anti Fraud Interconnect Roaming & Security of Transactions

@First Anti Fraud Interconnect Roaming & Security of Transactions @First Anti Fraud Interconnect Roaming & Security of Transactions Pierre Paufique, Vice President Customer Service Operations & Fraud, Cost and Revenue Assurance, International Carriers, Orange agenda

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

The Background The Problem The Alternatives A Simpler, One-Stop Solution... 4

The Background The Problem The Alternatives A Simpler, One-Stop Solution... 4 ESTABLISHING A2P MOBILE MESSAGING ON YOUR TERMS November 2016 TABLE OF CONTENTS The Background.... 3 The Problem.... 3 The Alternatives.... 4 A Simpler, One-Stop Solution... 4 Why Tata Communications Mobile

More information

10 Reasons to Choose AudioCodes Enterprise SBC

10 Reasons to Choose AudioCodes Enterprise SBC 10 Reasons to Choose AudioCodes Enterprise SBC Introduction The use of Enterprise Session Border Controllers (SBC) has become mainstream due to the adoption of SIP, according to a March 2016 IHS Research

More information

ORACLE ENTERPRISE COMMUNICATIONS BROKER

ORACLE ENTERPRISE COMMUNICATIONS BROKER ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP

More information