ETM SYSTEM
WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and services, no matter what type or mix of communication systems you own. And we know that you are vulnerable to costly, fraudulent and crippling attack through these same voice resources at this very moment. We know because we see. Our patented solutions have helped hundreds of compan ies see their voice security threats and opportunities to save money. It happens every time we deploy our solution. Every time. And although efforts to secure and save begin with visibility, they don t end there. We also help you take real-time action, with voice network intelligence and unified policy enforcement across any mix of proprietary voice or unified communications (UC) systems. In short, we can help you unify, secure, optimize and better utilize your unified communications network to lower expenses, strengthen compliance, and enhance your business operations. We will change the way you see, protect, and leverage your UC network, and help transform your enterprise. SecureLogix We See Your Voice
Unify, secure, optimize and better leverage your unified communications network to lower expenses, strengthen compliance, and enhance business operations. THE ETM (Enterprise Telephony Management) SYSTEM The SecureLogix ETM System helps secure, optimize and simplify management of complex enterprise voice/uc networks through enterprise-wide voice network intelligence and unified policy enforcement. The ETM System enables a hard-dollar ROI payback in less than 12 months by securing the enterprise from attack, fraud, data leakage, financial losses and service abuse over TDM and VoIP enterprise phone lines, while optimizing voice service and infrastructure expenses. The system is IP-PBX vendor independent and supports analog, digital, and VoIP carrier trunking. Unified Communications Policy Management capabilities allow the creation and enforcement of consistent UC security, reporting, performance monitoring and content recording policies across the enterprise from one management interface, irrespective of your network s mix of TDM or VoIP switch types and multi-vendor UC devices and endpoints. Distributed appliances are placed at the voice network edge to monitor all inbound and outbound TDM and VoIP/SIP call flows, and deliver a suite of centrally administered UC applications across the enterprise. ETM SYSTEM APPLICATIONS VOICE FIREWALL VOICE IPS USAGE MANAGER PERFORMANCE MANAGER CALL RECORDER Protects the enterprise voice network edge from TDM and VoIP attacks and service abuse in real-time by controlling network access and service use. Provides real-time detection and prevention of fraudulent, abusive, or operationally relevant call patterns, including voice fraud, excessive unanswered/ busy calls, voice spam, etc. Provides enterprise-wide, switch-independent CDR reports, call accounting, and voice analytics to dramatically reduce costs through resource optimization, service performance and abuse management, and network planning. Monitors TDM and VoIP trunking and services in real-time for outages, errors, and call quality issues, and provides troubleshooting tool kits to aid resolution. Enables policy-based call recording of targeted calls of interest such as bomb threats, harassing calls, 911 emergency calls, customer support calls, etc.
OFFICE LOCATION SINGLE-SITE DEPLOYMENT In a fashion similar to data network perimeter security and management devices, ETM Platform Appliances sit at the edge of the enterprise voice network, the optimal position to provide visibility and control over all inbound and outbound voice network access and usage. The edge-network intelligence of the platform appliance also allows it to host a large array of voice security and management applications, all of which can be uploaded from a remote location. The ETM Platform Appliances operate transparently on your voice circuits between the IP-PBX and the Central Office, including circuit fail-safe and SIP High Availability modes. VoIP Trunk VOICE SERVICES PROVIDER DATA THE ETM SYSTEM PLATFORM TDM Trunk (T1 CAS, E1 CAS, ISDN PRI, E1 PRI, SS7, Analog) Data Firewall Servers PBX Fax Modems LAN IP Phones TDM Phones Workstations MULTI-SITE DISTRIBUTED DEPLOYMENT The ETM Server is the hub for the entire system, remotely monitoring hundreds of distributed appliances inline on TDM and VoIP trunks. The revolutionary ETM System unifies the security and management of your distributed voice network, regardless of your network mix of proprietary vendor systems or TDM & VoIP media. Appliances support an array of VoIP and TDM trunking types including SIP, T1, ISDN PRI, E1 PRI, SS7, and analog. A single ETM Client, such as the one shown in Forida, can manage the entire system, or distributed clients can support a regional model. This includes not only real-time monitoring of appliance operations, but full remote upgrades of both the appliance firmware and applications. Enterprise-wide remote management has never been easier. The system uses a fully relational database for call detail records (CDR), diagnostics and policy logs. Communication between the client(s), server(s), and appliances is secured with 3DES encryption. A family of appliances scales to efficiently support any enterprise deployment, from the smallest retail outpost to the largest corporate campus or military installation. MINNEAPOLIS CHICAGO UC/VoIP SAN FRANCISCO ETM 3200 (T1, E1, PRI, SS7) ETM 3200 (T1, E1, PRI, SS7) ETM 5200 NEW YORK UC/VoIP ETM 5200 SAN DIEGO UC/VoIP NEW YORK WAN ETM 5200 ETM SERVER SAN ANTONIO HOUSTON FLORIDA ETM 3200 (T1, E1, PRI, SS7) ETM 1024 (ANALOG) ETM CLIENT
ETM System benefits are delivered enterprise-wide, across all TDM and VoIP traffic and infrastructure from one unified management interface. PROBLEM ETM SYSTEM SOLUTION Voice Fraud Modems & Network Security Service Abuse & Financial Losses Harassing, Threatening or Restricted Calls Compliance & Data Leakage Legal Risk & Investigations Reporting & Analytics Optimization & Planning Uptime, Performance & Troubleshooting Business Operations & Productivity Reduce financial losses by preventing toll fraud attacks in real-time. Help detect and prevent phone-based identity theft and social engineering fraud aimed at stealing private customer information. Prevent restricted data network access and virus/malware infections with real-time firewall control over all authorized and unauthorized modem use. Monitor and prevent abuse of your corporate voice services including non-business LD, restricted pay-per-call services, directory assistance calls and connection fees, voice/fax spam, and restricted Internet access over voice lines. Reduce corporate expenses by alerting, blocking, redirecting, or recording bomb threats, other forms of harassing, threatening, and CLID restricted calls, and calls to/from restricted locations or callers. Secure your voice/uc network edge from all forms of voice threats including restricted network access, data leakage, customer ID theft, fraud and abuse to help complete the protection of your corporate perimeter and strengthen regulatory security compliance measures. Decrease legal risk and enhance security investigations by tracking, alerting, and/or recording the content of key calls of interest such as 911 emergency calls, unauthorized dial-up Internet use, calls of a regulatory, legal, or business interest, or calls to/from employees or outside parties under investigation. Track phone service use, billing, and resource utilization through full calldetail record (CDR) reporting and call accounting. Perform departmental bill-back and provider bill reconciliation. Dramatically reduce corporate voice/uc expenses by using resource optimization reports to baseline, right-size and plan trunking infrastructure, measure utilization rates for voice/uc resources and services, improve call routing plans, highlight VoIP toll bypass opportunities, and plan your most cost effective VoIP/UC migration buildout. Increase voice network uptime, capacity, and service quality through real-time notification of trunk outages and error conditions across the enterprise. Shorten the time to error resolution with powerful error diagnostic and troubleshooting tools. Improve business operations, productivity and training with employee productivity alerts and reports showing call volumes, durations, and other details such as lower-than-expected volumes on key resource lines, or traffic patterns for inbound customer calls to aid staffing decisions or efficient call routing.
SecureLogix Corporation 13750 San Pedro Ave. Suite 820 San Antonio, TX 78232 1-800-817-4837 securelogix.com ETM, We See Your Voice, SecureLogix, SecureLogix Corporation, the SecureLogix Emblem, and the SecureLogix Diamond Emblem are registered trademarks or registered trademarks and registered service marks of SecureLogix Corporation in the U.S.A. and other countries. PolicyGuru is a registered trademark of SecureLogix Corporation in the U.S.A. All other trademarks mentioned herein are believed to be trademarks of their respective owners. Copyright 2009, 2016 SecureLogix Corporation. All Rights Reserved. SecureLogix technologies are protected by one or more of the following patents: US 6,226,372 B1, US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,718,024 B1, US 6,760,420 B2, US 6,760,421 B2, US 7,133,511 B2, US 7,231,027 B2, US 7,440,558 B2, US 8,150,013 B2, CA 2,354,149, DE 1,415,459 B1, FR 1,415,459 B1, and GB 1,415,459 B1. U.S. Patent Pending. ETM Applications Voice Firewall Usage Manager Performance Manager Voice IPS Call Recorder