WE SEE YOUR VOICE. SecureLogix We See Your Voice

Similar documents
ETM Reporting Voice Network Intelligence

PSTN Security. Sougat Ghosh Security Services Leader Asia, Nortel Delhi / September 29, 2008 BUSINESS MADE SIMPLE

White Paper. SIP Trunking: Deployment Considerations at the Network Edge

Security Assessment Checklist

WHITE PAPER. How Virtualization Complements ShoreTel s Highly Reliable Distributed Architecture

WHITE PAPER. Applying Software-Defined Security to the Branch Office

The ETM (Enterprise Telephony Management) System Technical Overview. Release 5.2. A product brief from SecureLogix Corporation

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Real-time Communications Security and SDN

Simplify IP Telephony with System i. IBM System i IP Telephony

Application Notes for Configuring the ADTRAN NetVanta UC Server with Avaya IP Office 6.1 Issue 1.0

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony

Unified Communications Manager Express Toll Fraud Prevention

AVANTUS TRAINING PTE PTE LTD LTD

ETM System v6.0 Minimum System And Network Requirements

PBX Fraud Information

Digital Advisory Services Professional Service Description SIP IP Trunk with Field Trial for Legacy PBX Model

ETM System v6.1 Minimum System & Network Requirements

ORACLE ENTERPRISE COMMUNICATIONS BROKER

The Spoofing/Authentication Threat

Oracle Improves Communications and Reduces Costs with SIP Trunking

Unified Communications Threat Management (UCTM) Secure Communications and Collaborations

Securing Your Most Sensitive Data

NINESTAR CONNECT. Network TRANSPARENCY statement

A Digium Solutions Guide. Switchvox On-Premise Options: Is it Time to Virtualize?

IP Telephony Migration Options

Table of Contents. Benefits of VoIP. p 1. Eligibility to upgrade. p 2. Transforming to VoIP. p 3. Phone Packages.. p 4

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

10 QUESTIONS TO ASK BEFORE YOU SELECT A SIP TRUNKING PROVIDER

Enterprise Voice and Online Services with Microsoft Lync Server 2013

Ingate SIParator /Firewall SIP Security for the Enterprise

Brochure. Dialogic BorderNet Session Border Controller Solutions

SIP Trunking Seminar Introduction to SIP Trunking

Express Monitoring 2019

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

SIP as an Enabling Technology

Digital Advisory Services Professional Service Description SIP Centralized IP Trunk with Field Trial Model

IP Possibilities Conference & Expo. Minneapolis, MN April 11, 2007

20337-Enterprise Voice and Online Services with Microsoft Lync Server 2013

Net-Net Interactive Session Recorder - recording utility for session delivery networks

WHITE PAPER. Session Border Controllers: Helping keep enterprise networks safe TABLE OF CONTENTS. Starting Points

Future-ready security for small and mid-size enterprises

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

Application Note. Deploying Survivable Unified Communications Solutions with the Dialogic 2000 Media Gateway Series

HOW TO CHOOSE THE RIGHT PHONE SYSTEM FOR YOUR BUSINESS

Application Notes for Configuring Windstream SIP Trunking with Avaya IP Office - Issue 1.0

Implementing Cisco Voice Communications & QoS (CVOICE) 8.0 COURSE OVERVIEW: WHO SHOULD ATTEND: PREREQUISITES: Running on UC 9.

3050 Integrated Communications Platform

10 Reasons to Choose AudioCodes Enterprise SBC

REMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS

VeriSign Communications Services. IP Network Solutions. Outsourcing the Softswitch Functionality. Where it all comes together.

Symantec Network Access Control Starter Edition

What is SD WAN and should I know or care about it? Ken LaMere Ecessa

Bright House Networks Enterprise Solutions. FINAL Proposal for: WE RE WIRED DIFFERENTLY. Voice Data Cloud Managed Services. Proposal Date: 4/14/2016

Symantec Client Security. Integrated protection for network and remote clients.

We don t see the IP Phones that currently being used included with this RFP? We are essentially looking for a basic caller ID function.

Symantec Network Access Control Starter Edition

VOXOX. A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX. a VOXOX ebook VOXOX, Inc A Comprehensive Guide

Hangzhou Synway Information Engineering Co., Ltd

Symantec Network Access Control Starter Edition

Modern IP Communication bears risks

Partnership Overview

Avaya Communication Manager with Survivable SIP Gateways Solution Implementation Guide

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Business Phone System Buyer s Guide

Six Questions to Answer When Buying a Phone System

Making the Move to IP Telephony. Revolution, Evolution or Both?

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

Cbeyond s BeyondVoice TM with SIPconnect

Providing E911 support for branch offices and teleworkers. Compliance with state and local E911 regulations

Why Active Communications and Office 365?

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Changing the Voice of

Unified Communications from West

Best Practices in Securing a Multicloud World

Business VoIP Migration Strategies

Mitigating Branch Office Risks with SD-WAN

Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.

Complying with PCI DSS 3.0

Simple and Powerful Security for PCI DSS

SD-WAN Solution How to Make the Best Choice for Your Business

Intermedia. CX-E Cloud Hosting Provider. Introduction. Why Intermedia for CX-E Cloud? Cost of Ownership

Application Notes for Configuring Cablevision Optimum Voice SIP Trunking with Avaya IP Office - Issue 1.1

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Cisco Unified Survivable Remote Site Telephony and Cisco Unified Enhanced Survivable Remote Site Telephony Version 11.0

Microsoft Enterprise Voice and Online Services with Microsoft Lync Server 2013

Application Notes for CA NetQoS Unified Communications Monitor with Avaya Aura TM Communication Manager - Issue 1.0

Voice Modernization for Contact Centers

The EXTender/PBXgateway Product Suite Simplified Voice Networking for Distributed Enterprises

SV9100 SIP Trunking Service Configuration Guide for Cable ONE Business

Enterprise Guest Access

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Teradata and Protegrity High-Value Protection for High-Value Data

Never Drop a Call With TecInfo SIP Proxy White Paper

Copyright and Trademark Statement


APPLICATION NOTE. Microsoft Unified Communications Network Architectures. Introduction

8x8 Virtual Office Government

Abstract. Avaya Solution & Interoperability Test Lab

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief

Transcription:

ETM SYSTEM

WE SEE YOUR VOICE We know some important things about your enterprise things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and services, no matter what type or mix of communication systems you own. And we know that you are vulnerable to costly, fraudulent and crippling attack through these same voice resources at this very moment. We know because we see. Our patented solutions have helped hundreds of compan ies see their voice security threats and opportunities to save money. It happens every time we deploy our solution. Every time. And although efforts to secure and save begin with visibility, they don t end there. We also help you take real-time action, with voice network intelligence and unified policy enforcement across any mix of proprietary voice or unified communications (UC) systems. In short, we can help you unify, secure, optimize and better utilize your unified communications network to lower expenses, strengthen compliance, and enhance your business operations. We will change the way you see, protect, and leverage your UC network, and help transform your enterprise. SecureLogix We See Your Voice

Unify, secure, optimize and better leverage your unified communications network to lower expenses, strengthen compliance, and enhance business operations. THE ETM (Enterprise Telephony Management) SYSTEM The SecureLogix ETM System helps secure, optimize and simplify management of complex enterprise voice/uc networks through enterprise-wide voice network intelligence and unified policy enforcement. The ETM System enables a hard-dollar ROI payback in less than 12 months by securing the enterprise from attack, fraud, data leakage, financial losses and service abuse over TDM and VoIP enterprise phone lines, while optimizing voice service and infrastructure expenses. The system is IP-PBX vendor independent and supports analog, digital, and VoIP carrier trunking. Unified Communications Policy Management capabilities allow the creation and enforcement of consistent UC security, reporting, performance monitoring and content recording policies across the enterprise from one management interface, irrespective of your network s mix of TDM or VoIP switch types and multi-vendor UC devices and endpoints. Distributed appliances are placed at the voice network edge to monitor all inbound and outbound TDM and VoIP/SIP call flows, and deliver a suite of centrally administered UC applications across the enterprise. ETM SYSTEM APPLICATIONS VOICE FIREWALL VOICE IPS USAGE MANAGER PERFORMANCE MANAGER CALL RECORDER Protects the enterprise voice network edge from TDM and VoIP attacks and service abuse in real-time by controlling network access and service use. Provides real-time detection and prevention of fraudulent, abusive, or operationally relevant call patterns, including voice fraud, excessive unanswered/ busy calls, voice spam, etc. Provides enterprise-wide, switch-independent CDR reports, call accounting, and voice analytics to dramatically reduce costs through resource optimization, service performance and abuse management, and network planning. Monitors TDM and VoIP trunking and services in real-time for outages, errors, and call quality issues, and provides troubleshooting tool kits to aid resolution. Enables policy-based call recording of targeted calls of interest such as bomb threats, harassing calls, 911 emergency calls, customer support calls, etc.

OFFICE LOCATION SINGLE-SITE DEPLOYMENT In a fashion similar to data network perimeter security and management devices, ETM Platform Appliances sit at the edge of the enterprise voice network, the optimal position to provide visibility and control over all inbound and outbound voice network access and usage. The edge-network intelligence of the platform appliance also allows it to host a large array of voice security and management applications, all of which can be uploaded from a remote location. The ETM Platform Appliances operate transparently on your voice circuits between the IP-PBX and the Central Office, including circuit fail-safe and SIP High Availability modes. VoIP Trunk VOICE SERVICES PROVIDER DATA THE ETM SYSTEM PLATFORM TDM Trunk (T1 CAS, E1 CAS, ISDN PRI, E1 PRI, SS7, Analog) Data Firewall Servers PBX Fax Modems LAN IP Phones TDM Phones Workstations MULTI-SITE DISTRIBUTED DEPLOYMENT The ETM Server is the hub for the entire system, remotely monitoring hundreds of distributed appliances inline on TDM and VoIP trunks. The revolutionary ETM System unifies the security and management of your distributed voice network, regardless of your network mix of proprietary vendor systems or TDM & VoIP media. Appliances support an array of VoIP and TDM trunking types including SIP, T1, ISDN PRI, E1 PRI, SS7, and analog. A single ETM Client, such as the one shown in Forida, can manage the entire system, or distributed clients can support a regional model. This includes not only real-time monitoring of appliance operations, but full remote upgrades of both the appliance firmware and applications. Enterprise-wide remote management has never been easier. The system uses a fully relational database for call detail records (CDR), diagnostics and policy logs. Communication between the client(s), server(s), and appliances is secured with 3DES encryption. A family of appliances scales to efficiently support any enterprise deployment, from the smallest retail outpost to the largest corporate campus or military installation. MINNEAPOLIS CHICAGO UC/VoIP SAN FRANCISCO ETM 3200 (T1, E1, PRI, SS7) ETM 3200 (T1, E1, PRI, SS7) ETM 5200 NEW YORK UC/VoIP ETM 5200 SAN DIEGO UC/VoIP NEW YORK WAN ETM 5200 ETM SERVER SAN ANTONIO HOUSTON FLORIDA ETM 3200 (T1, E1, PRI, SS7) ETM 1024 (ANALOG) ETM CLIENT

ETM System benefits are delivered enterprise-wide, across all TDM and VoIP traffic and infrastructure from one unified management interface. PROBLEM ETM SYSTEM SOLUTION Voice Fraud Modems & Network Security Service Abuse & Financial Losses Harassing, Threatening or Restricted Calls Compliance & Data Leakage Legal Risk & Investigations Reporting & Analytics Optimization & Planning Uptime, Performance & Troubleshooting Business Operations & Productivity Reduce financial losses by preventing toll fraud attacks in real-time. Help detect and prevent phone-based identity theft and social engineering fraud aimed at stealing private customer information. Prevent restricted data network access and virus/malware infections with real-time firewall control over all authorized and unauthorized modem use. Monitor and prevent abuse of your corporate voice services including non-business LD, restricted pay-per-call services, directory assistance calls and connection fees, voice/fax spam, and restricted Internet access over voice lines. Reduce corporate expenses by alerting, blocking, redirecting, or recording bomb threats, other forms of harassing, threatening, and CLID restricted calls, and calls to/from restricted locations or callers. Secure your voice/uc network edge from all forms of voice threats including restricted network access, data leakage, customer ID theft, fraud and abuse to help complete the protection of your corporate perimeter and strengthen regulatory security compliance measures. Decrease legal risk and enhance security investigations by tracking, alerting, and/or recording the content of key calls of interest such as 911 emergency calls, unauthorized dial-up Internet use, calls of a regulatory, legal, or business interest, or calls to/from employees or outside parties under investigation. Track phone service use, billing, and resource utilization through full calldetail record (CDR) reporting and call accounting. Perform departmental bill-back and provider bill reconciliation. Dramatically reduce corporate voice/uc expenses by using resource optimization reports to baseline, right-size and plan trunking infrastructure, measure utilization rates for voice/uc resources and services, improve call routing plans, highlight VoIP toll bypass opportunities, and plan your most cost effective VoIP/UC migration buildout. Increase voice network uptime, capacity, and service quality through real-time notification of trunk outages and error conditions across the enterprise. Shorten the time to error resolution with powerful error diagnostic and troubleshooting tools. Improve business operations, productivity and training with employee productivity alerts and reports showing call volumes, durations, and other details such as lower-than-expected volumes on key resource lines, or traffic patterns for inbound customer calls to aid staffing decisions or efficient call routing.

SecureLogix Corporation 13750 San Pedro Ave. Suite 820 San Antonio, TX 78232 1-800-817-4837 securelogix.com ETM, We See Your Voice, SecureLogix, SecureLogix Corporation, the SecureLogix Emblem, and the SecureLogix Diamond Emblem are registered trademarks or registered trademarks and registered service marks of SecureLogix Corporation in the U.S.A. and other countries. PolicyGuru is a registered trademark of SecureLogix Corporation in the U.S.A. All other trademarks mentioned herein are believed to be trademarks of their respective owners. Copyright 2009, 2016 SecureLogix Corporation. All Rights Reserved. SecureLogix technologies are protected by one or more of the following patents: US 6,226,372 B1, US 6,249,575 B1, US 6,320,948 B1, US 6,687,353 B1, US 6,718,024 B1, US 6,760,420 B2, US 6,760,421 B2, US 7,133,511 B2, US 7,231,027 B2, US 7,440,558 B2, US 8,150,013 B2, CA 2,354,149, DE 1,415,459 B1, FR 1,415,459 B1, and GB 1,415,459 B1. U.S. Patent Pending. ETM Applications Voice Firewall Usage Manager Performance Manager Voice IPS Call Recorder