htsocial-mediafb-iconin Follow Us
Previous
Next

November 15th, 2016 - Amitava Mukherjee, CEO of RedShift Network speaks at Telecom Exchange Event at Montage in Los Angeles on "IOT & CyberSecurity: Risks in Supply Chain, Privacy and Defense”

September 28th, 2016 - Amitava Mukherjee, CEO of RedShift Networks speaks at Telecom Council TC3 Carrier Connections Event at Computer Museum in Mountain View, CA on ‘Startup Success Stories’.

July 10th, 2016 - RedShift Networks participating in Cisco Live inside Security Village Pavillon - Come visit us.

June 23rd, 2016 - Amitava Mukherjee, CEO of RedShift Networks, to be part of CEO Roundtable at Telecom Exchange 2016 event in New York City.

June 22nd, 2016 - Amitava Mukherjee, CEO of RedShift Networks, to speak at SIPNOC event in Washington DC area on SIP Threats

RedShift Networks UCTM Advantages

 

Synchronous Flow Security Technology™ correlated multi-layer protection between OSI Layers (layer 4 to layer 7) to your VOIP, Video, UC & Collaboration Applications. Patented Technology

  • Dynamic real-stream inspection technology
  • Proactive proprietary unified threat assessment & correlation architecture
  • Advanced VOIP, Video, Unified Communications and Collaboration application and user behavioral learning analytics
  • Low latency for signaling and smart fast-path for valid media flows
  • Advanced and adaptive Behavioral Learning engine means very low rate of false positives

Visibility and Analytics of SIP Networks.

 

Product Brochures

 

UCTM - Falcon

UCTM - Hawk

UCTM - Eagle

Products Overview

ADVANCED FRAUD DETECTION AND VOIP/VIDEO ATTACK PREVENTION FOR VOIP and VIDEO CARRIERS.

Complete Unified Communication Threat Management (UCTM) protection for Service Providers and their customers.

 

With the growing and highly organized number of attacks directed at VOIP, Video, Unified Communication and Collaboration networks, now more than ever, reliable, manageable, scalable tools that provide the protection and control for all your Cloud based VoIP/Video and SIP services are critical. Redshift Networks UCTM products deliver real-time VoIP network monitoring, detection, and prevention that averts these threats and reduce rising operational costs.

  • Pre-configured to recognize and prevent over 40,000 VOIP/Video threat vectors with ongoing globally sourced vulnerabilities and signature updates
  • Proactive behavioral learning assures accurate detection and alerts that reduce false alarms
  • Reports and halts malicious traffic in micro seconds
  • Deep visibility and analytics of SIP based networks used to determine threats and attacks

Working within existing networking infrastructure, RedShift Networks Security Appliances reduce the complexity, management, and cost of VoIP/Video network fraud mitigation.

 

Threat Protection for Any Size or Service Model

 

UCTM Falcon

 

UCTM Hawk

UCTM Eagle

 

eagle

Typical Application: Managed service and SMB CPE deployment to extend VOIP/UC sercurity to the enterprise.

Client Profile:

Cloud-based service providers that support up to one thousand active sessions and thousands of users per Ethernet segment.

Client Profile:

Large-scale UC providers & facilities-based carriers seeking network core protection for tens of thousands of active sessions and hundreds of thousands of VOIP/UC subscribers.

Advanced VoIP and SIP security and network monitoring for enterprise-managed service and SMB CPE deployments.

  • Functions as a SIP security, demarcation and monitoring device at the edge of the cloud
  • Remote monitoring and management, for managed service deployment.
  • Advanced VOIP, VIdeo, Unified Communications and Collaboration application and user behavioral learning analytics
  • Enterpise security includes SAFW (Sip Aware Firewall) and NAT Support
  • Insures interoperability with SIP services and all leading IP-PBX systems
  • Extends threat protection to customers SIP Phones, mobile devices, and IP-PBX
  • Sophisiticated proactive and real-time network based Toll Fraud detection and prevention
  • Deep and broad visibility/analytics of User, Application and Network level traffic of SIP based networks unmatched in the industry
  • Globally sourced Signature and Blacklist update services for VOIP, Video, UC Application and Server Threats
  • Stateful inspection Firewall capabilities for added data security

Cloud-based on Hosted VoIP network services.

  • Core network security for call servers, softswitches, conferencing, unified messaging, devices (SIP), and subscriber data
  • Complete UC-aware stateful & Deep Packet Inspection (DPI) for SIP Trunks
  • Globally sourced Signature and Blacklist update services for VOIP, Video, UC Application and Server Threats
  • Enforces carrier Authentication and Authorization policies
  • Deep and broad visibility/analytics of User, Application and Network level traffic of SIP based networks unmatched in the industry
  • Sophisticated proactive and real-time network based Toll Fraud detection and prevention
  • Terminates and Validates encrypted signaling (SIP/TLS) packets
  • Terminates and Validates encrypted media (SRTP) packets
  • SNMP support integrates with carrier NOC network management systems
  • HA (high availability) insures no single point of failure.

Complete carrier-class protection, including high performance calls-per-second, active registrations, and SIP session support in a standard high-availability configuration and includes flexible upgrades, and optional FPS interfaces deliver long term investment protection.

  • Core network security for call servers, softswitches, conferencing, unified messaging devices (SIP), and subscriber data
  • Complete UC-aware stateful & Deep Packet Inspection (DPI) for SIP Trunks
  • Globally sourced Signature and Blacklist update services for VOIP, Video, UC Application and Server Threats
  • Enforces carrier Authentication and Authorization policies
  • Deep and broad visibility/analytics of User, Application and Network level traffic of SIP based networks unmatched in the industry
  • Sophisticated Proactive and real-time network based Toll Fraud detection and prevention
  • Terminates and Validates encrypted signalling (SIP/TLS) packets
  • Terminates and Validates encrypted media (SRTP) packets
  • SNMP support integrates with carrier NOC network management systems
  • HA (high availability) insures no single point of failure

 

 

Unified Communications Threat Management (UCTM)


Redshift Networks Unified Communications Threat Management (UCTM) products offer the first complete security solution developed for SIP enabled services (VoIP, Video, IM Presence). Designed for seamless integration into Hosted UC, VoIP, and VoLTE networks, Redshift Networks security appliances act as a central point for management, detection, and prevention of malicious VoIP attacks. By integrating over 40,000 threat signature modules, with its patented, service-aware Behavioral Learning Engine (BLE) and Deep Packet Inspection (DPI) functionality, Redshift delivers industry leading VoIP protection from toll fraud, confidential information compromise, and Denial of Service threats in a compact, easy to deploy, carrier class platform.

 

RedShift Networks products are based on a high performance Proactive Synchronous security design that protects your VoIP/UC service delivery including Hosted IP-PBX, SIP Trunking, ISDN-PRI replacement and Cloud-based Unified Communications. As a critical element of your overall security strategy, Redshift UCTM integrates within your network providing advanced applications layer analytics, signaling layer analytics, stateful inspection and transition monitoring, and real time security policy enforcement, all requirements to secure UC services in today's evolving threat environment.