The revenue and service opportunities being realized as a result of the transition of telecom operators into IP service providers, whether fixed, mobile, cable (MSO) or wholesale providers, are compelling. The migration for minutes of usage models to application-based services is allowing providers to increase their value, while leveraging the benefits of rapid new service deployment. VoIP services, video collaboration, and mobility are now the primary revenue drivers for carriers. Newer data-centric architectures like IMS and LTE have been designed to enable carriers to deliver flexibility and operational improvements necessary to provide these services. At the same time carriers are now faced with evolutionary challenges. In the past, telecom carriers have been regarded for security and for five-nines
reliability. The architecture of the PSTNs (public switched telephone networks) were closed and for the most part
proprietary, unlike those of present day IP systems where security for real time services like VoIP is not inherent.
Customers expect their communications services to be secure, relying on service providers to insure the security of the
network and its components from end to end. The specialized requirements of VoIP security are often an afterthought. VOIP system implementation is seemingly ad hoc and based on customer demand / revenue requirements. At
the same time, operators are increasingly faced with an expanding set of vulnerability to attack in terms of number and
severity, as Unified Communications concentrated within the service provider networks become high value targets for cyber crime.
Organized cyber criminals and malicious hackers have traditionally targeted data services and applications. However, a growing number of threats have emerged specifically targeting VoIP service components such as user endpoints, Softswitches, IP-PBX, SIP services, network directories, and user databases. The volume and frequency of VOIP & Unified Communication threats and the losses a successful attack can incur require that operators address VOIP &
UC security today. To wait for new network service components, when facing potentially large revenue losses and erosion of customer confidence and loyalty would be catastrophic.
Toll Fraud and Denial of Service (DoS/DDoS) attacks have proven to present significant threats to all operators. These
attack models can only be accurately detected through visibility into endpoint actions, signaling and media protocols,
and through applications awareness. By correlating these events, with an in-depth understanding of service behaviors,
loss due to compromised software elements and unauthorized access can be quickly averted while also reducing false
positives and negatives that occur when security devices have only a limited view of the network and its operation.
A comprehensive detection, management and control solution are a must to address the core components of the telecom carrier network, as well as upstream and downstream behaviors, traffic, signaling, call states, and endpoint security.
RedShift Networks core infrastructure UCTM solution monitors and manages the security of network elements and
traffic from an appliance-based integrated system.
RedShift Networks UCTM does this without sacrificing performance and employee productivity. RedShift Networks
Security Appliances provide a point of integration, visibility, control and protection for enterprise Unified Communication