Fuzzing attacks easily compromise the peer to peer and real-time nature of VoIP, weak endpoints, and complex UC application states. RedShift Networks addresses this gap where it is exceedingly difficult to protect stateless firewalls for VoIP environments. VoIP attackers directly fuzz endpoints and the dynamically fuzzed attacks directly pass through IP PBX and attack endpoints.
RedShift Networks offers users wide-ranging attack protection against a whole class of fuzzing attacks. The Unified Communication Threat Management solution auto learns application states at VoIP/UC layers. This management overlay delivers a visually positive logical fingerprint of runtime execution model and enforcing tight checks at all layers — whether its disallowing non conformant inputs, disallowing malicious inserted states or applying integrity checks at User, Network, Protocol session or Device layer. In addition, RedShift Networks own CONDOR research labs extensively tests new devices, phone calls servers, applications for vulnerability till breaking point. It notifies the vendor of any 0-day vulnerabilities in addition to developing shields for specific exploits and provide automatic rollout as part of its signature update service.