Ribbon launches Unified Communications security applications on Ribbon Protect

Kevin Riley of Ribbon Communications

Ribbon Communications Inc., a global provider in secure and intelligent cloud communications, launched a suite of Unified Communications (UC) security and intelligent operations applications for its Ribbon Protect platform.

Ribbon Protect provides a single view of the end to end network, critical for UC threat detection, fraud management and network operations.

Bad actors are constantly looking for the easiest path into corporate networks. The growth of SIP adoption has led to new security breaches as bad actors prey on vulnerabilities created by a poor understanding of the risks and subsequent lack of best practices to address threats and protect the real-time communications network.

Some bad actors will target SIP specifically for toll fraud, but more likely this will be their point of entry for other forms of malicious activity, such as Telephony Denial of Service (T-DoS) attacks, to disrupt operations or using the UC network to exfiltrate large amounts of mission-critical data by simulating voice and video calls. SIP serves as a means to an end in these scenarios, and a complete security plan must include protection of the real time communications network.

“Corporate networks are an increasingly tempting revenue source for cyber thugs in today’s information economy,” said Kevin Riley, CTO Ribbon. “The tremendous growth of SIP adoption means that enterprises must focus on the associated vulnerabilities to address these threats. That’s where Ribbon Protect comes in.”

Ribbon offers a number of specific communication security and network operation applications that can easily be added to the Ribbon Protect software platform through a simple feature license:

  1. TDOSProtect uses advanced algorithm and machine learning techniques to mitigate attacks from large volumes of unwanted calls coming into the network. While these calls may appear valid, they can tie up or crash mission-critical communication applications such as call centres, IVRs or PBX trunks with long call duration times.
  2. NETProtect distributes threat intelligence policies across the entire communications network to close the security aperture exposed by Unified Communications (UC). Distributed security.policies between Session Border Controllers (SBC) and next-generation firewalls help stop bad actors at the edge of the network, while delivering a more effective and holistic security methodology across the converged data and communication network.
  3. FRAUDProtect looks for repetitive calling patterns to and from anomalous places and flags them in real-time. As more fraudulent calls are made they are quickly identified and blocked, thus mitigating expensive toll charges.
  4. ROBOProtect uses advanced databases to quickly identify the source of the robocall and apply policies to the edge of the network, stopping these calls before they disrupt customers or employees.
  5. Intelligent network operations suite helps keep communications running smoothly by leveraging proactive analytics designed to improve the user experience and reduce operational costs, delivering intelligent service quality. This suite provides network-wide monitoring, reporting, troubleshooting and can provide SIP ladder diagrams across multiple platforms. Network analysts can also leverage the capacity planning application to accurately assess future UC network growth.

The Ribbon Protect platform quickly and easily integrates with existing unified communications (UC) network investments, using powerful and advanced behavioral analytics to deliver a new level of security and intelligent operations.

By establishing a baseline of voice, video sessions and IP port activity, Ribbon Protect and its applications quickly identify and mitigate deviations from this baseline, whether T-DoS attacks, quality of experience issues, toll fraud, or potential data exfiltration.

Ribbon Communications’ Security portfolio includes Ribbon Protect plus the suite of UC Security applications; virtual and appliance based SBCs, Session Border Controllers, and Ribbon PSX enabling secure, smart, and simple solutions that eliminate threats and network complexities associated with adopting unified communications for the enterprise.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

Nordic-powered smart utility access cover offers anti-theft protection and detects open/close events

Posted on: August 16, 2022

Oslo, Norway – China-based Jian-IOT has launched a smart utility access cover that can detect when the cover has been opened or closed, records water level and temperature data, identifies any damage, and includes an anti-theft system that tracks the current location of the device. The ‘Integrated Intelligent Manhole Cover’ employs Nordic’s nRF52832 SoC to both act

Read more

Helbiz to offer on-demand taxi services to widen international intermodal offering

Posted on: August 16, 2022

New York, United States – Helbiz, a global provider in micro-mobility, announced the beginning of a new chapter for its intermodal mobility offering, Helbiz Taxi. The micro-mobility company aims to integrate mobility services around the world in its app to widen the intra and extra urban mobility offerings to include vehicles from additional companies with

Read more
FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more

What is IoT?

Posted on: July 7, 2019

What is IoT Data as a new oil IoT connectivity What is IoT video So what’s IoT? The phrase ‘Internet of Things’ (IoT) is officially everywhere. It constantly shows up in my Google news feed, the weekend tech supplements are waxing lyrical about it and the volume of marketing emails I receive advertising ‘smart, connected

Read more
IoT Newsletter

Join the IoT Now online community for FREE, to receive: Exclusive offers for entry to all the IoT events that matter, round the world

Free access to a huge selection of the latest IoT analyst reports and industry whitepapers

The latest IoT news, as it breaks, to your inbox