Security Applications

Real-time Voice Threat Prevention

With the potential for malicious attacks via SIP and VoIP, security for unified communication (UC) and Contact Center (CC) infrastructure and services requires a solution designed specifically to address these unique attack vectors. Leveraging the value of behavioral analytics and machine learning models, it is possible to detect potential illegal robocalls, fraud and TDoS attacks. By incorporating this information into a cloud-hosted real-time assessment and scoring service, it is possible to determine the reputation of each and every call.  Policy decisions can be made in real-time and policy enforcement will prevent these voice threats from disrupting your business.  Policy enforcement is done in real-time at session border controller(s) on a per session basis to drive an overarching security umbrella that greatly reduces the SIP/VoIP threat landscape.

Ribbon's voice threat prevention solution is a based on analytics and machine learning models within FraudProtect and within Ribbon's cloud-hosted Reputation Scoring service.  

FraudProtect

Bad actors are attacking your unified communication or contact center networks to disrupt your business, to fraudulently use your resources or possibly even steal confidential data. Ribbon FraudProtect using machine learning models to recognize repetitive calling patterns that indicate potential voice threat and flag them in real-time based on destination detection. As more fraudulent calls are made they are quickly identified to prevent potential exposure that causes business disruption or loss.  Once identified, this information is made available to Ribbon's Reputation Scoring service.

Reputation Scoring Service

Ribbon's cloud-hosted service uses machine learning models to provide real-time multi-dimensional scoring, based on local and national data sources.  Reputation score(s) indicate the likelihood that a call is being made with malicious intent.  Using this information and policy decision guidelines, a decision can be made for each and every call that will indicate the optimal call validation treatment to ensure good calls are handled normally while llegitimate robocalls and telephony fraud attacks are blocked before they cause damage.  

Using Session Border Controllers for Policy Enforcement

Once a call validation treatment is identified, real-time policy enforcement is possible.  For any enterprise using IP-based Unified Communications or Contact Centers, the ideal policy enforcement point will be a session border controller.  Ribbon provides a suite of SBCs that can fulfill this role  

Threat Visibility

Pattern recognition, reputation scoring, and policy enforcement are all automated functions designed to keep up with the vraiablity and ingenuity of bad actors.  Threat visibility is the ability to have access to dashboards and reporting to ensure the voice threat prevention solution is working as designed and to qauntify the success in stopping voice threats

 

Threat Visibility Graphic

 

Additional voice security applications:

RoboProtect

Analysis using advanced databases, from national sources, to quickly identify the source of robocalls to enable policy decisions before they disrupt your employees or customers.

TDoSProtect

Unfortunately, even when you protect your unified communications from unwanted calls coming into your network it is still possible to encounter a malicious Telephony Denial of Service (TDoS) attack that ties-up communication applications such as IVRs or incoming and outgoing trunks. This security application uses advanced algorithm and machine learning techniques to identify these attacks. Advanced policies are applied at session border controllers to siphon out these unwanted, disruptive calls from your communications networks and applications.

NetProtect

The sharing of threat intelligence data (including white/blacklists) across network elements is the key to closing the security aperture of your communications network. This application enables the distribution of threat intelligence policies across network devices, so you can close the gap exposed by rogue communications. Distributed security policies between your SBCs and next-gen firewalls allows you to stop bad actors at the edge of the network. It also enables your organization to have a more effective and holistic security methodology across the converged (data and communication) network.

Features & Benefits

  • Advanced algorithm and machine learning techniques to identify unwanted, disruptive calls from your communications networks and applications
  • Identify for repetitive calling patterns to anomalous places and flags them in real-time based on destination detection
  • Fraudulent calls are quickly identified and terminated, thus mitigating any expensive monetary or confidential data loss
  • Automatically alerts on and block rogue calling patterns
  • Integrates with 3rd party fraud and robocall databases
  • Detect calling anomalies based on metrics such as CAC by Calling number or long/short call durations, and more
  • Network security intelligence sharing  with next-gen firewalls and automated remediation via SBC or PSX policy enforcement