Security Analytics

With the potential for malicious attacks via SIP and VoIP, real-time communication (RTC) services can benefit greatly from the added value of behavioral analytics and machine learning. Behavioral analysis combined with anomaly detection is crucial for detecting many types of fraudulent activity, making it an important part of securing RTC services.

Yet, even with behavioral analytics and anomaly detection, assuring the integrity of RTC services usually means a service provider will need both visibility and control over, a variety of disparate products. Unfortunately, these disparate products will rarely, if ever, interact with each other. Ribbon solves the security isolation issue by taking a unique integrated approach that collects data from multi-vendor networks elements and then distributes security policy across various security domain. This also results in the reduction of management silos and greatly reduces the overall threat landscape.

Services security need not be limited to a service provider’s network. In fact, service providers can differentiate themselves by bundling in a security offer with a managed RTC service offer to their enterprise customers. By providing behavioral analytics and anomaly detection for hosted traffic or SIP trunking service for an enterprise, a service provider can gain a new revenue stream and be more competitive.

In addition, Security Applications, provide key capabilities that enrich Ribbon Call TrustTM, our Identity Assurance solution. By analyzing network call data is it possible to proactively identify potential robocalls or fraud calls. Following detection and identification this information on bad actors is fed into the Ribbon Identity Hub, in near-real time, to enrich the reputation scoring models.

Features & Benefits

  • Establish a well-defined baseline for what is categorized as “normal” so deviations from this baseline can be quickly identified.
  • Centralize the detection and auto-mitigation RTC attacks and threats
  • Establish a comprehensive and correlated view of attack/threat activity that otherwise evade existing point solutions.
  • Stop toll fraud by continually analyzing call metrics during work and non-work hours.
  • Mitigate complex Telephony Denial of Service (T-DoS) attacks
  • Augment the ability to detect and block robocalls
  • Differentiate your solution portfolio with managed security