Securing Real-Time Communications
Service providers manage billions of minutes of SIP-based real-time communications (RTC) on their networks at peering points with other operators and deep within their RTC networks. Ribbon’s session border controllers (SBCs) are used at these edge network points to perform important call management and transcoding functions as well as protecting the network from threats such as Denial of Service (DoS) attacks.
Today, the challenge is how to further secure SIP-based traffic. Mitigating bad actor infiltration, rogue endpoints generating DoS attacks, robo-calls, Telephony DoS (TDoS) attacks and network incursions using SIP are just some of the new attack vectors that need to be addressed.
Completely protecting the RTC network starts with a deep understanding of attack vectors targeting SIP. Ribbon Communications, a leader in SIP security and session border controller technologies, has the solutions capable of identifying the specific threats targeting SIP traffic in RTC networks.
Features & Benefits
Ribbon SBCs serve a critical role in securing RTC. By integrating Ribbon SBCs into the network, these powerful devices protect, secure, simplify and standardise real-time, SIP-based multimedia communications – including voice over IP (VoIP) and video – enabling customers’ UC vision to become a reality.
– Complete security for signaling and media, including traffic policing, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack detection and blocking and rogue Real-Time Transport Protocol (RTP) protection.
– Ensure privacy on the media (SRTP) and signaling (IPSec/TLS) path without sacrificing scalability or performance.
– By invoking “Back-to-back user agent (B2BUA) functionality the SBC can hide the enterprise’s underlying network from bad actors attempting to infiltrate and steal mission-critical data over the UC infrastructure.
– In the event of an equipment failure, physical attack or persistent DoS/DDoS attack, Ribbon’s redundant architecture maintains service, with geo-redundancy options for disaster recovery.
To learn more about securing your real-time communications architectures, visit:
Session Border Controllers for Service Providers
Protect for Service Providers
Fraud Management Applications
RTC Security Applications