SlideShare a Scribd company logo
1 of 22
Agenda
Why Cyber Security?
Products, Projects and Services
Why Cyber Security? Telecom?
COMMUNICATION OVER IP CONTINUES TO GROW
WITH NEW TECHNOLOGIES AND SERVICES...
- IPv4 addresses run out and IPv6 being used
- 4G days going on and 5G is planned to be a live in 2020 – no circuit switch
support any more
- VoIP (packet switched network) usage being increased
- The secure VoIP is the main point due to the nature of the IP network
topology and VoIP systems
• Cost Savings – setup, operation and support
• Rich Media Services
• Phone portability – no location based
• Service Mobility
• Integration and collaboration with other
applications
• User control interface
• No geographical boundary
• Rich features
* Due to vulnerability of IP networks and VoIP
systems, more fraud attempts on VoIP
PSTN + GSM  VoIP
Why Cyber Security? VoIP? Global VoIP Traffic
*Stattistica 2014,http://www.statista.com/statistics/267183/forecast-for-the-worldwide-voip-traffic
Secure VoIP Important
Why Cyber Security? 2013 Estimated Fraud Losses
Total Loss
$46.3Billion
VoIP Hacking
$3.62Billion
VoIP Traffic Theft
Communications Fraud Control Association (CFCA Report) 2013,
http://cfca.org/pdf/survey/Global%20Fraud_Loss_Survey2013.pdf
Fuzzing
Password Cracking
Denial of Service
Voice Quality Disruption
Information Theft
Malware Attacks
Eavesdropping
Toll Fraud
Why Cyber Security? VoIP Frauds Occurred…
Hacker attacks - %25 on Voice Systems
According to Control Phreak 2012 report;
AT&T PABX customers hacked and
- traffic ended to Somali, Cost Fraud: 1 milyon $ (minutes 22$, 4 days) – 9 June 2012
- international premium-rate services calls - Cost Fraud: 2 milyon $ - 28 November 2011
In Russia, during elections, advertisement announcements in the calls - 9 December 2011
Toll Fraud More than 2,200 company in ABD, Cost Fraud: 55 milyon $
Attacks to VoIP and UC systems, more than 20,000 in a year
Agenda
Why Cyber Security?
Products, Projects and Services
Products, Projects and Services Products
VoIP Security Scanner
1. The first multifunctional national
VoIP Vulnerability Assessment Tool
2. Expert system report presents
detailed reports of security measures
against vulnerabilities
3. Protocol compatibility and stress
tests
4. VoIP traffic generation and
automatic service tests
5. Fuzzing tests using Genetic
Algorithm and ABNF
6. Flexible and modular structure
VoIP Application Firewall
1. The first national application level
firewall solution
2. Attack detection and prevention with
deep instantaneous statistical data
analysis,
3. Dynamic filtering, automatic rules
update, and policy rule editor
4. Detecting critical system parameters
and anomaly detection with traffic
monitoring method
5. Detection and prevention against
attacks such as toll fraud, DDoS, fuzzing,
call forwarding fraud
6. Anomaly detection in big-data using
learning algorithms architecture
Medya Security Platform
1. Secure communication (voice,
video, message and file tansfer,
signature)
2. Encrypted communication
3. Windows, Android and iOS support
4. Two scenarios support
- Lawful intercept scenario
- Not intercept scenario
5. Device independent
6. Smart card use
7. 13 Patent
VoIP Application Firewall
Products, Projects and Services VoIP Application Firewall
Internet
Service Providers
IP Firewall
VoIP Application Firewall
Internal and External
VoIP Network Security
with NOVA V-GATE ile
SBC / SIP Server
Products, Projects and Services VoIP Security in Unified Communication
VoIP Server Web & Email
Server
DNS Server Database
Server
Application
Server
< Router >
< Firewall >
< Switch >
< Firewall >
< Switch >
Call Forwarding Fraud
Traffic Call Generator
The fraudsters gain access to an enterprise PBX or the IVR of a voice mail system.
They can then configure call forwarding to an expensive long distance destination to profit from a revenue
sharing deal.
The frauder has a revenue sharing deal
with the high cost destination and recevies payment.
Products, Projects and Services
Products, Projects and Services One Ring and Cut (Wangiri) Fraud
The fraudster sets up calls to voice
subscribers, but hangs up after one
ring.
Curious subscribers see a missed call on
their phones, and return the call, not
realizing that the number is actually a high
cost destination. (This fraud can be
realized with SMS message.)
Service provider routed call to high cost
destination.
Products, Projects and Services Vishing, “Voice-Phishing, ANI Spoofing
The fraudster pretends as a
legitimate business to attempt
to gather customer data such as
credit balance from someone.
Products, Projects and Services Security Threats Prevented by V-Gate
Your Services (Call,
Forwarding eg.)
Denial of Service Delay Used by others
Your Data (User
profiles, service info
eg.)
Theft Replace
Your Quality of
Services (Traffic
management, delays,
pricing eg.)
Slowdown in voice
and video services
Capacity Problems
Misinformation and
billing problems
%100 inhouse
VoIP Security Scanner
And Security Report
Products, Projects and Services VoIP & Web Pentest Services
Security threat simulation tools
and modules
Reconnaissance
Distributed Denial of Service
Fuzzing
Man In the Middle
Bulk Call Generation (from spoofed IDs),
Stress and Capacity Tests
We give pentest services with our
own products.
Attack and Penetration Testing
Analyze The Results
Generate System Report
Define the Aim
Determine the Scope
Collect Information
Detect Vulnerabilities
RECONNAISSANCE MAPPING DISCOVERY EXPLOID REPORTING
Products, Projects and Services Why NOVA V-SPY?
VoIP Device
Reconnaissance
Determining
whether they work
Software Version
Control
Sytem Info
System
Capturing
Attacks
Pentest
Changing the
configuration of
system equipment
Resistance test
against traffic
routing frauds
Denial of
Service
Call ((IP, port and
user) generator from
single point or the
distribution points
System resistance
test with fuzzing
messages
Security test with
protocol message
chain
System Capacity
and Stress Tests
Security controls of
systems
System durability
tests with stress
tests
Decision support for
operational
management
%100 inhouse
Media Security Platform
Products, Projects and Services Secure Communication
Android application
WebRTC
Secure voice and video communication
Secure messaging
Secure screen sharing
Algorithm skipping (Blowfish, AES256…)
Key skipping
Diffie-Hellman
Smartcard
13 Patents
Lawful intercept (For Public Users)
SPiDR compatible
Products, Projects and Services Why NOVA MSP?
Device
Independent
Android MSP Web client IOS (near time)
Secure
Communication
Encryption
Algorithms
Smart Card
Session based
Communication
%100 inhouse
The source code
sharing where
necessary
Custom Based
Development
THANK YOU
www.novacybersecurity.com

More Related Content

What's hot

Jcj corporate blind overview november 19 2012 1-1
Jcj corporate blind  overview november 19 2012 1-1Jcj corporate blind  overview november 19 2012 1-1
Jcj corporate blind overview november 19 2012 1-1
ashk4n
 
5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training
Bryan Len
 
Internet of Things DC: July 13 Meetup - Link Labs
Internet of Things DC: July 13 Meetup - Link LabsInternet of Things DC: July 13 Meetup - Link Labs
Internet of Things DC: July 13 Meetup - Link Labs
Internet of Things DC
 
5G security training, 5G training course
5G security training, 5G training course5G security training, 5G training course
5G security training, 5G training course
Tonex
 
Glimmerglass CyberSweep
Glimmerglass CyberSweepGlimmerglass CyberSweep
Glimmerglass CyberSweep
Scott Rickard
 
5G Security Training
5G Security Training5G Security Training
5G Security Training
Tonex
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
mashiur
 

What's hot (18)

Jcj corporate blind overview november 19 2012 1-1
Jcj corporate blind  overview november 19 2012 1-1Jcj corporate blind  overview november 19 2012 1-1
Jcj corporate blind overview november 19 2012 1-1
 
5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training5G Wireless Security Training : Tonex Training
5G Wireless Security Training : Tonex Training
 
Internet of Things DC: July 13 Meetup - Link Labs
Internet of Things DC: July 13 Meetup - Link LabsInternet of Things DC: July 13 Meetup - Link Labs
Internet of Things DC: July 13 Meetup - Link Labs
 
Intelligence Driven Security
Intelligence Driven SecurityIntelligence Driven Security
Intelligence Driven Security
 
Innovation Summit 2015 - 11 - morpho
Innovation Summit 2015 - 11 - morphoInnovation Summit 2015 - 11 - morpho
Innovation Summit 2015 - 11 - morpho
 
Zig bee
Zig beeZig bee
Zig bee
 
5G security training, 5G training course
5G security training, 5G training course5G security training, 5G training course
5G security training, 5G training course
 
Esd Networks india
Esd Networks indiaEsd Networks india
Esd Networks india
 
Esd Networks India
Esd Networks IndiaEsd Networks India
Esd Networks India
 
ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17ROOTS wireless solution - designing the next wireless user experience oct17
ROOTS wireless solution - designing the next wireless user experience oct17
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
Glimmerglass CyberSweep
Glimmerglass CyberSweepGlimmerglass CyberSweep
Glimmerglass CyberSweep
 
5G Security Training
5G Security Training5G Security Training
5G Security Training
 
Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!
 
Concentris Systems Overview
Concentris Systems OverviewConcentris Systems Overview
Concentris Systems Overview
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
5G TECHNOLOGY 2020
5G TECHNOLOGY 20205G TECHNOLOGY 2020
5G TECHNOLOGY 2020
 
Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056Abdullah Al Mamun 062507056
Abdullah Al Mamun 062507056
 

Similar to Netas Nova Cyber Security Product Family

Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
mashiur
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
Guy Romanus
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptx
amalouwarda1
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
Joe Sarno
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
Bev Robb
 

Similar to Netas Nova Cyber Security Product Family (20)

Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)Rubaiyet Rashid Romel (063454056)
Rubaiyet Rashid Romel (063454056)
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
VoIP Security
VoIP SecurityVoIP Security
VoIP Security
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
Audio card - VoIP - Phonecard
Audio card - VoIP - PhonecardAudio card - VoIP - Phonecard
Audio card - VoIP - Phonecard
 
Information Security
Information SecurityInformation Security
Information Security
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
An approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptxAn approach to mitigate DDoS attacks on SIP.pptx
An approach to mitigate DDoS attacks on SIP.pptx
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Securing VoIP Networks
Securing VoIP NetworksSecuring VoIP Networks
Securing VoIP Networks
 
VoIP security
VoIP securityVoIP security
VoIP security
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51VoIp Security Services Technical Description Cyber51
VoIp Security Services Technical Description Cyber51
 
Emea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 LinEmea Corporate Presentation 0709 Lin
Emea Corporate Presentation 0709 Lin
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
Knowing where the safe zone is ovum october 22 2013
Knowing where the safe zone is  ovum october 22 2013 Knowing where the safe zone is  ovum october 22 2013
Knowing where the safe zone is ovum october 22 2013
 

Recently uploaded

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Recently uploaded (20)

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 

Netas Nova Cyber Security Product Family

  • 1.
  • 2. Agenda Why Cyber Security? Products, Projects and Services
  • 3. Why Cyber Security? Telecom? COMMUNICATION OVER IP CONTINUES TO GROW WITH NEW TECHNOLOGIES AND SERVICES... - IPv4 addresses run out and IPv6 being used - 4G days going on and 5G is planned to be a live in 2020 – no circuit switch support any more - VoIP (packet switched network) usage being increased - The secure VoIP is the main point due to the nature of the IP network topology and VoIP systems
  • 4. • Cost Savings – setup, operation and support • Rich Media Services • Phone portability – no location based • Service Mobility • Integration and collaboration with other applications • User control interface • No geographical boundary • Rich features * Due to vulnerability of IP networks and VoIP systems, more fraud attempts on VoIP PSTN + GSM  VoIP Why Cyber Security? VoIP? Global VoIP Traffic *Stattistica 2014,http://www.statista.com/statistics/267183/forecast-for-the-worldwide-voip-traffic Secure VoIP Important
  • 5. Why Cyber Security? 2013 Estimated Fraud Losses Total Loss $46.3Billion VoIP Hacking $3.62Billion VoIP Traffic Theft Communications Fraud Control Association (CFCA Report) 2013, http://cfca.org/pdf/survey/Global%20Fraud_Loss_Survey2013.pdf Fuzzing Password Cracking Denial of Service Voice Quality Disruption Information Theft Malware Attacks Eavesdropping Toll Fraud
  • 6. Why Cyber Security? VoIP Frauds Occurred… Hacker attacks - %25 on Voice Systems According to Control Phreak 2012 report; AT&T PABX customers hacked and - traffic ended to Somali, Cost Fraud: 1 milyon $ (minutes 22$, 4 days) – 9 June 2012 - international premium-rate services calls - Cost Fraud: 2 milyon $ - 28 November 2011 In Russia, during elections, advertisement announcements in the calls - 9 December 2011 Toll Fraud More than 2,200 company in ABD, Cost Fraud: 55 milyon $ Attacks to VoIP and UC systems, more than 20,000 in a year
  • 7. Agenda Why Cyber Security? Products, Projects and Services
  • 8. Products, Projects and Services Products VoIP Security Scanner 1. The first multifunctional national VoIP Vulnerability Assessment Tool 2. Expert system report presents detailed reports of security measures against vulnerabilities 3. Protocol compatibility and stress tests 4. VoIP traffic generation and automatic service tests 5. Fuzzing tests using Genetic Algorithm and ABNF 6. Flexible and modular structure VoIP Application Firewall 1. The first national application level firewall solution 2. Attack detection and prevention with deep instantaneous statistical data analysis, 3. Dynamic filtering, automatic rules update, and policy rule editor 4. Detecting critical system parameters and anomaly detection with traffic monitoring method 5. Detection and prevention against attacks such as toll fraud, DDoS, fuzzing, call forwarding fraud 6. Anomaly detection in big-data using learning algorithms architecture Medya Security Platform 1. Secure communication (voice, video, message and file tansfer, signature) 2. Encrypted communication 3. Windows, Android and iOS support 4. Two scenarios support - Lawful intercept scenario - Not intercept scenario 5. Device independent 6. Smart card use 7. 13 Patent
  • 10. Products, Projects and Services VoIP Application Firewall Internet Service Providers IP Firewall VoIP Application Firewall Internal and External VoIP Network Security with NOVA V-GATE ile SBC / SIP Server
  • 11. Products, Projects and Services VoIP Security in Unified Communication VoIP Server Web & Email Server DNS Server Database Server Application Server < Router > < Firewall > < Switch > < Firewall > < Switch >
  • 12. Call Forwarding Fraud Traffic Call Generator The fraudsters gain access to an enterprise PBX or the IVR of a voice mail system. They can then configure call forwarding to an expensive long distance destination to profit from a revenue sharing deal. The frauder has a revenue sharing deal with the high cost destination and recevies payment. Products, Projects and Services
  • 13. Products, Projects and Services One Ring and Cut (Wangiri) Fraud The fraudster sets up calls to voice subscribers, but hangs up after one ring. Curious subscribers see a missed call on their phones, and return the call, not realizing that the number is actually a high cost destination. (This fraud can be realized with SMS message.) Service provider routed call to high cost destination.
  • 14. Products, Projects and Services Vishing, “Voice-Phishing, ANI Spoofing The fraudster pretends as a legitimate business to attempt to gather customer data such as credit balance from someone.
  • 15. Products, Projects and Services Security Threats Prevented by V-Gate Your Services (Call, Forwarding eg.) Denial of Service Delay Used by others Your Data (User profiles, service info eg.) Theft Replace Your Quality of Services (Traffic management, delays, pricing eg.) Slowdown in voice and video services Capacity Problems Misinformation and billing problems %100 inhouse
  • 16. VoIP Security Scanner And Security Report
  • 17. Products, Projects and Services VoIP & Web Pentest Services Security threat simulation tools and modules Reconnaissance Distributed Denial of Service Fuzzing Man In the Middle Bulk Call Generation (from spoofed IDs), Stress and Capacity Tests We give pentest services with our own products. Attack and Penetration Testing Analyze The Results Generate System Report Define the Aim Determine the Scope Collect Information Detect Vulnerabilities RECONNAISSANCE MAPPING DISCOVERY EXPLOID REPORTING
  • 18. Products, Projects and Services Why NOVA V-SPY? VoIP Device Reconnaissance Determining whether they work Software Version Control Sytem Info System Capturing Attacks Pentest Changing the configuration of system equipment Resistance test against traffic routing frauds Denial of Service Call ((IP, port and user) generator from single point or the distribution points System resistance test with fuzzing messages Security test with protocol message chain System Capacity and Stress Tests Security controls of systems System durability tests with stress tests Decision support for operational management %100 inhouse
  • 20. Products, Projects and Services Secure Communication Android application WebRTC Secure voice and video communication Secure messaging Secure screen sharing Algorithm skipping (Blowfish, AES256…) Key skipping Diffie-Hellman Smartcard 13 Patents Lawful intercept (For Public Users) SPiDR compatible
  • 21. Products, Projects and Services Why NOVA MSP? Device Independent Android MSP Web client IOS (near time) Secure Communication Encryption Algorithms Smart Card Session based Communication %100 inhouse The source code sharing where necessary Custom Based Development