SlideShare a Scribd company logo
1 of 31
Download to read offline
2
Introductions
Alan D Percy
Chief Marketing Officer
alan.percy@telcobridges.com
@AlanDPercy
Gerry Christensen
VP of BD, YouMail
gchristensen@youmail.com
@GTChristensen
3
Agenda
• Introductions
• Background on STIR/SHAKEN
• Where do we Stand?
• Beyond Robocall Mitigation
• Where to Learn More
• Your Questions
A
D
N
E
G
A
TelcoBridges Inc.
• Manufacturer of VoIP gateways, signaling
gateways, and SBC software for carriers and
enterprises
• Employee Owned
• Founded in 2002
• Employees: ~40
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Montreal, Turkey, Hong Kong, Italy
• 24/7 technical support
4
TelcoBridges HQ
© YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY.
5
â–· Originally known for consumer call answering services
â–· Recent expansion into safe communications for carriers
& enterprises
â–· Venture-backed : Series A & B rounds
â–· Founded in 2007
â–· ~50 employees
â–· Headquarters in Irvine, California.
â–· Operations in USA, Canada & UK.
6
State of
STIR/SHAKEN
STIR/SHAKEN in 1 Slide
7
I know the subscriber, can attest
that they have permission to
use the number, and I have
permission to pass calls with
STIR/SHAKEN
Originating
Service Provider
Terminating
Service Provider
The originating SP is valid,
attested that the caller ID
is legitimate and has not
been manipulated
Intermediate
Service Providers
STIR/SHAKEN “Security”
STIR/SHAKEN
What it Does Do:
• Secures the Caller-ID information
• The originating operator attests as
to whether the caller has permission
to use the number
• Defines three levels of attestation
(A, B, C)
• Tell subscriber if the call has an
attestation (but not the level)
• Provides traceback
What it Does Not do:
8
• Pass the level of attestation to the
called party
• Monitor patterns of calling or abuse
• Know the intent of the caller
• Differentiate between legitimate and
fraudulent behavior
• Redirect suspicious traffic
• Terminate known fraudulent calls
Timeline
9
Do Not Call
Act
Truth in
Caller ID
Act
FCC Calls for
STIR/SHAKEN
implementation
TRACED Act
signed into law
Robocall
Mitigation
Database
Filings Due
“May-not-
accept”
2003 2009 2019 June 30,
2021
Sept 28,
2021
Security Swiss Cheese
10
Know your
Customer
STIR/
SHAKEN
Analytics
11
YouMail
Robocall Analytics
Will STIR/SHAKEN solve the Illegal
Robocall Problem?
Presented by:
13
https://www.ftc.gov/reports/
consumer-sentinel-network-data-book-2020
Call attacks rising & top source! - FTC
2
1
www.youmail.com © 2021 YouMail, Inc
14
YouMail: Definitive Source On Bad Calls
YouMail shows the estimated national volume of ..
47,839,232,200 in 2018. 28. YouMail further reports … how
pervasive robocalls are .. YouMail identified 5.1 billion calls ..
15
Unique answering data + fingerprinting
captures bad actors as they start their behavior –
within minutes of the first call
We ID call attacks by what they say
This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
Hello… John is not currently available, please
leave a message.
Campaign:
Caller Phone Number:
Caller ID:
Caller Carrier:
Call Time (UTC):
Callee Phone Number:
Callee Carrier:
Social Security Imposter Attack
240-587-5386
IRS
AcmeLEC CLEC, LLC
2020-10-13T20:23:05Z
210-884-xxxx
T-Mobile
16
Sensor Network
Consumer mobile numbers
answered by YouMail
instead of carrier
Call content + AI = Zero-hour protection
AI
AI This message from the Social Security Administration
is regarding an enforcement action filed by the
Department of Treasury on your social security number.
This will be recorded second avoidance of appearance
before a magistrate judge ordered jury for a criminal
offense…
YouMail Call Fingerprinting identifies bad calls typically
within 1-5 minutes based on answering billions of annual calls
AI
YouMail
Call
Platform
Zero-hour protection
Protection and mitigation available for
mobile clients, carrier networks
and consumer brands
Sensor Network & Protection capabilities powered by an
extensive patent portfolio covering our unique
call fingerprinting, handling and quarantining
technologies.
#
#
#
Impact on Enterprise: IP-PBXs and UCaaS
17
• Enterprise organizations
desire calls from
customers, colleagues,
and partners
• Unwanted robocalls tie
up enterprise resources
and represent lost
productivity for
employees
Desired calls…
Unwanted calls…
More Information…
18
Gerry Christensen
VP BD and Strategic Partnerships
p: 206-472-7060 e: gchristensen@youmail.com
Try YouMail Now: iPhone,Android
Ground-Truth Identification → Zero-Hour Detection + Action
https://www.linkedin.com/in/gerrychristensen/
Every call should be
safe & productive.
19
20
Robocall Mitigation
with
ProSBC and YouMail
Points of Mitigation
Four Points for Mitigation:
1. Originating Service Provider
2. Terminating Service Provider
3. As a Service
4. Subscriber
21
SP Use Case:
• ProSBC inserted into call route
• As calls arrive, reputation is
checked
• Based on reputation score:
• 503 – SVC Unavailable
(Route advance)
• 603 – Decline
(Drop the call)
Originating Service Provider
22
Carrier
Reputation
Analytics
Soft Switch
Originating Service Provider
INVITE
503
603
Subscribers
CPaaS and UCaaS Providers
25
SIP
Carrier
CPaaS or UCaaS Provider
Protecting XaaS platforms
• SBC in the cloud, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
Reputation
Analytics
UCaaS Subscribers
Enterprise Premises
26
SIP
Carrier
Reputation
Analytics
IP-PBX
Enterprise
Enterprise Customers
• SBC on premises, integrated
with reputation analytics
• As calls arrive, reputation is
checked
• Based on reputation score:
• Calls are completed
• Dropped
• Redirected to Voicemail
Mitigation as a Service
27
SIP
Carrier
IP-PBX
Enterprise
Enterprise Customers
• Full service is in cloud,
integrated SBC with reputation
analytics
• SIP Trunk from carrier is sent
to service
• Mitigated SIP Trunk then sent
to enterprise
• No on-premises equipment
• Seamless integration
28
Learn More
Solution Brief
BENEFITS:
The benefits of the TelcoBridges/YouMail
integration includes:
• Ease of Implementation – Inserting ProSBC
into the call flow eliminates the need for
major upgrades to existing systems
• Compliance – Quickly meet FCC robocaller
mitigation requirements
• Flexible Deployment Options – can be
deployed in the service provider network or
cloud
• Scalable Business Model – allowing
businesses to “ramp up” their robocaller
mitigation as they grow
• Highly reliable – based on carrier-class
reliable software and hardware systems
29
https://freesbc.telcobridges.com/youmail/
Know Your Customer Whitepaper
30
Get your copy from: https://freesbc.telcobridges.com/lp-youmail-wp/
Video Library on YouTube
• ProSBC Training Modules
• Recorded webinars
• How-to Tutorials
• Customer interviews
• Frequently Asked Questions
• Recorded podcasts
• And more…
31
youtube.com/telcobridges
Enabling the Migration to
Cloud Communications
32
www.telcobridges.com
www.prosbc.com
sales@telcobridges.com
Youtube.com/telcobridges
Q/A
www.YouMail.com
gchristensen@youmail.com
View the Full-Length Video at:
www2.telcobridges.com/videolibrary
33

More Related Content

Similar to Will STIR/SHAKEN Solve the Illegal Robocall Problem?

How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksAlan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksTelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENAlan Percy
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENTelcoBridges Inc.
 
Security and governance
Security and governanceSecurity and governance
Security and governanceDataWorks Summit
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPROIDEA
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtechSvetlanaUsikava
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENTelcoBridges Inc.
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyCharlie Pownall
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWithum
 
2000-12 CTI Newsletter
2000-12 CTI  Newsletter2000-12 CTI  Newsletter
2000-12 CTI NewsletterTed Zapletal
 
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing?  The Brave New World of "Anti Robocall AppsAutomate Lawsuit Filing?  The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing? The Brave New World of "Anti Robocall AppsJeff Martinez
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
Implementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomImplementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomJolita Bernotiene
 

Similar to Will STIR/SHAKEN Solve the Illegal Robocall Problem? (20)

How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Security and governance
Security and governanceSecurity and governance
Security and governance
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtech
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case Study
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
2000-12 CTI Newsletter
2000-12 CTI  Newsletter2000-12 CTI  Newsletter
2000-12 CTI Newsletter
 
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing?  The Brave New World of "Anti Robocall AppsAutomate Lawsuit Filing?  The Brave New World of "Anti Robocall Apps
Automate Lawsuit Filing? The Brave New World of "Anti Robocall Apps
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Implementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacomImplementing AI powered NBO programs exacaster vivacom
Implementing AI powered NBO programs exacaster vivacom
 

More from TelcoBridges Inc.

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesTelcoBridges Inc.
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTelcoBridges Inc.
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsTelcoBridges Inc.
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesTelcoBridges Inc.
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityTelcoBridges Inc.
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsTelcoBridges Inc.
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCTelcoBridges Inc.
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media GatewaysTelcoBridges Inc.
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialTelcoBridges Inc.
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs ExplainedTelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsTelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsTelcoBridges Inc.
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANTelcoBridges Inc.
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQTelcoBridges Inc.
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?TelcoBridges Inc.
 
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018TelcoBridges Inc.
 

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 
Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?Firewalls, SIP Servers and SBC - What's the Differences?
Firewalls, SIP Servers and SBC - What's the Differences?
 
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
The Intelligent Edge - Managing Network Traffic at the Edge at SIPNOC 2018
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Will STIR/SHAKEN Solve the Illegal Robocall Problem?

  • 1.
  • 2. 2 Introductions Alan D Percy Chief Marketing Officer alan.percy@telcobridges.com @AlanDPercy Gerry Christensen VP of BD, YouMail gchristensen@youmail.com @GTChristensen
  • 3. 3 Agenda • Introductions • Background on STIR/SHAKEN • Where do we Stand? • Beyond Robocall Mitigation • Where to Learn More • Your Questions A D N E G A
  • 4. TelcoBridges Inc. • Manufacturer of VoIP gateways, signaling gateways, and SBC software for carriers and enterprises • Employee Owned • Founded in 2002 • Employees: ~40 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Montreal, Turkey, Hong Kong, Italy • 24/7 technical support 4 TelcoBridges HQ
  • 5. © YOUMAIL, INC. CONFIDENTIAL & PROPRIETARY. 5 â–· Originally known for consumer call answering services â–· Recent expansion into safe communications for carriers & enterprises â–· Venture-backed : Series A & B rounds â–· Founded in 2007 â–· ~50 employees â–· Headquarters in Irvine, California. â–· Operations in USA, Canada & UK.
  • 7. STIR/SHAKEN in 1 Slide 7 I know the subscriber, can attest that they have permission to use the number, and I have permission to pass calls with STIR/SHAKEN Originating Service Provider Terminating Service Provider The originating SP is valid, attested that the caller ID is legitimate and has not been manipulated Intermediate Service Providers STIR/SHAKEN “Security”
  • 8. STIR/SHAKEN What it Does Do: • Secures the Caller-ID information • The originating operator attests as to whether the caller has permission to use the number • Defines three levels of attestation (A, B, C) • Tell subscriber if the call has an attestation (but not the level) • Provides traceback What it Does Not do: 8 • Pass the level of attestation to the called party • Monitor patterns of calling or abuse • Know the intent of the caller • Differentiate between legitimate and fraudulent behavior • Redirect suspicious traffic • Terminate known fraudulent calls
  • 9. Timeline 9 Do Not Call Act Truth in Caller ID Act FCC Calls for STIR/SHAKEN implementation TRACED Act signed into law Robocall Mitigation Database Filings Due “May-not- accept” 2003 2009 2019 June 30, 2021 Sept 28, 2021
  • 10. Security Swiss Cheese 10 Know your Customer STIR/ SHAKEN Analytics
  • 12. Will STIR/SHAKEN solve the Illegal Robocall Problem? Presented by:
  • 14. www.youmail.com © 2021 YouMail, Inc 14 YouMail: Definitive Source On Bad Calls YouMail shows the estimated national volume of .. 47,839,232,200 in 2018. 28. YouMail further reports … how pervasive robocalls are .. YouMail identified 5.1 billion calls ..
  • 15. 15 Unique answering data + fingerprinting captures bad actors as they start their behavior – within minutes of the first call We ID call attacks by what they say This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense… Hello… John is not currently available, please leave a message. Campaign: Caller Phone Number: Caller ID: Caller Carrier: Call Time (UTC): Callee Phone Number: Callee Carrier: Social Security Imposter Attack 240-587-5386 IRS AcmeLEC CLEC, LLC 2020-10-13T20:23:05Z 210-884-xxxx T-Mobile
  • 16. 16 Sensor Network Consumer mobile numbers answered by YouMail instead of carrier Call content + AI = Zero-hour protection AI AI This message from the Social Security Administration is regarding an enforcement action filed by the Department of Treasury on your social security number. This will be recorded second avoidance of appearance before a magistrate judge ordered jury for a criminal offense… YouMail Call Fingerprinting identifies bad calls typically within 1-5 minutes based on answering billions of annual calls AI YouMail Call Platform Zero-hour protection Protection and mitigation available for mobile clients, carrier networks and consumer brands Sensor Network & Protection capabilities powered by an extensive patent portfolio covering our unique call fingerprinting, handling and quarantining technologies. # # #
  • 17. Impact on Enterprise: IP-PBXs and UCaaS 17 • Enterprise organizations desire calls from customers, colleagues, and partners • Unwanted robocalls tie up enterprise resources and represent lost productivity for employees Desired calls… Unwanted calls…
  • 18. More Information… 18 Gerry Christensen VP BD and Strategic Partnerships p: 206-472-7060 e: gchristensen@youmail.com Try YouMail Now: iPhone,Android Ground-Truth Identification → Zero-Hour Detection + Action https://www.linkedin.com/in/gerrychristensen/
  • 19. Every call should be safe & productive. 19
  • 21. Points of Mitigation Four Points for Mitigation: 1. Originating Service Provider 2. Terminating Service Provider 3. As a Service 4. Subscriber 21
  • 22. SP Use Case: • ProSBC inserted into call route • As calls arrive, reputation is checked • Based on reputation score: • 503 – SVC Unavailable (Route advance) • 603 – Decline (Drop the call) Originating Service Provider 22 Carrier Reputation Analytics Soft Switch Originating Service Provider INVITE 503 603 Subscribers
  • 23. CPaaS and UCaaS Providers 25 SIP Carrier CPaaS or UCaaS Provider Protecting XaaS platforms • SBC in the cloud, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail Reputation Analytics UCaaS Subscribers
  • 24. Enterprise Premises 26 SIP Carrier Reputation Analytics IP-PBX Enterprise Enterprise Customers • SBC on premises, integrated with reputation analytics • As calls arrive, reputation is checked • Based on reputation score: • Calls are completed • Dropped • Redirected to Voicemail
  • 25. Mitigation as a Service 27 SIP Carrier IP-PBX Enterprise Enterprise Customers • Full service is in cloud, integrated SBC with reputation analytics • SIP Trunk from carrier is sent to service • Mitigated SIP Trunk then sent to enterprise • No on-premises equipment • Seamless integration
  • 27. Solution Brief BENEFITS: The benefits of the TelcoBridges/YouMail integration includes: • Ease of Implementation – Inserting ProSBC into the call flow eliminates the need for major upgrades to existing systems • Compliance – Quickly meet FCC robocaller mitigation requirements • Flexible Deployment Options – can be deployed in the service provider network or cloud • Scalable Business Model – allowing businesses to “ramp up” their robocaller mitigation as they grow • Highly reliable – based on carrier-class reliable software and hardware systems 29 https://freesbc.telcobridges.com/youmail/
  • 28. Know Your Customer Whitepaper 30 Get your copy from: https://freesbc.telcobridges.com/lp-youmail-wp/
  • 29. Video Library on YouTube • ProSBC Training Modules • Recorded webinars • How-to Tutorials • Customer interviews • Frequently Asked Questions • Recorded podcasts • And more… 31 youtube.com/telcobridges
  • 30. Enabling the Migration to Cloud Communications 32 www.telcobridges.com www.prosbc.com sales@telcobridges.com Youtube.com/telcobridges Q/A www.YouMail.com gchristensen@youmail.com
  • 31. View the Full-Length Video at: www2.telcobridges.com/videolibrary 33