SlideShare a Scribd company logo
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle.
2
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Are You Vulnerable to IP Telephony
Fraud and Cyber Threats?
Enterprise Communications Academy Webcast Series
Carl Blume
Product Marketing
Oracle Communications
November 17, 2016
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 4
Crime
Hactivism
Espionage
War
Richard Clarke
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 5
•
Hackers Target Pro-Clinton Phone Banks – But Hit Trump’s Too
Mass. Businessman Fights AT&T Over $1M Phone Bill
$7.6B Global Fraud Loss in 2015 Due to PBX/IP-PBX Hacking
Pakistani Citizen Admits Laundering Millions From Massive
Computer Hacking And Telecommunications Fraud Scheme
United States
Dept. of Justice
TDOS: Telecommunication Denial of ServiceFBI
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Attack Vectors
6
Telephony Fraud Telephony Denial of Service
Objective • Service theft
• Financial payments through
deception
• Block service (hactivism)
• Ransom
Methods Hacking into a user account in
a PBX, UC or voicemail system
Flooding a network element with
bogus traffic that prevents it
from responding to valid service
requests
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Revenue Sharing Fraud
Foreign
country carrier
FraudsterAttacker
Subscribers
PBX systems
Revenue
based on call
volume
Make calls
Injects calls
Scans
networks
Sells account information
Entice to make calls
Subscribers pay bill to phone operator Operator pays fraudster
Money flow:
Revenue-
share number
Fraudster operates revenue-share number(s)
 Minimal technical overhead
 International number for higher revenue
 Foreign country improves security
Revenue based on call volume
 Make calls on third party’s behalf
- Hack PBX and route calls through it
 Motivate third parties to make calls
- Missed calls, lottery/banking scams, etc.
Revenue paid daily/weekly
 Subscriber billing cycle: monthly
 Fraudster is long gone before investigations start
7
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Three Phases of Malicious TDoS and Fraud
• Reconnaissance – determination of potential targets
• Enumeration – target evaluation (TDoS may start here)
• Attack – targeted system compromise for theft, fraud or DoS
EnumerationReconnaissance
Information Gathering
Port Scanning, OS
Fingerprinting, Service Detection
Active Attack (Cleanup)
Phase 1 Phase 2 Phase 3
Attack
Maintain
Access
Attack
Cover
Tracks
Gain
Access
Deployment Attack
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
PBX/UC Hacking
• Attacker scans networks for VoIP
equipment
• Brute force password guessing
– Lack of password policies
– Easily guessable passwords
• Misconfiguration
– Inbound calls allowed without
authentication
Voicemail Hacking
• Attacker hacks into user mailbox
and abuses call-through feature to
originate revenue sharing or service
theft calls
• Attacker hacks into user mailbox
and uses Call-back feature to place
revenue sharing calls
– Leaves voicemail with spoofed revenue
sharing number
9
Hacking for Fraud
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Private Network
TDoS Can Take Many Forms
• ScriptsAutomated
• Bots
Coordinated
and distributed
• American Idol
phenomenon
Non-malicious
• A restart after power
failure can appear as DoS
Internal or
external origin
10
Signaling Flood
Compliant Signaling
Campus Branch
Enterprise Data Center
Internet
A A
A A
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle Solution Stops Fraud and TDoS
11
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 12
Oracle Fraud and Compliance Solution
IP Voice,
Toll Free
Hosted
Services
SIP Trunks
ENTERPRISE
Enterprise Session Border Controller (E-SBC)
• Perimeter security and DoS/DDoS protection
• Black/whitelisting and session redirect
Enterprise Operations Monitor (EOM)
• Real time monitoring and anomaly alerting
Enterprise Communications Broker (ECB)
• Core session management
• Enforces user policies and applies CAC limits
Interactive Session Recorder (ISR)
• Records sessions for security, compliance or other
requirements
Converged Application Server (OCCAS)
• Enterprise policy and application integration
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 13
Oracle Fraud and Compliance Solution
IP Voice,
Toll Free
Hosted
Services
SIP Trunks
ENTERPRISE
Enterprise Session Border Controller (E-SBC)
• Perimeter security and DoS protection
• Black/whitelisting and session redirect
Enterprise Operations Monitor (EOM)
• Real time monitoring and anomaly alerting
Enterprise Communications Broker (ECB)
• Core session management
• Enforces user policies and applies CAC limits
TDoS and Fraud
Prevention
Edge
Protection
Core
Protection
Monitoring &
investigation
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Layered Protection Against Active TDoS Attacks
E-SBC (Edge)
• Dynamic call admission
control ensures service
even during overloads
• Detects, rejects non-
compliant SIP messages
• Statefully controls
legitimate registrations
• Priority for emergency
service calls
ECB (Core)
• Dynamic call admission
control protects against
internal overloads and
attacks
• CAC thresholds per
element tailors
protection for each
session agent
EOM (Monitor)
• Detects anomalous
behavior in real time
and issues alerts
• Configurable thresholds
per element and traffic
type
14
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Layered Protection Against Active Fraud Attacks
E-SBC (Edge)
• Blacklisting blocks
known fraudulent
destination ranges
• Whitelisting enables
exceptions
• Rate limiting minimizes
fraud losses
• Session redirect
provides routing for
blocked calls
ECB (Core)
• Fine grain user policies
complement E-SBC
black/white listing
• Control calls by From/To
address and time of day
• User authentication via
Active Directory
interface
• Enforce call recording
requirements
EOM (Monitor)
• Detects anomalous
behavior in real time
and issues alerts
• Configurable thresholds
per element and traffic
type
• Drill-down analysis,
troubleshooting and
investigation
15
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Protect Against Reconnaissance and Enumeration
• Deploy an E-SBC to hide network
topology
– Segment traffic at border router so Web
DoS won’t impact SIP services
• Deploy Acme Packet SIPshield
– Drops messages containing the
identifying characteristics of known
malicious tools (e.g. SIPVicious)
• Disable FTP, Telnet and ICMP on
external E-SBC links
16
Data
Applications
Real Time
Communications
Service Provider
Network
ENTERPRISE
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Other Steps to Prevent Fraud and Mitigate TDoS
 Know your network baselines
 Use EOM to detect traffic pattern changes
 Traffic spikes to or from specific destinations
 Identify service provider security contact (who to call when under attack)
 Use strong passwords in SIP endpoints and UC clients
 Deploy software patches for all communications systems
 Regularly review call detail records for patterns of service theft
17
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Use EOM to Monitor Traffic in Real Time
Secure the Network Perimeter with an E-SBC
Be vigilant and prepared!
18
Protect Your Communications Network from Threats
Control the Network Core with ECB
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 19
Communications Security: A Blueprint for
Enterprise Session Border Controller
Deployments (whitepaper)
Oracle Communications Fraud and
Compliance Solution (solution brief)
UC Security: What You Don’t Know Can
Hurt You, by Nemertes Research
Resources
Enterprise Communications
Academy Webcast Series
How Open Architectures and APIs are
Modernizing Call Recording
Wednesday, November 30, 2016
11:00 am PST / 2:00 pm EST
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 20
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?

More Related Content

What's hot

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysFatih Ozavci
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesFatih Ozavci
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryInvincea, Inc.
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Ajeet Singh
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devicesphanleson
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsMichelle Morgan-Nelsen
 

What's hot (20)

Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Hacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP GatewaysHacking Trust Relationships Between SIP Gateways
Hacking Trust Relationships Between SIP Gateways
 
VoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco PhonesVoIP Wars: Attack of the Cisco Phones
VoIP Wars: Attack of the Cisco Phones
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture Palo Alto Virtual firewall deployment Architecture
Palo Alto Virtual firewall deployment Architecture
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
The Future Mobile Security
The Future Mobile Security The Future Mobile Security
The Future Mobile Security
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Ch13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security DevicesCh13 Protecting Networks with Security Devices
Ch13 Protecting Networks with Security Devices
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 

Viewers also liked

'Digital Radio In The UK: Progress & Challenges' by Grant Goddard
'Digital Radio In The UK: Progress & Challenges' by Grant Goddard'Digital Radio In The UK: Progress & Challenges' by Grant Goddard
'Digital Radio In The UK: Progress & Challenges' by Grant GoddardGrant Goddard
 
AudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateAudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateJohn D'Annunzio
 
Bab 2 pengurusan jenazah dan hikmahnya
Bab 2 pengurusan jenazah dan hikmahnyaBab 2 pengurusan jenazah dan hikmahnya
Bab 2 pengurusan jenazah dan hikmahnyawahyudinia112
 
Bacterialviralmycoticinfections 100101095926-phpapp01
Bacterialviralmycoticinfections 100101095926-phpapp01Bacterialviralmycoticinfections 100101095926-phpapp01
Bacterialviralmycoticinfections 100101095926-phpapp01sai lalitha
 
Trabajo de planificacion los GAD de Chillanes
Trabajo de planificacion los GAD de ChillanesTrabajo de planificacion los GAD de Chillanes
Trabajo de planificacion los GAD de ChillanesLida Llumitaxi
 
Grupo alberto,johana,paulo,victor,roger esan propuesta 02
Grupo alberto,johana,paulo,victor,roger esan propuesta 02Grupo alberto,johana,paulo,victor,roger esan propuesta 02
Grupo alberto,johana,paulo,victor,roger esan propuesta 02Johana Sanchez
 
May16 - Sellstate - RIS Real Estate Magzine
May16 - Sellstate - RIS Real Estate MagzineMay16 - Sellstate - RIS Real Estate Magzine
May16 - Sellstate - RIS Real Estate MagzineSuzanne Walters
 
Nrc 3301 corredor d. deber consulta calculo vectorial
Nrc 3301 corredor d. deber consulta calculo vectorialNrc 3301 corredor d. deber consulta calculo vectorial
Nrc 3301 corredor d. deber consulta calculo vectorialDan Kurosaki
 
Bruk av office 365 i undervisning
Bruk av office 365 i undervisningBruk av office 365 i undervisning
Bruk av office 365 i undervisningMagnus Nohr
 
Gastronomía de quintana roo
Gastronomía de quintana rooGastronomía de quintana roo
Gastronomía de quintana rooGabriel Cab
 

Viewers also liked (16)

'Digital Radio In The UK: Progress & Challenges' by Grant Goddard
'Digital Radio In The UK: Progress & Challenges' by Grant Goddard'Digital Radio In The UK: Progress & Challenges' by Grant Goddard
'Digital Radio In The UK: Progress & Challenges' by Grant Goddard
 
AudioCodes Session Border Controller Update
AudioCodes Session Border Controller UpdateAudioCodes Session Border Controller Update
AudioCodes Session Border Controller Update
 
Bab 2 pengurusan jenazah dan hikmahnya
Bab 2 pengurusan jenazah dan hikmahnyaBab 2 pengurusan jenazah dan hikmahnya
Bab 2 pengurusan jenazah dan hikmahnya
 
Bacterialviralmycoticinfections 100101095926-phpapp01
Bacterialviralmycoticinfections 100101095926-phpapp01Bacterialviralmycoticinfections 100101095926-phpapp01
Bacterialviralmycoticinfections 100101095926-phpapp01
 
Fichero actividades fomento
Fichero actividades fomentoFichero actividades fomento
Fichero actividades fomento
 
Problema Igiene al Cimitero
Problema Igiene al CimiteroProblema Igiene al Cimitero
Problema Igiene al Cimitero
 
Act. integradora
Act. integradoraAct. integradora
Act. integradora
 
Trabajo de planificacion los GAD de Chillanes
Trabajo de planificacion los GAD de ChillanesTrabajo de planificacion los GAD de Chillanes
Trabajo de planificacion los GAD de Chillanes
 
Grupo alberto,johana,paulo,victor,roger esan propuesta 02
Grupo alberto,johana,paulo,victor,roger esan propuesta 02Grupo alberto,johana,paulo,victor,roger esan propuesta 02
Grupo alberto,johana,paulo,victor,roger esan propuesta 02
 
Letter A
Letter ALetter A
Letter A
 
13 a jerrodthomas
13 a jerrodthomas13 a jerrodthomas
13 a jerrodthomas
 
May16 - Sellstate - RIS Real Estate Magzine
May16 - Sellstate - RIS Real Estate MagzineMay16 - Sellstate - RIS Real Estate Magzine
May16 - Sellstate - RIS Real Estate Magzine
 
Unidad 4
Unidad 4Unidad 4
Unidad 4
 
Nrc 3301 corredor d. deber consulta calculo vectorial
Nrc 3301 corredor d. deber consulta calculo vectorialNrc 3301 corredor d. deber consulta calculo vectorial
Nrc 3301 corredor d. deber consulta calculo vectorial
 
Bruk av office 365 i undervisning
Bruk av office 365 i undervisningBruk av office 365 i undervisning
Bruk av office 365 i undervisning
 
Gastronomía de quintana roo
Gastronomía de quintana rooGastronomía de quintana roo
Gastronomía de quintana roo
 

Similar to Are You Vulnerable to IP Telephony Fraud and Cyber Threats?

VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarAdelaide Hill
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)Pasquale Tursi
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content PreviewzOSCommserver
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBX
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBXDEFCON 23 - Patrick mcneil - guidelines for securing your voip PBX
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBXFelipe Prado
 
Avira - NOAH17 Berlin
Avira - NOAH17 BerlinAvira - NOAH17 Berlin
Avira - NOAH17 BerlinNOAH Advisors
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
How an Open Architecture and APIs are Modernizing Call Recording
How an Open Architecture and APIs are Modernizing Call RecordingHow an Open Architecture and APIs are Modernizing Call Recording
How an Open Architecture and APIs are Modernizing Call RecordingCarl Blume
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 

Similar to Are You Vulnerable to IP Telephony Fraud and Cyber Threats? (20)

VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)XO _Hosted Security Product Overview__v.21 (1)
XO _Hosted Security Product Overview__v.21 (1)
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBX
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBXDEFCON 23 - Patrick mcneil - guidelines for securing your voip PBX
DEFCON 23 - Patrick mcneil - guidelines for securing your voip PBX
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
Avira - NOAH17 Berlin
Avira - NOAH17 BerlinAvira - NOAH17 Berlin
Avira - NOAH17 Berlin
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
How an Open Architecture and APIs are Modernizing Call Recording
How an Open Architecture and APIs are Modernizing Call RecordingHow an Open Architecture and APIs are Modernizing Call Recording
How an Open Architecture and APIs are Modernizing Call Recording
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 

Are You Vulnerable to IP Telephony Fraud and Cyber Threats?

  • 1.
  • 2. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2
  • 3. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Are You Vulnerable to IP Telephony Fraud and Cyber Threats? Enterprise Communications Academy Webcast Series Carl Blume Product Marketing Oracle Communications November 17, 2016
  • 4. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 4 Crime Hactivism Espionage War Richard Clarke
  • 5. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 5 • Hackers Target Pro-Clinton Phone Banks – But Hit Trump’s Too Mass. Businessman Fights AT&T Over $1M Phone Bill $7.6B Global Fraud Loss in 2015 Due to PBX/IP-PBX Hacking Pakistani Citizen Admits Laundering Millions From Massive Computer Hacking And Telecommunications Fraud Scheme United States Dept. of Justice TDOS: Telecommunication Denial of ServiceFBI
  • 6. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Attack Vectors 6 Telephony Fraud Telephony Denial of Service Objective • Service theft • Financial payments through deception • Block service (hactivism) • Ransom Methods Hacking into a user account in a PBX, UC or voicemail system Flooding a network element with bogus traffic that prevents it from responding to valid service requests
  • 7. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Revenue Sharing Fraud Foreign country carrier FraudsterAttacker Subscribers PBX systems Revenue based on call volume Make calls Injects calls Scans networks Sells account information Entice to make calls Subscribers pay bill to phone operator Operator pays fraudster Money flow: Revenue- share number Fraudster operates revenue-share number(s)  Minimal technical overhead  International number for higher revenue  Foreign country improves security Revenue based on call volume  Make calls on third party’s behalf - Hack PBX and route calls through it  Motivate third parties to make calls - Missed calls, lottery/banking scams, etc. Revenue paid daily/weekly  Subscriber billing cycle: monthly  Fraudster is long gone before investigations start 7
  • 8. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Three Phases of Malicious TDoS and Fraud • Reconnaissance – determination of potential targets • Enumeration – target evaluation (TDoS may start here) • Attack – targeted system compromise for theft, fraud or DoS EnumerationReconnaissance Information Gathering Port Scanning, OS Fingerprinting, Service Detection Active Attack (Cleanup) Phase 1 Phase 2 Phase 3 Attack Maintain Access Attack Cover Tracks Gain Access Deployment Attack
  • 9. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | PBX/UC Hacking • Attacker scans networks for VoIP equipment • Brute force password guessing – Lack of password policies – Easily guessable passwords • Misconfiguration – Inbound calls allowed without authentication Voicemail Hacking • Attacker hacks into user mailbox and abuses call-through feature to originate revenue sharing or service theft calls • Attacker hacks into user mailbox and uses Call-back feature to place revenue sharing calls – Leaves voicemail with spoofed revenue sharing number 9 Hacking for Fraud
  • 10. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Private Network TDoS Can Take Many Forms • ScriptsAutomated • Bots Coordinated and distributed • American Idol phenomenon Non-malicious • A restart after power failure can appear as DoS Internal or external origin 10 Signaling Flood Compliant Signaling Campus Branch Enterprise Data Center Internet A A A A
  • 11. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Solution Stops Fraud and TDoS 11
  • 12. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 12 Oracle Fraud and Compliance Solution IP Voice, Toll Free Hosted Services SIP Trunks ENTERPRISE Enterprise Session Border Controller (E-SBC) • Perimeter security and DoS/DDoS protection • Black/whitelisting and session redirect Enterprise Operations Monitor (EOM) • Real time monitoring and anomaly alerting Enterprise Communications Broker (ECB) • Core session management • Enforces user policies and applies CAC limits Interactive Session Recorder (ISR) • Records sessions for security, compliance or other requirements Converged Application Server (OCCAS) • Enterprise policy and application integration
  • 13. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 13 Oracle Fraud and Compliance Solution IP Voice, Toll Free Hosted Services SIP Trunks ENTERPRISE Enterprise Session Border Controller (E-SBC) • Perimeter security and DoS protection • Black/whitelisting and session redirect Enterprise Operations Monitor (EOM) • Real time monitoring and anomaly alerting Enterprise Communications Broker (ECB) • Core session management • Enforces user policies and applies CAC limits TDoS and Fraud Prevention Edge Protection Core Protection Monitoring & investigation
  • 14. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Layered Protection Against Active TDoS Attacks E-SBC (Edge) • Dynamic call admission control ensures service even during overloads • Detects, rejects non- compliant SIP messages • Statefully controls legitimate registrations • Priority for emergency service calls ECB (Core) • Dynamic call admission control protects against internal overloads and attacks • CAC thresholds per element tailors protection for each session agent EOM (Monitor) • Detects anomalous behavior in real time and issues alerts • Configurable thresholds per element and traffic type 14
  • 15. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Layered Protection Against Active Fraud Attacks E-SBC (Edge) • Blacklisting blocks known fraudulent destination ranges • Whitelisting enables exceptions • Rate limiting minimizes fraud losses • Session redirect provides routing for blocked calls ECB (Core) • Fine grain user policies complement E-SBC black/white listing • Control calls by From/To address and time of day • User authentication via Active Directory interface • Enforce call recording requirements EOM (Monitor) • Detects anomalous behavior in real time and issues alerts • Configurable thresholds per element and traffic type • Drill-down analysis, troubleshooting and investigation 15
  • 16. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Protect Against Reconnaissance and Enumeration • Deploy an E-SBC to hide network topology – Segment traffic at border router so Web DoS won’t impact SIP services • Deploy Acme Packet SIPshield – Drops messages containing the identifying characteristics of known malicious tools (e.g. SIPVicious) • Disable FTP, Telnet and ICMP on external E-SBC links 16 Data Applications Real Time Communications Service Provider Network ENTERPRISE
  • 17. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Other Steps to Prevent Fraud and Mitigate TDoS  Know your network baselines  Use EOM to detect traffic pattern changes  Traffic spikes to or from specific destinations  Identify service provider security contact (who to call when under attack)  Use strong passwords in SIP endpoints and UC clients  Deploy software patches for all communications systems  Regularly review call detail records for patterns of service theft 17
  • 18. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Use EOM to Monitor Traffic in Real Time Secure the Network Perimeter with an E-SBC Be vigilant and prepared! 18 Protect Your Communications Network from Threats Control the Network Core with ECB
  • 19. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 19 Communications Security: A Blueprint for Enterprise Session Border Controller Deployments (whitepaper) Oracle Communications Fraud and Compliance Solution (solution brief) UC Security: What You Don’t Know Can Hurt You, by Nemertes Research Resources Enterprise Communications Academy Webcast Series How Open Architectures and APIs are Modernizing Call Recording Wednesday, November 30, 2016 11:00 am PST / 2:00 pm EST
  • 20. Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 20