SlideShare a Scribd company logo
1 of 30
Download to read offline
2
Agenda:
Introductions
The TDoS Problem
SIP and TDM Mediation
Analytics and Detection
Customer Case Studies
Q/A and Discussion
3
Today’s Presenters:
Alan D Percy
Product Marketing
alan.percy@telcobridges.com
Jim Dalton
CEO TransNexus
jim.dalton@transnexus.com
Alec Fenichel
Software Engineer
alec.fenichel@transnexus.com
TelcoBridges Inc.
• Manufacturer of telecom VoIP gateways and
SBC software for carriers and enterprises
• Privately held
• Founded in 2002
• Employees: ~40
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Poland, Turkey, Hong Kong
• 24/7 technical support
4
TelcoBridges HQ
• Software for the telecommunications
industry since 1997
• Solutions for
• Jurisdictional least cost routing
• Fraud prevention
• Robocall prevention
• TDoS protection
• STIR/SHAKEN
• Analytics and reporting
• Our software uses innovative methods
that we’ve invented and patented
TransNexus
6
Telephony Denial of Service (TDoS)
“The Day the 9-1-1 Network Stood Still”
• Hacker in Phoenix was looking for bugs in Apple iPhone security
• Created web application that would dial 9-1-1
• Distributed application to unwitting user’s phones via Twitter
• 1,800 compromised phones made thousands of 9-1-1 calls
• Flooding 9-1-1 desks, overwhelming PSAP
• Blocking real emergency usage
• Required power-cycle of user’s phone to stop
https://www.networkworld.com/article/3137526/the-day-the-911-network-stood-still.html
7
The Risks
“If coordinated with an actual physical terrorist
attack, this would be particularly catastrophic,
resulting in a large number of victims losing the
ability to connect with emergency services.”
- William N. Bryan, Under Secretary for Science and
Technology
8
TDoS Impact
• More than a Nuisance
• Negatively Impacting
• Businesses
• Government
• Particularly Vulnerable:
• 9-1-1 Emergency Call Centers
• Banking and Financial
• Health Care
• Contact Centers
9
TDoS Attack Profiles
Tsunami of Traffic
Overwhelming Telephone Facilities
Persistent Pest
Taxing People and Resources
10
Where do TDoS Attacks Originate?
• Usually using VoIP technology
• (faster, cheaper, easier to hide)
• Often Distributed Attacks
• Malware on desktop or mobile device
• Popular Open-source Applications
• CPaaS Platforms
• Legitimate notification services
11
TDoS Attacker Motivations
Extortion
“Send me
Bitcoin
or else…”
Pranksters
Fame and
Fortune
Distraction
“Don’t look while
I hack your
system”
Robocalls
Inadvertent
TDoS
Competitor
“I’ll get your
customers”
What is the Impact?
Doctors and
healthcare
workers must
answer calls
Businesses need bad
calls blocked so they
can get to the good
ones
Inbound call
centers waste
time answering
calls.
Consumers
complain about
robocalls
TDoS with SIP Trunking
13
ACD / PBX
SBC
SIP
Trunking TDOS
Cloud-based
Analytics
INVITE
302
503
603
SIP SIP
Frustrated
Customer
Frustrated
Customer
TDoS with TDM Trunking
14
ACD / PBX
Gateway
PSTN
Trunking
TDOS
Frustrated
Customer
Cloud-based
Analytics
INVITE
302
503
603
TDM SIP or TDM
15
SIP Interface to Analytics
SIP
Response
Code
Action
503
Service
Unavailable
Call is good, proceed to next
route (destination)
603
Decline
Call is bad, disconnect
302
Moved
Temporarily
Call is suspect, re-route to
screening application
• Highly flexible blacklisting
• Invalid calling numbers
• High risk calling numbers
• Calling numbers with poor reputation
• SIP Analytics: real time traffic analysis
TDoS Detection Methods
Let’s have a look at these methods…
• Easy to configure
• Extensive blacklisting options available
• Telephone number or prefix
• Service provider, using their SPID/OCN
• Location (e.g., state/province)
• Country
• Can be applied to all calls or specific
telephone numbers
• Can block everything and open pinholes
as needed
Highly Flexible Blacklisting
• We collect a list of high-risk and
invalid numbers from a variety of
sources
• FCC consumer complaints
• Our honeypot traps
• Customer reported numbers
• Available as a subscription service
per telephone number
Shield Database
• Provides a 0 – 100 reputation
score for each calling number
• Higher scores indicate a higher
certainty of robocall detection
• Thresholds and actions can be
customized for each telephone
number
Reputation Service
• SIP Analytics performs real time
traffic analysis before call setup
• Automatically learns the call traffic
patterns for each individual
number
• Can detect and prevent robocalls
and TDoS attacks in milliseconds
while legitimate calls continue
uninterrupted
SIP Analytics®
• Report only
• Block
• Send to voicemail
• Send to CAPTCHA
• Modify caller display name (CNAM)
If an attack is detected, you can
<SPAM>
Audio sample
22
Future Trends
1. Increasing threats for enterprises
2. TDoS protection is a new opportunity
for telephone service providers
3. SHAKEN Call Authentication
• Calling number is digitally signed
• Easy trace back for law enforcement
Case 1: Manufacturing Plant in Texas
Attack:
• Attacker leaves 200+ voicemails every night
Defense:
• Route suspect calls to CAPTCHA gateway for human
verification
Case 2: Travel Booking Service
Attack:
• Competitor’s agents calling to tie up agents on the phone
Defense:
• SIP Analytics blocks repetitive calls from the same number
Case 3: Auto Dealer in Florida
Attack:
• PRI capacity filled by robocalls
Defense:
• Reputation and Shield block bad calls to free up PRI capacity
Case 3: Enterprise Solution
26
ACD / PBX
PSTN
Trunking
TDM TDM
Customer Premises
TMG800
Gateway
ClearIP
Cloud-based
Analytics
INVITE
302
503
603
CAPTCHA
Gateway
TelcoBridges Portfolio
Confidential 27
Signaling and
Media Gateways
TMG800
Virtualized
Session Border Controller
Software
Support and
Professional
Services
TMG3200
TMG7800
28
TransNexus Portfolio
• Dynamic call analytics and policies
• Least Cost and Intelligent routing
• Toll Fraud protection
• Robocall and TDoS Controls
• SHAKEN – Secure Telephony Identification
• Feature rich for service providers
• Simple to use for enterprise customers
• Cloud based or on-premises
29
Learn More…
www.FreeSBC.com/video-library
30
Learn More:
Frequently Asked Questions at:
forums.freesbc.com
Book a FREE TDOS consultation at:
www2.telcobridges.com/TDOShelp
Q/A https://transnexus.com/
https://prosbc.com/

More Related Content

Similar to How to Protect Against TDOS Attacks

SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
Centuric
 
My Slideshare Preso 2
My Slideshare Preso 2My Slideshare Preso 2
My Slideshare Preso 2
guesta7ca4f
 

Similar to How to Protect Against TDOS Attacks (20)

Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtech
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Crexendo Business Solutions' Cloud Telecom Technology
Crexendo Business Solutions' Cloud Telecom TechnologyCrexendo Business Solutions' Cloud Telecom Technology
Crexendo Business Solutions' Cloud Telecom Technology
 
Contact Center Capabilities
Contact Center CapabilitiesContact Center Capabilities
Contact Center Capabilities
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
The New Cloud Contact Center
The New Cloud Contact CenterThe New Cloud Contact Center
The New Cloud Contact Center
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Telepacific's Hosted Telephone System
Telepacific's Hosted Telephone System Telepacific's Hosted Telephone System
Telepacific's Hosted Telephone System
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center Solution
 
SmartOffice Webinar - Technology Challenges in starting a new business!
SmartOffice Webinar - Technology Challenges in starting a new business!SmartOffice Webinar - Technology Challenges in starting a new business!
SmartOffice Webinar - Technology Challenges in starting a new business!
 
My Slideshare Preso 2
My Slideshare Preso 2My Slideshare Preso 2
My Slideshare Preso 2
 
Technology Source Cybersecurity Focus
Technology Source Cybersecurity FocusTechnology Source Cybersecurity Focus
Technology Source Cybersecurity Focus
 
Dial shree presentation
Dial shree presentationDial shree presentation
Dial shree presentation
 
Digital connect
Digital connectDigital connect
Digital connect
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations Management
 

More from TelcoBridges Inc.

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

How to Protect Against TDOS Attacks

  • 1.
  • 2. 2 Agenda: Introductions The TDoS Problem SIP and TDM Mediation Analytics and Detection Customer Case Studies Q/A and Discussion
  • 3. 3 Today’s Presenters: Alan D Percy Product Marketing alan.percy@telcobridges.com Jim Dalton CEO TransNexus jim.dalton@transnexus.com Alec Fenichel Software Engineer alec.fenichel@transnexus.com
  • 4. TelcoBridges Inc. • Manufacturer of telecom VoIP gateways and SBC software for carriers and enterprises • Privately held • Founded in 2002 • Employees: ~40 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Poland, Turkey, Hong Kong • 24/7 technical support 4 TelcoBridges HQ
  • 5. • Software for the telecommunications industry since 1997 • Solutions for • Jurisdictional least cost routing • Fraud prevention • Robocall prevention • TDoS protection • STIR/SHAKEN • Analytics and reporting • Our software uses innovative methods that we’ve invented and patented TransNexus
  • 6. 6 Telephony Denial of Service (TDoS) “The Day the 9-1-1 Network Stood Still” • Hacker in Phoenix was looking for bugs in Apple iPhone security • Created web application that would dial 9-1-1 • Distributed application to unwitting user’s phones via Twitter • 1,800 compromised phones made thousands of 9-1-1 calls • Flooding 9-1-1 desks, overwhelming PSAP • Blocking real emergency usage • Required power-cycle of user’s phone to stop https://www.networkworld.com/article/3137526/the-day-the-911-network-stood-still.html
  • 7. 7 The Risks “If coordinated with an actual physical terrorist attack, this would be particularly catastrophic, resulting in a large number of victims losing the ability to connect with emergency services.” - William N. Bryan, Under Secretary for Science and Technology
  • 8. 8 TDoS Impact • More than a Nuisance • Negatively Impacting • Businesses • Government • Particularly Vulnerable: • 9-1-1 Emergency Call Centers • Banking and Financial • Health Care • Contact Centers
  • 9. 9 TDoS Attack Profiles Tsunami of Traffic Overwhelming Telephone Facilities Persistent Pest Taxing People and Resources
  • 10. 10 Where do TDoS Attacks Originate? • Usually using VoIP technology • (faster, cheaper, easier to hide) • Often Distributed Attacks • Malware on desktop or mobile device • Popular Open-source Applications • CPaaS Platforms • Legitimate notification services
  • 11. 11 TDoS Attacker Motivations Extortion “Send me Bitcoin or else…” Pranksters Fame and Fortune Distraction “Don’t look while I hack your system” Robocalls Inadvertent TDoS Competitor “I’ll get your customers”
  • 12. What is the Impact? Doctors and healthcare workers must answer calls Businesses need bad calls blocked so they can get to the good ones Inbound call centers waste time answering calls. Consumers complain about robocalls
  • 13. TDoS with SIP Trunking 13 ACD / PBX SBC SIP Trunking TDOS Cloud-based Analytics INVITE 302 503 603 SIP SIP Frustrated Customer Frustrated Customer
  • 14. TDoS with TDM Trunking 14 ACD / PBX Gateway PSTN Trunking TDOS Frustrated Customer Cloud-based Analytics INVITE 302 503 603 TDM SIP or TDM
  • 15. 15 SIP Interface to Analytics SIP Response Code Action 503 Service Unavailable Call is good, proceed to next route (destination) 603 Decline Call is bad, disconnect 302 Moved Temporarily Call is suspect, re-route to screening application
  • 16. • Highly flexible blacklisting • Invalid calling numbers • High risk calling numbers • Calling numbers with poor reputation • SIP Analytics: real time traffic analysis TDoS Detection Methods Let’s have a look at these methods…
  • 17. • Easy to configure • Extensive blacklisting options available • Telephone number or prefix • Service provider, using their SPID/OCN • Location (e.g., state/province) • Country • Can be applied to all calls or specific telephone numbers • Can block everything and open pinholes as needed Highly Flexible Blacklisting
  • 18. • We collect a list of high-risk and invalid numbers from a variety of sources • FCC consumer complaints • Our honeypot traps • Customer reported numbers • Available as a subscription service per telephone number Shield Database
  • 19. • Provides a 0 – 100 reputation score for each calling number • Higher scores indicate a higher certainty of robocall detection • Thresholds and actions can be customized for each telephone number Reputation Service
  • 20. • SIP Analytics performs real time traffic analysis before call setup • Automatically learns the call traffic patterns for each individual number • Can detect and prevent robocalls and TDoS attacks in milliseconds while legitimate calls continue uninterrupted SIP Analytics®
  • 21. • Report only • Block • Send to voicemail • Send to CAPTCHA • Modify caller display name (CNAM) If an attack is detected, you can <SPAM> Audio sample
  • 22. 22 Future Trends 1. Increasing threats for enterprises 2. TDoS protection is a new opportunity for telephone service providers 3. SHAKEN Call Authentication • Calling number is digitally signed • Easy trace back for law enforcement
  • 23. Case 1: Manufacturing Plant in Texas Attack: • Attacker leaves 200+ voicemails every night Defense: • Route suspect calls to CAPTCHA gateway for human verification
  • 24. Case 2: Travel Booking Service Attack: • Competitor’s agents calling to tie up agents on the phone Defense: • SIP Analytics blocks repetitive calls from the same number
  • 25. Case 3: Auto Dealer in Florida Attack: • PRI capacity filled by robocalls Defense: • Reputation and Shield block bad calls to free up PRI capacity
  • 26. Case 3: Enterprise Solution 26 ACD / PBX PSTN Trunking TDM TDM Customer Premises TMG800 Gateway ClearIP Cloud-based Analytics INVITE 302 503 603 CAPTCHA Gateway
  • 27. TelcoBridges Portfolio Confidential 27 Signaling and Media Gateways TMG800 Virtualized Session Border Controller Software Support and Professional Services TMG3200 TMG7800
  • 28. 28 TransNexus Portfolio • Dynamic call analytics and policies • Least Cost and Intelligent routing • Toll Fraud protection • Robocall and TDoS Controls • SHAKEN – Secure Telephony Identification • Feature rich for service providers • Simple to use for enterprise customers • Cloud based or on-premises
  • 30. 30 Learn More: Frequently Asked Questions at: forums.freesbc.com Book a FREE TDOS consultation at: www2.telcobridges.com/TDOShelp Q/A https://transnexus.com/ https://prosbc.com/