IP communications systems are becoming an ever-more critical part of business and consumer communications. As a result, they are increasingly becoming the target for fraudsters, trolls and hackers, requiring a comprehensive security solution. These are the reasons behind the birth of the Session Border Controller. But there is much more to SBCs than security.
In this presentation, we get "back to basics" and show the threats and underlying role that an SBC plays in modern IP communications solutions. During this session, you'll learn about B2BUA, NAT, DOS/DDOS attacks, registration floods, topology hiding and more...
Since the dawn of the telephone operator switchboard, call routing has challenged network designers and managers with complex routing algorithms. While the technology has changed, the need remains the same.
Routing SIP traffic is one of the key functions of a Session Border Controller, directing traffic and working around network outages.
Continuing on the "How To" series of installation and provisioning sessions, this 30-minute educational webinar offers an opportunity to learn the fundamental and advanced SIP routing functions found in FreeSBC.
Topics covered in this session:
SIP Routing Architectures and Challenges
Basic SIP Routing Configuration
Dealing with Outages
Advanced SIP Routing Tables
Real-world Use Cases
Your Questions
Who would find most valuable:
Network architects at service providers and enterprises, networking consultants, analysts and decision-makers involved in acquiring network technology
Over the past 10 years the Session Initiation Protocol (SIP) has moved from the toy of researchers and academics to the de-facto standard for telephony and multimedia services in mobile and fixed networks.
Probably one of the most emotionally fraught discussions in the context of SIP was whether Session Border Controllers (SBC) are good or evil.
SIP was designed with the vision of revolutionizing the way communication services are developed, deployed and operated. Following the end-to-end spirit of the Internet SIP was supposed to turn down the walled gardens of PSTN networks and free communication services from the grip of large telecom operators. By moving the intelligence to the end systems, developers were supposed to be able to develop new communication services that will innovate the way we communicate with each other.
This was to be achieved without having to wait for the approval of the various telecommunication standardization groups such as ETSI or the support of incumbent telecoms.
Session border controllers are usually implemented as SIP Back-to-Back User Agents (B2BUA) that are placed between a SIP user agent and a SIP proxy. The SBC then acts as the contact point for both the user agents and the proxy. Thereby the SBC actually breaks the end-to-end behavior of SIP, which has led various people to deem the SBC as an evil incarnation of the old telecom way of thinking. Regardless of this opposition, SBCs have become a central part of any SIP deployment.
In this paper we will first give a brief overview of how SIP works and continue with a description of what SBCs do and the different use cases for deploying SBCs.
If you don't know what SIP is, what it is used for or why you should even care then this is the section for you. This presentation will go over the very basics of SIP and assumes no previous knowledge of SIP or really any other network experience either. Topics it will touch upon is:
- What SIP is all about
- SIP and sessions management
- Basic call flow
- Brief discussion of SIP messages
- SIP and audio
Over the last 12 months we’ve shared a lot of information about session border controllers, applications for SBCs, customer use cases, along with details on FreeSBC installation and configuration. During that time, also been asked dozens of questions and done our best to answer every single one of them live during the event or in writing on the TelcoBridges forum. With this milestone, we thought it was time to look back at the most popular and frequent questions. So join us as we review our “Top 10” FAQ.
A recording of the webinar can be found at: https://www2.telcobridges.com/FreeSBCVideoLibrary
Learn more at: www.freesbc.com
Since the dawn of the telephone operator switchboard, call routing has challenged network designers and managers with complex routing algorithms. While the technology has changed, the need remains the same.
Routing SIP traffic is one of the key functions of a Session Border Controller, directing traffic and working around network outages.
Continuing on the "How To" series of installation and provisioning sessions, this 30-minute educational webinar offers an opportunity to learn the fundamental and advanced SIP routing functions found in FreeSBC.
Topics covered in this session:
SIP Routing Architectures and Challenges
Basic SIP Routing Configuration
Dealing with Outages
Advanced SIP Routing Tables
Real-world Use Cases
Your Questions
Who would find most valuable:
Network architects at service providers and enterprises, networking consultants, analysts and decision-makers involved in acquiring network technology
Over the past 10 years the Session Initiation Protocol (SIP) has moved from the toy of researchers and academics to the de-facto standard for telephony and multimedia services in mobile and fixed networks.
Probably one of the most emotionally fraught discussions in the context of SIP was whether Session Border Controllers (SBC) are good or evil.
SIP was designed with the vision of revolutionizing the way communication services are developed, deployed and operated. Following the end-to-end spirit of the Internet SIP was supposed to turn down the walled gardens of PSTN networks and free communication services from the grip of large telecom operators. By moving the intelligence to the end systems, developers were supposed to be able to develop new communication services that will innovate the way we communicate with each other.
This was to be achieved without having to wait for the approval of the various telecommunication standardization groups such as ETSI or the support of incumbent telecoms.
Session border controllers are usually implemented as SIP Back-to-Back User Agents (B2BUA) that are placed between a SIP user agent and a SIP proxy. The SBC then acts as the contact point for both the user agents and the proxy. Thereby the SBC actually breaks the end-to-end behavior of SIP, which has led various people to deem the SBC as an evil incarnation of the old telecom way of thinking. Regardless of this opposition, SBCs have become a central part of any SIP deployment.
In this paper we will first give a brief overview of how SIP works and continue with a description of what SBCs do and the different use cases for deploying SBCs.
If you don't know what SIP is, what it is used for or why you should even care then this is the section for you. This presentation will go over the very basics of SIP and assumes no previous knowledge of SIP or really any other network experience either. Topics it will touch upon is:
- What SIP is all about
- SIP and sessions management
- Basic call flow
- Brief discussion of SIP messages
- SIP and audio
Over the last 12 months we’ve shared a lot of information about session border controllers, applications for SBCs, customer use cases, along with details on FreeSBC installation and configuration. During that time, also been asked dozens of questions and done our best to answer every single one of them live during the event or in writing on the TelcoBridges forum. With this milestone, we thought it was time to look back at the most popular and frequent questions. So join us as we review our “Top 10” FAQ.
A recording of the webinar can be found at: https://www2.telcobridges.com/FreeSBCVideoLibrary
Learn more at: www.freesbc.com
Firewalls, SIP Servers and SBC - What's the Differences?Alan Percy
There are a lot of building blocks that make up a reliable and secure voice network. Firewalls, SIP Servers and Session Border Controllers each play an important, but different, role in facilitating a secure and reliable network. Join us as we take a closer look at each in a modern voice network, answering the questions:
-What are they?
-Why do I need them?
-What do they do?
-What do they not do?
-Your questions
Each of the series will be recorded and library of recordings made available to registrants.
Who should view:
Network architects at service providers and enterprises, networking consultants, analysts and decision-makers involved in acquiring network technology
Download your FreeSBC software: www.freesbc.com
Frequently Asked Questions at: forums.freesbc.com
Other educational webinars at: freesbc.com/video-library
Third revision of IMS signaling course. The lecture was part of the communication protocols class 2014 delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
Brief introduction into SIP protocol, how it works, common problems to solve. Tech. details about handshake, SIP Trunks and SIP trunking. Market research.
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
Internet protocol (VoIP) is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP network.The conventional technique used for sending voice is PSTN (public switched telephone network) . As data traffic has higher speed than telephone traffic, so what we do most of the time we prefer to send voice over data networks. Voice over internet protocol (VoIP) is a method of telephone communication over a data network.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
Over the last 12 months we’ve shared a lot of information about session border controllers, applications for SBCs, customer use cases, along with details on FreeSBC installation and configuration. During that time, also been asked dozens of questions and done our best to answer every single one of them live during the event or in writing on the TelcoBridges forum. With this milestone, we thought it was time to look back at the most popular and frequent questions. So join us as we review our “Top 10” FAQ.
A recording of the webinar can be found at: https://www2.telcobridges.com/FreeSBCVideoLibrary
Learn more at: www.freesbc.com
Firewalls, SIP Servers and SBC - What's the Differences?Alan Percy
There are a lot of building blocks that make up a reliable and secure voice network. Firewalls, SIP Servers and Session Border Controllers each play an important, but different, role in facilitating a secure and reliable network. Join us as we take a closer look at each in a modern voice network, answering the questions:
-What are they?
-Why do I need them?
-What do they do?
-What do they not do?
-Your questions
Each of the series will be recorded and library of recordings made available to registrants.
Who should view:
Network architects at service providers and enterprises, networking consultants, analysts and decision-makers involved in acquiring network technology
Download your FreeSBC software: www.freesbc.com
Frequently Asked Questions at: forums.freesbc.com
Other educational webinars at: freesbc.com/video-library
Third revision of IMS signaling course. The lecture was part of the communication protocols class 2014 delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
Brief introduction into SIP protocol, how it works, common problems to solve. Tech. details about handshake, SIP Trunks and SIP trunking. Market research.
The presentation is a compiled assembly from the SIP RFC' s, and original works of Alan Johnston and Henry Sinnreich . It contains Sip Detailed , Call flows , Architecture descriptions , SIP services , sip security , sip programming.
Internet protocol (VoIP) is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP network.The conventional technique used for sending voice is PSTN (public switched telephone network) . As data traffic has higher speed than telephone traffic, so what we do most of the time we prefer to send voice over data networks. Voice over internet protocol (VoIP) is a method of telephone communication over a data network.
VoLTE Basic callflows in IMS network v2 - includes Registration, Basic VoLTE Call, SDP, Interconnect, Roaming, highlights important SIP headers for session routing and user identities.
ims registration call flow procedure volte sipVikas Shokeen
This PDF , VoLTE IMS Registration tutorial covers IMS Registration sip procedure in depth & Provides extract of 3GPP / GSMA Specs , I am covering below call flow in Depth :-
- LTE Attach & Default Internet EPS bearer
- Role of QCI-1 ( Voice ) , QCI-5 (SIP Signaling) , QCI-6 to 9 (Internet)
- Default Vs Dedicated Bearer in LTE
- Default IMS EPS bearer in LTE
- SIP and IMS Registration
- TAS Registration
Over the last 12 months we’ve shared a lot of information about session border controllers, applications for SBCs, customer use cases, along with details on FreeSBC installation and configuration. During that time, also been asked dozens of questions and done our best to answer every single one of them live during the event or in writing on the TelcoBridges forum. With this milestone, we thought it was time to look back at the most popular and frequent questions. So join us as we review our “Top 10” FAQ.
A recording of the webinar can be found at: https://www2.telcobridges.com/FreeSBCVideoLibrary
Learn more at: www.freesbc.com
Firewalls, SIP Servers and SBC - What's the Differences?TelcoBridges Inc.
There are a lot of building blocks that make up a reliable and secure voice network. Firewalls, SIP Servers and Session Border Controllers each play an important, but different, role in facilitating a secure and reliable network. Join us as we take a closer look at each in a modern voice network, answering the questions:
-What are they?
-Why do I need them?
-What do they do?
-What do they not do?
-Your questions
Each of the series will be recorded and library of recordings made available to registrants.
Who should view:
Network architects at service providers and enterprises, networking consultants, analysts and decision-makers involved in acquiring network technology
Download your FreeSBC software: www.freesbc.com
Frequently Asked Questions at: forums.freesbc.com
Other educational webinars at: freesbc.com/video-library
A webinar introduction to FreeSBC, explaining the unique business model, product features, use cases and a customer case study. A great overview to help prospective users get oriented.
A webinar introduction to FreeSBC, explaining the unique business model, product features, use cases and a customer case study. A great overview to help prospective users get oriented.
Avaya Aura® Session Border Controller, powered by Acme Packet, secures the IP border for the real time interactive communications that flow outside your internal network. With Avaya Aura® Session Border Controller, your Unified Communications and Contact Center Solutions can securely leverage SIP, while simultaneously extending the power of the Avaya Aura® architecture throughout your enterprise to realize the true benefits of open standards.
Slides from the June 4th, 2019 webinar, introducing ProSBC.
In October 2017, TelcoBridges took the bold step to offer FreeSBC, a software-based session border controller product, to the market. Since then, over 10 million sessions of FreeSBC software have been downloaded by thousands of users around the globe. Many of those sessions are now in production or various stages of evaluation. During that time, we at TelcoBridges have been listening carefully to customer feedback and working diligently on a product development roadmap to implement those suggestions. The result is ProSBC, an enhanced session border controller offering that fits many more use cases in both service provider and enterprise applications. Today - We’re pleased to share with you an overview of ProSBC, explain its features, capabilities, target markets and use cases.
Slides from the June 4th, 2019 webinar, introducing ProSBC.
In October 2017, TelcoBridges took the bold step to offer FreeSBC, a software-based session border controller product, to the market. Since then, over 10 million sessions of FreeSBC software have been downloaded by thousands of users around the globe. Many of those sessions are now in production or various stages of evaluation. During that time, we at TelcoBridges have been listening carefully to customer feedback and working diligently on a product development roadmap to implement those suggestions. The result is ProSBC, an enhanced session border controller offering that fits many more use cases in both service provider and enterprise applications. Today - We’re pleased to share with you an overview of ProSBC, explain its features, capabilities, target markets and use cases.
While an increasing number of operators have already replaced their SS7 based telecommunication core network with a SIP based solution, the interconnection to neighboring partners is still often realized over an SS7 peering point. This means that a call that is carried over a VoIP network is translated to an SS7 call and then possibly back to VoIP again. The translation requires specialized components and resources, which increases the network operation costs and introduces unnecessary processing delay. To avoid these costs and delays operators have started introducing SIP based interconnection and peering points.
The ABC SBC enables operators to establish secure borders to their neighbors by offering topology hiding, denial of service protection and mediation in a scalable manner
One of the most widely observed fraud scenarios is the case of a malicious user detecting the address of a PSTN gateway and accessing that gateway directly. Once the attacker has managed to access the gateway the attacker can start selling telephony minutes through that
gateway.
The ABC SBC establishes a secure border between the VoIP service provider’s core VoIP components–e.g., PSTN gateway, SIP proxy and application servers- and the subscribers. As the border element, the ABC SBC hides the details of the operator’s network from subscribers
and absorbs any attacks and sudden spikes in the subscriber traffic. Further, the mediation features of the ABC SBC shield the operator’s network from malfunctioning user agents and any interoperability issues.
Poor voice quality is one of the leading complaints for VoIP systems. Dropouts, echoes, static, and latency can ruin a conversation. Knowing how to measure voice quality and isolate the cause is an important part of delivering a quality experience to users and customers.
In this presentation, we share some background on voice quality in VoIP systems, examine the various causes of poor voice quality, and consider the role that SBCs can play in monitoring and isolating voice quality issues.
Questions covered in this session:
> Why is voice quality important to the customer experience?
> How is voice quality measured?
> What causes poor voice quality?
> How is voice quality measured on-the-fly?
> What is the role of SBCs in measuring voice quality?
> How do you isolate voice quality issues?
> Your questions
Who should attend:
Network architects at service providers and enterprises, networking consultants, analysts and decision-makers involved in acquiring network technology
Similar to What is an SBC? A look at the role of the Session Border Controller (20)
Network Transformation Best Practices-Working.pptxAlan Percy
Despite the wishes of the equipment makers and regulators, there still is a lot of TDM circuits and equipment in the global telecommunications network. How do we know? We talk to service providers every day that are working in mixed TDM and IP networks. What we have found is that Service providers are often challenged with navigating the complications of migrating their network to IP infrastructure, dealing with new regulatory mandates, replacing obsolete technologies, and finding the expertise to make the transition.
To help our customers make the transition, TelcoBridges has invited ZT Technology Solutions to join us as our newest Alliance Partner, bringing a host of experience in planning service provider migrations from TDM to IP.
During this event, we discuss our Network Transformation strategy, get to meet the team from ZT Technology Solutions and hear their FIVE best network transformation practices. Best of all, we have saved some time to answer your questions.
A recording is available at: https://youtu.be/WQjpTPNS4qM
The news regularly reports incidents of various fraud schemes that are perpetuated via the telecommunications network. A few months ago, a series of DDOS attacks impacted a major SIP service provider, overwhelming their network and blocking legitimate traffic. Meanwhile, illegal robocalls continue to take advantage of the elderly. Depending on the scheme, the fraud can harm both the service providers and the subscribers. In this "TelcoBridges Tech Talk", we’ll be reviewing the top 7 tactics to protect both service provider networks and their subscribers from fraud.
Video of presentation at: https://youtu.be/O5Hdw-c9rwg
With the recent announcement of collaboration between TelcoBridges and Metaswitch to certify Tmedia gateways for use with Metaswitch CFS, we imagine there are many questions. In this FAQ session we dig into some of the expected and unexpected questions on the announcement and plans going forward. Joining us is Austin Spreadbury, Senior Program Manager at Microsoft. Prior to the acquisition by Microsoft, Austin held a number of product management roles at Metaswitch.
Recording at: https://youtu.be/RRvAAjNXdEg
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Alan Percy
Illegal robocalls continue to be a significant problem for consumers and businesses of all sizes. STIR/SHAKEN is expected to reduce illegal spam calls, but those behind the illegal calls will persist, wasting time, clogging up phone lines, and in some cases, perpetrating phishing attacks. Join us as we discuss the current state of STIR/SHAKEN and explain why further Robocall Mitigation is required.
Stay with us as Gerry Christensen, VP of Business Development and Strategic Partnerships at YouMail joins us to share an AI-powered robocall analytics platform that can be used by service providers and enterprises to block much of the unwanted traffic.
Video recording of the session is available at:
https://www2.telcobridges.com/videolibrary
Contact Center as a Service - Challenges and Successes Alan Percy
Contact Centers as a Service opens a range of new opportunities for service providers, offering high-margin customer care applications and improved customer experience features to small and medium businesses. Service providers building or deploying a scalable and reliable CCaaS platform will surely face challenges. We know, because we've seen the hurdles and are going to share some really innovative solutions.
In this session, we talk with Jon Arnold, the principal at J Arnold & Associates, and a leading analyst covering the contact center market.
Robocall Mitigation with YouMail and ProSBCAlan Percy
In January of 2021, over 4 billion robocalls were placed, many were part of an international scam and designed to ensnare unwitting victims. Illegal robocalling continues to be the #1 consumer complaint to the FCC. To address this, the FCC has issued numerous orders, designed to stamp out illegal robocalling and protect US consumers from fraud and other various scams. One of these orders requires development of a robocall mitigation program at the originating service provider.
In this session, we are joined by Mike Rudolph, the CTO of YouMail, to learn about their AI-powered robocall sensor network, and show how service providers and enterprises can use YouMail along with ProSBC to quickly implement a highly-effective robocall mitigation program.
Links:
Full video: https://youtu.be/9BpuYSY4mR4
YouMail consumer call screening product: www.youmail.com
ProSBC Pricing and product information: www.prosbc.com
Implementation notes on TBwiki: https://docs.telcobridges.com/tbwiki/ProSBC:Youmail
What is SS7? An Introduction to Signaling System 7Alan Percy
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
Managing multiple SBCs across a complex network requires provisioning, coordination of routing-plans, performance monitoring and much more from a centralized network operations center. In this session, we take a look at using RESTful APIs as a means to manage SBCs - automating provisioning, configuration, diagnostics and other functions.
We'll also share stories from two ProSBC customers that have used RESTful APIs to manage their network configuration, making adding new subscribers easier and reducing the risk of fraud.
Building VoIP-based systems with SIP can be daunting. The entire telecommunications industry is a layered stack of technologies, some from the age of telephones with hand-cranks. Others from the Internet age of packet switching and VPNs.
Over the years, the experts at TelcoBridges have built a knowledge base about underlying telecommunications and VoIP technology, SIP signaling, networking products and design methods. In this event, we pull some of our favorite Frequently Asked Questions from our video library, our forum, Wiki, and your emails, sharing answers and insight that both beginners and advanced designers will find helpful.
A recording of the live webinar is available at:
https://www2.telcobridges.com/videolibrary
New Opportunities with Two Factor Authentication (2FA) - A How ToAlan Percy
Phishing attacks are almost a daily event – the result of someone trying to trick an unsuspecting victim into sharing their username and password for their bank account or other valuable resource. Other attacks try to impersonate the victim attempting to change passwords in hopes of gaining access to their email, financial or other on-line accounts. Simple username/password combinations used to be enough to keep the bad guys out…not anymore.
Two factor authentication or (2FA) is a security tool that has become the norm to protect high-value targets, using SMS or voice calling to verify the user identity. As financial services and many other industries work to secure their systems, they need access to two factor authentication tools, including APIs, ability to send SMS and make voice calls to deliver temporary passcodes.
During this event, we’re joined by experts from both Telestax and Network Intelligence who are going to show us how 2FA can offered as a service by service providers, creating new revenue opportunities. Be sure to stay with us for information on a live demonstration you can try on your own.
Unified Communications as a Service (or UCaaS), is a relatively new opportunity for service providers, making a complete business communications solution available from virtually anywhere and billed on a monthly basis, without the cost of on-premises equipment. The OPEX model makes UCaaS extremely popular with growing and distributed companies.
One of the popular software providers enabling the UCaaS market is 3CX, an open-standards communications solution. Service providers are discovering that deploying 3CX as a service is an excellent opportunity to grow their business, bringing business-class UCaaS to a range of vertical markets and geographies. As we’ll show today, TelcoBridges’ ProSBC offers a valuable set of capabilities to make hosted 3CX implementations secure, avoids on-premises CPE, is easy to manage and the subscription-based business model makes scaling easy and affordable.
In this recorded webinar, we are joined by Matt Ussery, CIO and founder of Austen Consultants, and take a closer look at how he built his successful hosted cloud service based on 3CX and ProSBC.
You can view the recording at: https://youtu.be/YX8C0UBtEec
Media gateways are a fundamental building block of voice communications networks, interconnecting legacy TDM voice networks and equipment with voice-over-IP networks. Found in service provider and enterprise networks, media gateways range in scale and capabilities, meeting a range of diverse applications. However, with the increasing adoption of SIP and VoIP networks, what role will media gateways play going forward? Will they become obsolete and join the VCR in the dustbin of technology? Or will they evolve to take on new roles in converged voice networks?
Welcome to “The Future of Media Gateways”, our 23rd monthly webinar, covering technical, business and partner topics to help service providers and enterprises build better voice networks.
During this session, we take a closer look at the market for media gateways, some recent innovations, and a number of new use cases. We’ll finish up with a summary of the media gateway portfolio from TelcoBridges and leave time for your questions.
The phones won’t stop ringing…or they don’t ring at all. Contact center agents waste time answering bogus calls while customers complain they can’t get through. 9-1-1 agents waste time answering robo-callers instead of dealing with real emergencies.
Telephony Denial of Service (TDOS) attacks clog up business telephone lines, causing disruption of business and wasting employee productivity. TDOS attacks can be the result of nefarious actors trying to extort money or a targeted grudge to settle, but also can be caused by rouge robocall campaigns, either way, TDOS attacks are becoming more common and difficult to prevent. Service providers are very often unprepared and unable to address TDOS attacks, leaving businesses vulnerable while they search for a solution.
Welcome to “How to Protect Against TDOS Attacks”, our 22nd monthly webinar in the FreeSBC/ProSBC series, covering technical, business and partner topics to help service providers and enterprises better secure their voice networks.
During this session, we describe methods that service providers and businesses can use to mitigate TDOS attacks, reducing or eliminating their impact. Toward the end of this session will also share three real end-customer case studies, showing how these businesses implemented their own TDOS solutions, deflecting hundreds of unwanted calls per day.
Microsoft's Azure is one of the top requested cloud platforms for communications solutions and a popular choice for hosting ProSBC and other cloud communications applications. During this session, we'll give a step-by-step tutorial and demonstration of the process to activate and configure ProSBC on Azure. At the conclusion of the tutorial, attendees will be prepared to provision ProSBC into their Azure communications solutions.
Topics covered in this session:
- Ordering process
- Selecting a processor
- Preparing the Azure account
- Preparing and Loading the ProSBC on Azure Image
- Activating the ProSBC Image
- Configuring and operating ProSBC
- Roadmap for ProSBC on Azure
- Your Questions
In this session we explore the future of new network services and how Universal CPE (uCPE) is used by service providers to combine many separate fixed-function network elements with a single multi-function device. Using virtualized network function software (VNFs) on Universal CPE, providers have a consistent and flexible foundation they can build on to offer new SD-WAN, SIP Trunking, and other services while improving network security with SBC and firewall VNFs.
How to Prevent Telecom Fraud in Real-TimeAlan Percy
Telecommunications fraud continues to plaque the industry with ever increasingly sophisticated methods and tools. From simple theft of services to international premium toll rate calling scams, stories of service providers and enterprises being stuck with thousands of dollars of fraudulent calls is a common occurrence that can be financially devastating. The Communications Fraud Control Association reports that in 2015, service providers suffered over 22 billion dollars in fraud.
During this “How To” session we will be joined by the experts from Jerasoft, showing various methods that utilize real-time billing systems and Session Border Controller software to stop fraud in its tracks!
The programmable telephone network has always intrigued me. As a developer, having the ability to create custom applications within the service provider network seems to have endless possibilities. I can envision all sorts of applications that make businesses more productive and consumers better informed. I can also envision business opportunities for service providers, offering hosted development platforms that developers can use to create new customer-facing services.
Communications Platform as a Service (CPaaS) is a means to offer an open API-based development environment to businesses of all sizes, allowing them to build custom business applications to improve their customer experience and better secure their data. Today we plan to explore opportunities for CPaaS, explain how service providers can integrate CPaaS into their existing networks and review a live customer case study of CPaaS in action.
Extending the Life of your SS7 Network with SIGTRANAlan Percy
Since the late 1970’s SS7 have been the dominant signaling standard for the global PSTN, interconnecting service providers, ILECs, CLECs, and wholesale operators. With the advent of number portability, 800-toll-free, mobile wires and SMS, SS7 had adapted and carried the bulk of the signaling to make all these services possible.
Service providers have made a significant investment in this infrastructure and have made it clear to us that they need to maximize their investment going forward.
Today we’re going to share 5 ways to leverage SIGTRAN and STPs to extend the life of SS7 network infrastructure.
No topic has generated as much interest, consumer complaints, and coordinated technical hurdles in telecommunications at the problem with illegal robocalling and the associated fraud.
We were astounded by the response to our “How To” webinar held in February, by far the most registrations, attendees and questions. With over 137 questions in the queue at the end of the session, we thought it best to organize a follow-up, taking time to analyze the list of questions and come up with a TOP 10 FAQ. Thanks for joining us as we work through the STIR/SHAKE Frequently Asked questions
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
What is an SBC? A look at the role of the Session Border Controller
1. What is an SBC?
A look at the role of the
Session Border Controller
Alan D. Percy
alan.percy@telcobridges.com
November 2018
1
2. 2
What are the Risks?
• Extortion
• DOS / DDOS Attacks
• Registration Floods
• Malformed SIP Headers
• Call Floods
• Intrusion
• Network Scanning
• Account Hacking
• Theft of Services
3. 3
Agenda
Session Border Controllers
• What are they?
• How do they work?
• How are they used?
• Where to get free
SBC software?
• Where to learn more?
5. 5
SIP Server = SBC?
Answer: No – SIP Servers don’t have a B2BUA and have
no media handling security
6. 6
Other Needs?
• SIP-aware Security
• Resolve SIP incompatibility
issues
• Convert media formats
• Facilitate call recording
• Measure voice/video quality
• Call Routing
• Billing By Korolev Alexandr
RFC 3261
7. What is a SBC?
Local Area
Network
Network
Border
Wide Area
Network SBC
• Anywhere two SIP networks intersect
• Software-based “Network Function”
• Most often between a WAN and a LAN
SIP SIP
19. 19
Use Cases – Redundancy
Tasks:
Failure Detection
Traffic Redirection and Routing
Performance Measurement
Service Provider
SBC
SBC
Wholesale
Provider(s)
20. 20
Use Cases – CPaaS Providers
Tasks:
SIP Trunking Interoperability
FQDN Mapping
Intelligent Call Routing
Media By-pass
Cloud Hosted
Cloud-based Communications Provider as a Service (CPaaS)
SIP Trunking
Provider(s)
CPaaS
SBC
21. Emergence of the E-SBC
Service Provider SBC
• Protect service provider’s network
• High density / Large capacity
• Billing Interfaces
• NAT Traversal
• SIP Trunking and Access
• Central Office / Cloud Deployment
• 1+1 Redundancy
• Legal Intercept (CALEA)
• Wireline and Wireless SPs
• Sold through Systems Integrators
Enterprise SBC
21
• Protect enterprise’s network
• Low to medium density
• Quality of Service measurement
• Intrusion Protection
• UC or IP-PBX Interoperabililty
• Customer Premises (CPE)
• Lower cost
• SIPREC for Call Recording
• Mid-market and Enterprises
• Sold through Resellers/Channels
22. 22
Use Cases – E-SBC
Tasks:
Security
SIP Trunking Interoperability
ANI/Caller-ID Substitution
Cause Code Mapping
IP-PBX / UC / Contact Center with SIP Trunking
SIP Trunking
Provider(s)
UC or
Contact Center
SBC
23. 23
Use Cases – E-SBC
Tasks:
Security
SIP Trunking Interoperability
Registration Forwarding
IP-PBX / UC / Contact Center with SIP Trunking and Remote Users
SIP Trunking
Provider(s)
UC or
Contact Center
SBC
Work-at-home users
SBC
25. 25
SBCs “Back in the Day”
• SBCs were based on specialized
“purpose-built” hardware platforms
• Packet processing H/W
• DSP Modules
• DC Power
• High Availability in hardware
26. Changing Economics
“Old Way”
Hardware-centric
Proprietary appliances
EOL Hardware
Capital Expenditure + Maintenance
“Cloud Way”
26
Software-centric
COTS Hardware, Virtual or Cloud
Software-as-a-Service
“Pay-as-you-Grow”
TCO
Years
TCO
Years
27. 27
SBCs as Software
“Service providers have been deploying session
border controllers (SBCs) predominantly as
standalone devices, but by 2019 they will
increasingly implement SBCs as software in
virtualized environments and on commercial
servers…”, Diane Myers, IHS Markit
Source: IHS Markit’s IMS and SBC Strategies and Vendor
Leadership Service Provider Survey, September 2019
28. 28
SBC Deployment Models – COTS
• Highest performance and scale
• Most predictable performance
• Scales down to small CPE appliances
• Required dedicated hardware
30. 30
SBC Deployment Models - VNF
• Deployed as a Virtualized
Network Function (VNF)
• Core of a Service Provider
or
Edge of a SP network on
uCPE
• Managed by Orchestration
S/W
SBC
31. 31
SBC Deployment Models - Cloud
• “Pay as you Grow”
• Variety of platform choices
and operating systems
• Flexible scaling
Welcome to “FreeSBC – A New Approach to the SBC”, a webinar event hosted by TelcoBridges
Before we begin, a little housekeeping: As a live event participant, you’ll have the opportunity to interact with today’s speakers and hope you do pose your questions and comments on today’s topic using the Q/A panel. To pose a question or comment, open the Q/A panel by clicking on the box in the upper left of your screen. We’ll cover your questions toward the end of the session.
We’ve found that some attendees may need to adjust the webinar View Options to see the full slide on your screen. If you are not seeing a full slide, move your mouse to the top of the webinar window and a View Option selection will appear – choose an option that best fits your screen.
Also, today’s event is being recorded and all those that have registered will received a link to the recording for on-demand playback. We hope you share the link with your co-workers and others that would find the discussion valuable.
First a little background:
As network architects in service providers and large enterprises plan their migration to cloud infrastructure, one network security element plays a critical role and needs special treatment - the Session Border Controller. At the crossroads of real-time voice and video traffic, SBCs are tasked with providing protection against DDOS attacks, facilitating NAT traversal, providing topology hiding, resolving interoperability issues and much more.
The traditional way of paying for network infrastructure assumed a hardware-centric appliance needed to be purchased, requiring a large capital expenditure followed by maintenance fees over the life of the equipment. The result was a front-loading of the TCO, a real problem for providers that are just starting out and are building a customer base. [BUILD]
The new “Cloud Way” is a more software-centric model where initial costs are low, and increase later when a paid subscriber base is established by the provider. This model offers more opportunities for fostering new services and applications – ideally, growing new business opportunities.
Recognizing these needs, TelcoBridges offers FreeSBC, a software SBC solution designed specifically for cloud and virtualized deployments. Highly scalable with carrier-grade reliability, FreeSBC is a commercial SBC, offered under a “freemium” business model. We feel FreeSBC better fits the emerging cloud application market needs for affordable voice network security.