Sonus Perimeter Security Leverages Firewalls, SBCs
June 15, 2017
Sonus Networks (News - Alert) Inc. is taking aim at perimeter security with a new solution that leverages its own session border controllers and popular next-generation firewalls. The goal is to help secure their IP-based real-time communications during a time in which enterprises are seeing a rise in unified communications attacks.
Indeed, a report from IBM’s (News - Alert) Security Intelligence group indicates that cyber attacks using the SIP VoIP protocol increased last year, accounting for more than half of security event activity analyzed in 2016.
This Sonus solution is new and different from existing ones, the SBC supplier says, in that it brings together firewalls and SBCs for unified communications perimeter security. That’s as opposed to traditional models in which these network elements work separately, the company explains.
“By integrating the capabilities of next-generation firewalls with Sonus SBCs and leveraging the automation capabilities of SDN architectures, this new architecture delivers unprecedented security against data exfiltration, telephony denial-of-service attacks, and many other UC threats,” said Mykola Konrad (News - Alert), vice president of product management and marketing at Sonus.
Here’s how it works. The next-generation firewalls and session border controllers are linked at the control-plane level. That way, threat detection and mitigation can happen both within cloud and hardware-based architectures. And the payload scanning capabilities of next-generation firewalls can help SBCs blacklist bad actors that send spyware and other malware.
Sonus is already working with Palo Alto (News - Alert) Networks on this kind of implementation. And the Sonus announcement quotes Verizon Vice President of Business Networking and Security Solutions Shawn Hakl talking about how this joint solution can apply to Verizon (News - Alert) Virtual Network Services.
“The exchange of meta data between virtual functions to allow policy decisions based on complete visibility across the network will provide a level of security for enterprises that is simply not possible with individual point solutions,” Hakl said.
Edited by Alicia Young
Article comments powered by