“Leveraging its knowledge of voice communications, Ribbon has recognized the need for stepped up security within the UC network,” said Greg Collins, Founder and Principal Analyst, Exact Ventures. “The growing shift toward Session Initiated Protocol (SIP) and cloud-native architectures has enabled new attacks against real-time communications networks.”
The Communications Fraud Control Association’s 2017 global fraud survey estimates approximately $29.2 billion in fraud losses annually from communications-related attacks.
Ribbon Protect provides service providers and enterprises with a machine learning, network behavioral analytics solution for their RTC network and fraud management. The platform enables service providers to accurately block toll fraud, Robo Dialers and disseminate security policies across network “enforcers” such as session border controllers (SBC) and firewalls.
Additionally, Ribbon Protect provides network operations with a single view of the end to end communications network, a critical factor in stopping RTC attacks, and intelligently pinpoints network operational issues, helping to lower service provider costs and decrease churn by increasing customer satisfaction.
“As the pace of communications accelerates and our modes of communication change, mobile and fixed CSPs and enterprises need a zero-trust security architecture that helps them outsmart bad actors focused on inventing new attacks,” said Kevin Riley, Ribbon CTO. “We’re launching Ribbon Protect to help our customers reduce their exposure to a wide range of threats including toll fraud, robo-calling and network infiltration via SIP by strengthening their RTC security posture.”
The Ribbon Protect platform allows customers to view call flows, quality of service metrics and make automated security enforcement decisions based on quantitative RTC network information to any enforcer, anywhere in the network. Using powerful and advanced network behavioral analytics, Ribbon Protect establishes a baseline of voice, video sessions and IP port activity to quickly identify and mitigate deviations from known baselines from threats such as toll fraud, Telephony Denial of Service (T-DOS), robo-calls and other threat vectors.