Government and Military
What Telephony Risks exist in the Government and Military sectors?
Our government and armed services are obvious marks for politically motivated attacks — any scheme that will distract, disrupt or even destroy the target organization.
We help Government and Military agencies with:
Your bank calls to clear a problem with your account, and they need some personal info. Only, the call wasn't from your bank at all. You’ve just fallen victim to a social engineering scheme.
Even the savviest consumers fall prey to fraud and identity theft. But our managed voice security services see through scams and keep valued customers connected to your business.
A U.S. nation-wide banking institution experienced call pumping attacks in the form of thousands of calls into the bank’s 1-800 contact center numbers.
A large, U.S. regional banking institution was the target of several Telephony Denial of Service (TDoS) attacks, resulting in the loss of all telephone/voice services across multiple retail branch locations for an extended period.
A large regional financial institution and its customers were victims of phone-based financial fraud and account takeover attacks inside the bank’s national contact center operation.
A nation-wide healthcare corporation was receiving urgent, weekly reports of Telephony Denial of Service (TDoS) attacks from many of its more than 250 member hospitals across the U.S.
An international financial credit rating organization discovered that there were plans to use social media to organize a flash-mob Telephony Denial of Service (TDoS) attack against its voice systems and services.
Whitepapers and Other Resources
Spoofing is the act of changing the source number on an inbound call. While some spoofing is legitimate, the days of trusting Caller ID are long gone.
TDoS Attacks flood and overwhelm a target’s voice lines and systems, preventing legitimate calls from getting through.
How to block TDoS Attacks, Toll Fraud, Voice Spam, Social Engineering and other common exploits.
In this report, we discuss the current, real-world state of security in the realms of enterprise Voice and Unified Communications (UC).
CTO Mark Collier talks real-world voice security on "No Jitter," a leading podcast on the converging networking worlds.
A downloadable introduction to the ETM technology platform.
A white paper overview of threats, procedures, and best practices for Enterprise Voice Network Security.
A downloadable brochure explaining the ETM Call Recorder Application.
A downloadable brochure explaining the PolicyGuru Meta-Policy Controller.