Enterprise Phone Systems
Your Enterprise Voice Network is under attack.
We know some important things about your enterprise.
We know things that you may not know yourself. We know that you are significantly overpaying for your corporate voice network and services, no matter what type or mix of communication systems you own. And we know that you are vulnerable to costly, fraudulent and crippling attack through these same voice resources at this very moment.
We know because we see.
Our patented solutions have helped hundreds of companies see their voice security threats and opportunities to save money. It happens every time we deploy our solution. Every time. And although efforts to secure and save begin with visibility, they don´t end there. We also help you take real-time action, with voice network intelligence and unified policy enforcement across any mix of proprietary voice or unified communications (UC) systems.
We can help you unify, secure, optimize and better leverage your unified communications network to lower expenses, strengthen compliance, and enhance your business operations. We will change the way you see, protect, and leverage your UC network, and help transform your enterprise.
Threats to Enterprise Phone Systems
Your bank calls to clear a problem with your account, and they need some personal info. Only, the call wasn't from your bank at all. You’ve just fallen victim to a social engineering scheme.
Even the savviest consumers fall prey to fraud and identity theft. But our managed voice security services see through scams and keep valued customers connected to your business.
A U.S. nation-wide banking institution experienced call pumping attacks in the form of thousands of calls into the bank’s 1-800 contact center numbers.
A large, U.S. regional banking institution was the target of several Telephony Denial of Service (TDoS) attacks, resulting in the loss of all telephone/voice services across multiple retail branch locations for an extended period.
A large regional financial institution and its customers were victims of phone-based financial fraud and account takeover attacks inside the bank’s national contact center operation.
A nation-wide healthcare corporation was receiving urgent, weekly reports of Telephony Denial of Service (TDoS) attacks from many of its more than 250 member hospitals across the U.S.
An international financial credit rating organization discovered that there were plans to use social media to organize a flash-mob Telephony Denial of Service (TDoS) attack against its voice systems and services.
White Papers and Other Resources
PSAPs can be taken out of service by TDoS and DDoS attacks on their infrastructure. DHS is also concerned, and is funding pilot programs to investigate. Dr. Ann Cox from DHS, Chuck Spaulding from Palm Beach County Florida, and Mark Collier, CTO at SecureLogix discuss what they are doing in a pilot program to understand the issue and potential fixes. Don't miss this MUST LISTEN podcast.
Spoofing is the act of changing the source number on an inbound call. While some spoofing is legitimate, the days of trusting Caller ID are long gone.
TDoS Attacks flood and overwhelm a target’s voice lines and systems, preventing legitimate calls from getting through.
How to block TDoS Attacks, Toll Fraud, Voice Spam, Social Engineering and other common exploits.
In this report, we discuss the current, real-world state of security in the realms of enterprise Voice and Unified Communications (UC).
CTO Mark Collier talks real-world voice security on "No Jitter," a leading podcast on the converging networking worlds.
A downloadable introduction to the ETM technology platform.
A white paper overview of threats, procedures, and best practices for Enterprise Voice Network Security.
A downloadable brochure explaining the ETM Call Recorder Application.
A downloadable brochure explaining the PolicyGuru Meta-Policy Controller.
A downloadable white paper explaining Telecom Security and NERC.
A downloadable brochure explaining SecureLogix's Managed Security Service for Voice.