Fraud Within a VoIP Environment

Posted on
Hacker

Since the introduction of VoIP, the service or underlying technology (based on the SIP protocol) has been susceptible to multiple fraud scenarios. In particular, by exploiting some of the features of VoIP, such as three way call and call transfer, hackers can inject call signals into the network and effectively hijack calls. The result is significant non-billable revenue for the Service Provider. Since commands associated with VoIP technology are often sent un-encrypted and without authorization for each command, this is an easy technique to carry out.

If at First You Don’t Succeed, Test, Test Again

Posted on
Test Failure

In one recent test Empirix was involved with, callers were complaining about long connection times and poor voice quality during a storm. The company involved conducted a test of its SBC to better understand the origin of the issue. During the test process, the organization discovered that, while having a registration flood of 10,000 concurrent SIP registrations, SIP call setup time doubled. Moreover, jitter increased on the SBC.

What is Passive Monitoring?

Posted on
Closer Look at Passive Monitoring

No matter how solid a communications system is when it’s first implemented, things tend to go wrong over time. As you add new technology, change settings, have increased voice or data volumes, and more, it becomes a requirement that you monitor your communications systems to ensure they run as expected.

Prepping for Healthcare Reform

Posted on
Healthcare Industry

Today we are seeing a great deal of activity as companies migrate from legacy to IP technologies, add new self-service menu options and update routing solutions to ensure people have fast access to the diverse set of information and agent services. Everyone is taking pains to train their staff on the new regulations and how each plan will best meet differing needs.