Click here to close now.

SYS-CON MEDIA Authors: VictorOps Blog, Tim Hinds, Mike Kavis, Peter Silva, Glenn Rossman

News Feed Item

Egged Addresses Need for Voice Network Security with Vigilance Networks

Vigilance Networks, formerly known as Vibesec, a security intelligence company, today announced that Egged, an Israel-based public transportation company, is deploying the Vigilance Security Intelligence Platform as it looks to proactively protect its Cisco-based voice over IP (VoIP) network for its corporate headquarters and remote offices. Designed to protect real-time IP communications against threats, vulnerabilities, cyber attacks and toll fraud, Vigilance Networks’ Security Intelligence Platform effectively secures the unified communications (UC) and IP Telephony networks that standard IT and data security solutions are unable to adequately protect. As a result, Egged is now able to receive real-time insight and understanding of their vulnerabilities and networks as they look to mitigate cyber threats.

Operating over 55 percent of Israel’s bus service with nearly 1 million passengers, Egged began experiencing threats to their UC network. As a multi-national company with employees working out of either the headquarters or one of the remote locations – including several regional offices, a call center and a repair depot – Egged saw the need to deploy enhanced security features before a full-blown attack crippled the network and impacted transportation services. Demanding separate, specialized security for each location, Egged looked for a solution that could secure the headquarters with an emphasis on prevention of information leaks and user identity theft, as well as prevention of toll fraud at the regional offices. Without wanting to deploy multiple security solutions, Egged demanded the ability to manage security, fraud and call policy from a single, unified pane of glass.

By deploying Vigilance Networks’ Security Intelligence Platform, Egged was able to seamlessly integrate the security functions into existing technology, including session border controllers, communications servers, voicemail servers and media gateways. Vigilance Networks’ platform delivers an unprecedented amount of actionable intelligence about the known and unknown threats to Egged’s IP network. These include real-time threat, fraud and security intelligence that can be used to combat attacks as they happen, and prevent them from happening at all. As a result, Egged is able to effectively manage and monitor security, both internally and at the perimeter.

“As we work directly with the public, it’s imperative that we’re able to connect with customers and ensure continuous service over our unified communications network,” said Chen Amram, CTO of Egged. “Since the threats we were experiencing were UC specific, we saw the need for a more advanced solution. Vigilance Networks’ Security Intelligence Platform enables us to monitor our VoIP network to ensure privacy, prevent information leaks and toll fraud, and tightly manage security policies. As a result, we’re able to ensure business continuity as we continue our daily operations of running over 3,000 buses, without worrying about cyber security.”

“The challenge network administrator’s face is that standard tools and procedures used to secure the data network aren’t designed to tackle the threats facing real-time communications running on that network. With hackers becoming more educated and using advanced tools to gain entry, often times existing network security is rendered vulnerable,” said Neil Segall, CEO of Vigilance Networks. “The Vigilance Networks Security Intelligence Platform provides customers, including Egged, the unique ability to get detailed, real-time intelligence regarding their networks, thus establishing a better foundation to ensure business growth without network intrusion or interruption of service.”

About Vigilance Networks

Vigilance Networks™ is a privately held security intelligence company specializing in real time IP networks and applications. Its innovative platform allows enterprises, service providers, and governments to secure their networks and applications, while safely enable the increasingly complex and rapidly growing number of real time IP applications and mobile end points, including wearable technologies. The core of Vigilance Networks Security Intelligence platform is its Next-Generation Analytics Engine, which delivers application, element, user, and pattern visibility and control in a virtualized, cloud-based environment. Vigilance Networks' products and services address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. For more information, visit www.VigilanceNetworks.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
VictorOps is making on-call suck less with the only collaborative alert management platform on the market. With easy on-call scheduling management, a real-time incident timeline that gives you contextual relevance around your alerts and powerful reporting features that make post-mortems more effective, VictorOps helps your IT/DevOps team solve problems faster.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been ...
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focu...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes ...
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, it is now feasible to create a rich desktop and tuned mobile experience with a single codebase, without compromising performance or usability.
SYS-CON Events announced today Arista Networks will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Arista Networks was founded to deliver software-driven cloud networking solutions for large data center and computing environments. Arista’s award-winning 10/40/100GbE switches redefine scalability, robustness, and price-performance, with over 3,000 customers and more than three million cloud networking ports depl...
Application metrics, logs, and business KPIs are a goldmine. It’s easy to get started with the ELK stack (Elasticsearch, Logstash and Kibana) – you can see lots of people coming up with impressive dashboards, in less than a day, with no previous experience. Going from proof-of-concept to production tends to be a bit more difficult, unfortunately, and it tends to gobble up our attention, time, and money. In his session at DevOps Summit, Otis Gospodnetić, co-author of Lucene in Action and founder...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, will explain the best practices of continuous testing at high scale, which is r...
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...