The most progressive security standards
Crypto StreamPBX
ENJOY THE ULTIMATE PROTECTION OF YOUR DATA 24/7

Due to a specific nature of VoIP, a scammer doesn’t need to have physical access to the data transmission line in order to intercept data. Moreover, the external reading of data is almost impossible to track down.
Another threat is the risk of transmitted data alteration.
In this case, the voice flow which isn’t encrypted is unsafe.

By refusing from the use or simplifying data authentication and authorization in VoIP you enable scammers to substitute users’ data with their own (data breach through the change or interception of unprotected lines).
Thus, scammers can make expensive calls at your expense as well as intercept and record conversations.

Denial of Service (DoS) is one of the types of attacks which is aimed at increase of the critical load of the network with the junk information or multiple short calls.
If not to track signs of such attacks and not to apply passive security measures, VoIP services can’t sustain the increased workload and aren’t able to provide services to connected subscribers.

Due to a specific nature of VoIP, a scammer doesn’t need to have physical access to the data transmission line in order to intercept data. Moreover, the external reading of data is almost impossible to track down.
Another threat is the risk of transmitted data alteration.
In this case, the voice flow which isn’t encrypted is unsafe.

By refusing from the use or simplifying data authentication and authorization in VoIP you enable scammers to substitute users’ data with their own (data breach through the change or interception of unprotected lines).
Thus, scammers can make expensive calls at your expense as well as intercept and record conversations.

Denial of Service (DoS) is one of the types of attacks which is aimed at increase of the critical load of the network with the junk information or multiple short calls.
If not to track signs of such attacks and not to apply passive security measures, VoIP services can’t sustain the increased workload and aren’t able to provide services to connected subscribers.
3 PILLARS OF VoIP OF
STREAM TELECOM SOLUTIONS
It’s important to understand that none of the technical security solutions can ensure ultimate protection from all possible threats.
Having analyzed key security threats’ sources of VoIP, Stream Telecom has combined three key protection criteria.
It’s important to understand that none of the technical security solutions can ensure ultimate protection from all possible threats.
Having analyzed key security threats’ sources of VoIP, Stream Telecom has combined three key protection criteria.
Why security is a contemporary gold?
Why security is a contemporary gold?
Development of modern technologies provides major advantages not only for businesses but for hackers as well. Every year they find more and more exquisite ways of interfering with personal data. Let alone the fact that at any point all your calls can be read and recorded by the provider.
So, is there a way to be 100% safe? Definitely!
Stream Telecom provides you with a wide range of encryption technologies from VPN tunnels to international encryption standards.
Development of modern technologies provides major advantages not only for businesses but for hackers as well. Every year they find more and more exquisite ways of interfering with personal data. Let alone the fact that at any point all your calls can be read and recorded by the provider.
So, is there a way to be 100% safe? Definitely!
Stream Telecom provides you with a wide range of encryption technologies from VPN tunnels to international encryption standards.
1st LEVEL OF ENCRYPTION
Application of VPN-tunnels
The most widespread solution for additional VoIP protection is the connection of remote users through virtual private networks (VPN).
A subscriber receives access to a virtual VoIP channel inside the Internet network. This channel is protected and enables the secure exchange of information making it useless for scamming and criminal purposes.
Unlike standard in telephony, the content of intercepted packages sent via encrypted VPN-tunnels is understandable only for owners of the encryption key.
The same method of connections’ protection applies to VoIP services providers.
The most widespread solution for additional VoIP protection is the connection of remote users through virtual private networks (VPN).
A subscriber receives access to a virtual VoIP channel inside the Internet network. This channel is protected and enables the secure exchange of information making it useless for scamming and criminal purposes.
Unlike standard in telephony, the content of intercepted packages sent via encrypted VPN-tunnels is understandable only for owners of the encryption key.
The same method of connections’ protection applies to VoIP services providers.
The structure of a private telephone network

«Stream Telecom» network

The structure of a private telephone network

«Stream Telecom» network

Advantages of VPN-tunnels | Disadvantages of VPN-tunnels |
---|---|
– No need to use expensive hard – Algorithm of subscription to – Protection of any type of – Easy and convenient setup. – High safety of the communication. – Protection of the circuit |
– A minor decrease in the connection – Excessive load on the equipment – A complication of the network . |

Is VPN tunnel a suitable solution for you?
Is VPN tunnel a suitable
solution for you?
2nd LEVEL OF ENCRYPTION
Encryption protocol TLS, SRTP protocol
To ensure ultimate protection of confidential negotiations and minimize the possibility of information interception by scammers one can use double protection.
Since to make a call a customer and a server preliminary exchange operational data to establish a connection, this problem can be divided into two parts – protection of operation data of VoIP and protection of voice traffic.
Both protocols TLS (Transport Layer Security) and SRTP (Secure Real Time Protocol) can be used as protection measures.
To ensure ultimate protection of confidential negotiations and minimize the possibility of information interception by scammers one can use double protection.
Since to make a call a customer and a server preliminary exchange operational data to establish a connection, this problem can be divided into two parts – protection of operation data of VoIP and protection of voice traffic.
Both protocols TLS (Transport Layer Security) and SRTP (Secure Real Time Protocol) can be used as protection measures.
Advantages of VPN-tunnels | Disadvantages of VPN-tunnels |
---|---|
Protection of SIP signal | Protection of voice traffic |
TLS — is an encryption protocol which ensures protected data transmission between communication centers. It’s a standard method for SIP-protocol encryption. TLS ensures the confidentiality and integrity of transmitted information and is responsible for the authentication. After the establishment of protected connection starts the transmission of voice data ensured by the application of SRTP protocol |
SRTP protocol is considered one of the best ways of VoIP protection based on IP-PBX Asterisk. The key advantage is the absence of a negative impact on the quality of the connection. Every call you make is assigned with a unique code which renders the reading of conversations by unauthorized users of the network practically impossible. Thanks to this SRTP protocol is used both for ordinary and confidential calls. |

Disclaimer! Don’t forget about the need to protect the connection of the server to the telephony
and external communication channels (mobile networks, landline networks).
Disclaimer! Don’t forget about the need to protect the connection of the server to the telephony
and external communication channels (mobile networks, landline networks).
Will TLS (Transport Layer Security)
and SRTP (Secure Real Time Protocol) be suitable for you?
Will TLS (Transport Layer Security) and SRTP (Secure Real Time Protocol) be suitable for you?
Use advanced encryption opportunities for the protection of your data
Use advanced encryption opportunities for the protection of your data
A possibility to order a comprehensive verification of
the system’s security by a customer or another
independent organization
The best quality of service at low-speed and overloaded
Internet channels thanks to the minimal bandwidth
capacity 2 kB/s
Guarantee of the data integrity: any «suspicious» process
will be interrupted before causing major damage.
Symmetric algorithm: AES (256 bit) for for command traffic
and AES (256 bit) for conversations.
Works with any type of traffic even without
a SIM-card (with the help of Wi-Fi).
Initialization and authentication of
command traffic is ensured by RSA (2048-4096)
Asymmetric/open key Elliptical Curves
Diffie-Hellman algorithm
True Generator Random Number for
the generation of sessions’ keys
Encryption based on random (HW generated)
secret keys and strong encryption
algorithms .
Use of intelligent network
management algorithms
A possibility to order a comprehensive verification of
the system’s security by a customer or another
independent organization
The best quality of service at low-speed and overloaded
Internet channels thanks to the minimal bandwidth
capacity 2 kB/s
Guarantee of the data integrity: any «suspicious» process
will be interrupted before causing major damage.
Symmetric algorithm: AES (256 bit) for for command traffic
and AES (256 bit) for conversations.
Works with any type of traffic even without
a SIM-card (with the help of Wi-Fi).
Initialization and authentication of
command traffic is ensured by RSA (2048-4096)
Asymmetric/open key Elliptical Curves
Diffie-Hellman algorithm
True Generator Random Number for
the generation of sessions’ keys
Encryption based on random (HW generated)
secret keys and strong encryption
algorithms .
Use of intelligent network
management algorithms
Connection packages
Pricing table with an Table ID of "stream_uah_crypto" is not defined.
Connection packages
Pricing table with an Table ID of "stream_uah_crypto" is not defined.