The most progressive security standards

Crypto StreamPBX

ENJOY THE ULTIMATE PROTECTION
OF YOUR DATA 24/7

LEARN MORE

The most progressive security standards

Crypto StreamPBX

ENJOY THE ULTIMATE PROTECTION  OF YOUR DATA 24/7

Vulnerabilities of classic VoIP

For sure the use of VoIP is more advantageous than of traditional telephony. It provides additional functionality, cheap price of calls, management of remote offices, high quality of connection as well as a single informational environment inside the team, reporting system and much more.

Nevertheless, since the VoIP is cloud-based, it entails additional security risks which didn’t exist before – data interception, DDoS attacks, unauthorized access to the corporate network. Even though 99% of companies don’t encounter such issues in practice, they should be aware of it.

Vulnerabilities of classic VoIP

For sure the use of VoIP is more advantageous than of traditional telephony. It provides additional functionality, cheap price of calls, management of remote offices, high quality of connection as well as a single informational environment inside the team, reporting system and much more.

Nevertheless, since the VoIP is cloud-based, it entails additional security risks which didn’t exist before – data interception, DDoS attacks, unauthorized access to the corporate network. Even though 99% of companies don’t encounter such issues in practice, they should be aware of it.

Due to a specific nature of VoIP, a scammer doesn’t need to have physical access to the data transmission line in order to intercept data. Moreover, the external reading of data is almost impossible to track down.

Another threat is the risk of transmitted data alteration.

In this case, the voice flow which isn’t encrypted is unsafe.

By refusing from the use or simplifying data authentication and authorization in VoIP you enable scammers to substitute users’ data with their own (data breach through the change or interception of unprotected lines).

Thus, scammers can make expensive calls at your expense as well as intercept and record conversations.

Denial of Service (DoS) is one of the types of attacks which is aimed at increase of the critical load of the network with the junk information or multiple short calls.

If not to track signs of such attacks and not to apply passive security measures, VoIP services can’t sustain the increased workload and aren’t able to provide services to connected subscribers.

Due to a specific nature of VoIP, a scammer doesn’t need to have physical access to the data transmission line in order to intercept data. Moreover, the external reading of data is almost impossible to track down.

Another threat is the risk of transmitted data alteration.

In this case, the voice flow which isn’t encrypted is unsafe.

By refusing from the use or simplifying data authentication and authorization in VoIP you enable scammers to substitute users’ data with their own (data breach through the change or interception of unprotected lines).

Thus, scammers can make expensive calls at your expense as well as intercept and record conversations.

Denial of Service (DoS) is one of the types of attacks which is aimed at increase of the critical load of the network with the junk information or multiple short calls.

If not to track signs of such attacks and not to apply passive security measures, VoIP services can’t sustain the increased workload and aren’t able to provide services to connected subscribers.

3 PILLARS OF VoIP OF
STREAM TELECOM SOLUTIONS

It’s important to understand that none of the technical security solutions can ensure ultimate protection from all possible threats.

Having analyzed key security threats’ sources of VoIP, Stream Telecom has combined three key protection criteria.

It’s important to understand that none of the technical security solutions can ensure ultimate protection from all possible threats.

Having analyzed key security threats’ sources of VoIP, Stream Telecom has combined three key protection criteria.

Confidentiality

We ensure the protection of the VoIP traffic by preventing interception and reading of phone calls, altering of transmitted information, theft of users’ registration data, etc.

Integrity

Customers can be sure that the transmitted information isn’t altered by the third parties and all requests for the performance of tasks and functions are initiated by authorized users and applications.

Accessibility

Our task is to always ensure failure-proof functioning of the corporate VoIP systems even in case of DDoS attacks, different «worms», «viruses», etc.

GET A CONSULTATION

Confidentiality

We ensure the protection of the VoIP traffic by preventing interception and reading of phone calls, altering of transmitted information, theft of users’ registration data, etc.

Integrity

Customers can be sure that the transmitted information isn’t altered by the third parties and all requests for the performance of tasks and functions are initiated by authorized users and applications.

Accessibility

Our task is to always ensure failure-proof functioning of the corporate VoIP systems even in case of DDoS attacks, different «worms», «viruses», etc.

GET A CONSULTATION

Why security is a contemporary gold?

Why security is a contemporary gold?

Development of modern technologies provides major advantages not only for businesses but for hackers as well. Every year they find more and more exquisite ways of interfering with personal data. Let alone the fact that at any point all your calls can be read and recorded by the provider.

So, is there a way to be 100% safe? Definitely!

Stream Telecom provides you with a wide range of encryption technologies from VPN tunnels to international encryption standards.

Development of modern technologies provides major advantages not only for businesses but for hackers as well. Every year they find more and more exquisite ways of interfering with personal data. Let alone the fact that at any point all your calls can be read and recorded by the provider.

So, is there a way to be 100% safe? Definitely!

Stream Telecom provides you with a wide range of encryption technologies from VPN tunnels to international encryption standards.

SELECT THE ENCRYPTION MODE

1st LEVEL OF ENCRYPTION

Application of VPN-tunnels

The most widespread solution for additional VoIP protection is the connection of remote users through virtual private networks (VPN).

A subscriber receives access to a virtual VoIP channel inside the Internet network. This channel is protected and enables the secure exchange of information making it useless for scamming and criminal purposes.

Unlike standard in telephony, the content of intercepted packages sent via encrypted VPN-tunnels is understandable only for owners of the encryption key.

The same method of connections’ protection applies to VoIP services providers.

The most widespread solution for additional VoIP protection is the connection of remote users through virtual private networks (VPN).

A subscriber receives access to a virtual VoIP channel inside the Internet network. This channel is protected and enables the secure exchange of information making it useless for scamming and criminal purposes.

Unlike standard in telephony, the content of intercepted packages sent via encrypted VPN-tunnels is understandable only for owners of the encryption key.

The same method of connections’ protection applies to VoIP services providers.

The structure of a private telephone network

«Stream Telecom» network

The structure of a private telephone network

«Stream Telecom» network

Advantages of VPN-tunnels Disadvantages of VPN-tunnels

– No need to use expensive hard
and software.

– Algorithm of subscription to
the service excludes the use of
expensive dedicated channels.

– Protection of any type of
corporate telephone networks
including those with unlimited
numbers of phone circuits.

– Easy and convenient setup.

– High safety of the communication.

– Protection of the circuit
used for the VoIP from blocking
by the Internet providern.

– A minor decrease in the connection
quality due to delays caused
by encryption.

– Excessive load on the equipment
caused by the need
for encryption.

– A complication of the network
infrastructure.

.
.
.
.
.
.
.
.

Is VPN tunnel a suitable solution for you?

Is VPN tunnel a suitable
solution for you?

ORDER CONSULTATION

2nd LEVEL OF ENCRYPTION

Encryption protocol TLS, SRTP protocol

To ensure ultimate protection of confidential negotiations and minimize the possibility of information interception by scammers one can use double protection.

Since to make a call a customer and a server preliminary exchange operational data to establish a connection, this problem can be divided into two parts – protection of operation data of VoIP and protection of voice traffic.

Both protocols TLS (Transport Layer Security) and SRTP (Secure Real Time Protocol) can be used as protection measures.

To ensure ultimate protection of confidential negotiations and minimize the possibility of information interception by scammers one can use double protection.

Since to make a call a customer and a server preliminary exchange operational data to establish a connection, this problem can be divided into two parts – protection of operation data of VoIP and protection of voice traffic.

Both protocols TLS (Transport Layer Security) and SRTP (Secure Real Time Protocol) can be used as protection measures.

Advantages of VPN-tunnels Disadvantages of VPN-tunnels
Protection of SIP signal Protection of voice traffic

TLS — is an encryption protocol which ensures protected data transmission between communication centers. It’s a standard method for SIP-protocol encryption. TLS ensures the confidentiality and integrity of transmitted information and is responsible for the authentication.

After the establishment of protected connection starts the transmission of voice data ensured by the application of SRTP protocol

SRTP protocol is considered one of the best ways of VoIP protection based on IP-PBX Asterisk. The key advantage is the absence of a negative impact on the quality of the connection.

Every call you make is assigned with a unique code which renders the reading of conversations by unauthorized users of the network practically impossible. Thanks to this SRTP protocol is used both for ordinary and confidential calls.

Ordinary voice

LISTEN TO THE SAMPLE

Encrypted voice

LISTEN TO THE SAMPLE

Ordinary voice

Encrypted voice

LISTEN TO THE SAMPLE
LISTEN TO THE SAMPLE

Disclaimer! Don’t forget about the need to protect the connection of the server to the telephony
and external communication channels (mobile networks, landline networks).

Disclaimer! Don’t forget about the need to protect the connection of the server to the telephony
and external communication channels (mobile networks, landline networks).

Will TLS (Transport Layer Security)
and SRTP (Secure Real Time Protocol) be suitable for you?

Will TLS (Transport Layer Security) and SRTP (Secure Real Time Protocol) be suitable for you?

ORDER CONSULTATION

Use advanced encryption opportunities for the protection of your data

Use advanced encryption opportunities for the protection of your data

A possibility to order a comprehensive verification of
the system’s security by a customer or another
independent organization

The best quality of service at low-speed and overloaded
Internet channels thanks to the minimal bandwidth
capacity 2 kB/s

Guarantee of the data integrity: any «suspicious» process
will be interrupted before causing major damage.

Symmetric algorithm: AES (256 bit) for for command traffic
and AES (256 bit) for conversations.

Works with any type of traffic even without
a SIM-card (with the help of Wi-Fi).

Initialization and authentication of
command traffic is ensured by RSA (2048-4096)

Asymmetric/open key Elliptical Curves
Diffie-Hellman algorithm

True Generator Random Number for
the generation of sessions’ keys

Encryption based on random (HW generated)
secret keys and strong encryption
algorithms .

Use of intelligent network
management algorithms

A possibility to order a comprehensive verification of
the system’s security by a customer or another
independent organization

The best quality of service at low-speed and overloaded
Internet channels thanks to the minimal bandwidth
capacity 2 kB/s

Guarantee of the data integrity: any «suspicious» process
will be interrupted before causing major damage.

Symmetric algorithm: AES (256 bit) for for command traffic
and AES (256 bit) for conversations.

Works with any type of traffic even without
a SIM-card (with the help of Wi-Fi).

Initialization and authentication of
command traffic is ensured by RSA (2048-4096)

Asymmetric/open key Elliptical Curves
Diffie-Hellman algorithm

True Generator Random Number for
the generation of sessions’ keys

Encryption based on random (HW generated)
secret keys and strong encryption
algorithms .

Use of intelligent network
management algorithms

ORDER CLOUD CONNECTION IN DATA-CENTER
ORDER A TAILORED SOLUTION WITH INSTALLATION IN THE OFFICE

Connection packages

Pricing table with an Table ID of "stream_uah_crypto" is not defined.

Connection packages

Pricing table with an Table ID of "stream_uah_crypto" is not defined.

Crypto StreamPBX: the most advanced international security standards are available to you

Crypto StreamPBX: the most advanced international security standards are available to you