Welcome!

News Feed Item

Egged Addresses Need for Voice Network Security with Vigilance Networks

Vigilance Networks, formerly known as Vibesec, a security intelligence company, today announced that Egged, an Israel-based public transportation company, is deploying the Vigilance Security Intelligence Platform as it looks to proactively protect its Cisco-based voice over IP (VoIP) network for its corporate headquarters and remote offices. Designed to protect real-time IP communications against threats, vulnerabilities, cyber attacks and toll fraud, Vigilance Networks’ Security Intelligence Platform effectively secures the unified communications (UC) and IP Telephony networks that standard IT and data security solutions are unable to adequately protect. As a result, Egged is now able to receive real-time insight and understanding of their vulnerabilities and networks as they look to mitigate cyber threats.

Operating over 55 percent of Israel’s bus service with nearly 1 million passengers, Egged began experiencing threats to their UC network. As a multi-national company with employees working out of either the headquarters or one of the remote locations – including several regional offices, a call center and a repair depot – Egged saw the need to deploy enhanced security features before a full-blown attack crippled the network and impacted transportation services. Demanding separate, specialized security for each location, Egged looked for a solution that could secure the headquarters with an emphasis on prevention of information leaks and user identity theft, as well as prevention of toll fraud at the regional offices. Without wanting to deploy multiple security solutions, Egged demanded the ability to manage security, fraud and call policy from a single, unified pane of glass.

By deploying Vigilance Networks’ Security Intelligence Platform, Egged was able to seamlessly integrate the security functions into existing technology, including session border controllers, communications servers, voicemail servers and media gateways. Vigilance Networks’ platform delivers an unprecedented amount of actionable intelligence about the known and unknown threats to Egged’s IP network. These include real-time threat, fraud and security intelligence that can be used to combat attacks as they happen, and prevent them from happening at all. As a result, Egged is able to effectively manage and monitor security, both internally and at the perimeter.

“As we work directly with the public, it’s imperative that we’re able to connect with customers and ensure continuous service over our unified communications network,” said Chen Amram, CTO of Egged. “Since the threats we were experiencing were UC specific, we saw the need for a more advanced solution. Vigilance Networks’ Security Intelligence Platform enables us to monitor our VoIP network to ensure privacy, prevent information leaks and toll fraud, and tightly manage security policies. As a result, we’re able to ensure business continuity as we continue our daily operations of running over 3,000 buses, without worrying about cyber security.”

“The challenge network administrator’s face is that standard tools and procedures used to secure the data network aren’t designed to tackle the threats facing real-time communications running on that network. With hackers becoming more educated and using advanced tools to gain entry, often times existing network security is rendered vulnerable,” said Neil Segall, CEO of Vigilance Networks. “The Vigilance Networks Security Intelligence Platform provides customers, including Egged, the unique ability to get detailed, real-time intelligence regarding their networks, thus establishing a better foundation to ensure business growth without network intrusion or interruption of service.”

About Vigilance Networks

Vigilance Networks™ is a privately held security intelligence company specializing in real time IP networks and applications. Its innovative platform allows enterprises, service providers, and governments to secure their networks and applications, while safely enable the increasingly complex and rapidly growing number of real time IP applications and mobile end points, including wearable technologies. The core of Vigilance Networks Security Intelligence platform is its Next-Generation Analytics Engine, which delivers application, element, user, and pattern visibility and control in a virtualized, cloud-based environment. Vigilance Networks' products and services address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. For more information, visit www.VigilanceNetworks.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
"We are a modern development application platform and we have a suite of products that allow you to application release automation, we do version control, and we do application life cycle management," explained Flint Brenton, CEO of CollabNet, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
Application transformation and DevOps practices are two sides of the same coin. Enterprises that want to capture value faster, need to deliver value faster – time value of money principle. To do that enterprises need to build cloud-native apps as microservices by empowering teams to build, ship, and run in production. In his session at @DevOpsSummit at 19th Cloud Expo, Neil Gehani, senior product manager at HPE, discussed what every business should plan for how to structure their teams to delive...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry’s single source for the cloud. Fusion’s advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...